migrate to git.charlotte.sh
This commit is contained in:
commit
fbd588721e
412 changed files with 13750 additions and 0 deletions
|
@ -0,0 +1,66 @@
|
|||
# Lab 2.2 - Syslog Organization on log01
|
||||
|
||||
## setup mgmt01
|
||||
- on LAN
|
||||
- ip: 172.16.150.10
|
||||
- DG & DNS: 172.16.150.2
|
||||
|
||||
### configure fw01 with the LAN
|
||||
#### NAT rules on fw01, to set NAT for LAN to WAN
|
||||
```
|
||||
set nat source rule 20 description "NAT FROM LAN to WAN"
|
||||
set nat source rule 20 outbound-interface eth0
|
||||
set nat source rule 20 source address 172.16.150.0/24
|
||||
set nat source rule 20 translation address masquerade
|
||||
```
|
||||
#### DNS forwarding from LAN to WAN
|
||||
```
|
||||
set service dns forwarding listen-address 172.16.150.2
|
||||
set service dns forwarding allow-from 172.16.150.0/24
|
||||
```
|
||||
mgmt01 should now be able to ping google.com
|
||||
|
||||
### Install chrome remote desktop on mgmt01
|
||||
- open chrome
|
||||
- sign in with school email and turn on sync
|
||||
- go to remotedesktop.google.com, install the app if you want
|
||||
- on main host (laptop, go to `https://g.co/crd/headless`), download and install the package:
|
||||
- there might be dependency issues, this command worked on my computer: `sudo apt install libutempter0 xbase-clients xserver-xorg-video-dummy xvfb`
|
||||
- `sudo dpkg -i google-chrome-stable_current_amd64`
|
||||
- still on main host, click next and copy the command for the remote OS (in our case, debian)
|
||||
- paste it in the remote terminal, and create a PIN
|
||||
- at this point you should be able to access mgmt01 via chrome remote desktop, you might need to update CRD on mgmt01 first though, but we know how to do that ^
|
||||
- IMPORTANT: log out of the remote computer before attempting to connect
|
||||
|
||||
## log organization on log01
|
||||
Having all of our remote logs stuffed into log01's /var/log/messages or /var/log/secure is not helpful. Remote logs should be segregated and ideally stored on reliable and redundant storage in a manner that supports dealing with discrete event types. We are going to store logs in a directory hierarchy in order to provide this organization.
|
||||
|
||||
- re-comment the input modules from lab 1.1
|
||||

|
||||
- create a new config file call sec350.conf:
|
||||

|
||||
- copy that file to /etc/rsyslod.d/: `sudo cp sec350.conf /etc/rsyslog.d/`
|
||||
|
||||
```
|
||||
This configuration file (03-sec350.conf) will dynamically create and name files based upon hostname,
|
||||
date and process name. Input over udp 514 is associated with the RemoteDevice ruleset which in turn
|
||||
uses the dynamic template configuration called “DynFile”.
|
||||
```
|
||||
testing \
|
||||

|
||||

|
||||
|
||||
## web01: Logging Authorization Events
|
||||
Modify the rsyslog client configuration on web01 so that authentication events are forwarded to our log server. the line `authpriv.* @172.16.50.5` will send all authpriv logs to the remote server(log01)
|
||||
 \
|
||||
after sshing from rw01>web01(with failed attempts), we can see this in the sshd.log file \
|
||||

|
||||
|
||||
## fw01: Logging Authorization Events
|
||||
We are going to adjust the vyos configuration to send authentication messages from fw01 to log01. Note, vyos does produce a ton of useless authentication messages which we are going to have to deal with at some point.
|
||||
- first, [change the default password](https://git.charlotte.sh/lotte/ChamplainTechJournals/src/branch/main/net-sec-controls-sec350/week01/vyos.md#change-password) : `set system login user vyos authentication plaintext-password password123!`
|
||||
- `set system syslog host 172.16.50.5 facility authpriv level info` \
|
||||
 \
|
||||

|
||||
|
||||
|
Loading…
Add table
Add a link
Reference in a new issue