Lab 4: Putting It All Together¶
🚧 Under Construction 🛠️¶
This lab is still under construction, but mostly finished. If you feel confident in your skills, feel free to continue below, just know it may not be 100% correct.
Overview¶
In this lab, we will take everything we've learned so far and integrate it into a complete network setup. This includes reloading the firewall and switch configurations, connecting the firewall to the switch, confirming DHCP servers, configuring VLANs, and setting up policies to control network traffic.
Step 1: Preparing for Configuration¶
- Disconnect the firewall LAN cable going into
SW01. - Plug your PC directly into the firewall LAN port for initial configuration.
Step 2: Restore Firewall from Baseline¶
-
Log into the firewall using default settings.
- Use
ipconfigin CMD to check if you received an IP in the defaults. - If no IP is received, adjust your NIC settings or reset the firewall.
Credentials Reset
User accounts are not stored within the firewall configuration file, but rather the firebox itself. That means the credentials we configured in the last lab won't be there because we reset the firewall for other users. You will need to use the default firebox credentials to get connected. While you can review them on the Network Information page, they are also just "good to know" in general.
- Use
-
Use WatchGuard System Manager (WSM) to connect to the device with default settings.
- Launch Policy Manager.
- Restore the baseline configuration:
- Go to
File > Open > Configuration File(Select "No" to saving current config). - Navigate to the Baseline Config and open it.
- Go to
- Save the restored config to the firewall:
File > Save > To Firebox- Use default admin credentials.
- Cancel save location.
- Select Yes to IP address mismatch.
- Select No to saving changes.
- Renew IP lease:
- Run
ipconfig /renewto confirm a new IP from the LAN port.
- Run
- Disconnect from WSM, as IP addresses have now changed.
Step 3: Restore Switch Configuration¶
- Move your PC's uplink from the firewall to
GE12on SW01.- Keep the firewall LAN unplugged for now to prevent DHCP issues.
- Set NIC settings for default Cisco login and create a temporary account.
- Restore SW01 config from baseline.
- Connectivity will be lost due to IP changes
Step 4: Connect Devices¶
- Connect SW01 to NIE-LAB-T45-PAX8 by uplinking the LAN interface to switchport
GE01. - Set NIC to DHCP.
- Renew IP lease:
- Run
ipconfig /renewand confirm DHCP-assigned address. - Verify that the default gateway is now pointing to the firewall.
- Run
- Ping switch IP to confirm connectivity.
- Plug PC01 into switch
GE13and power it on.- Confirm it receives an IP via DHCP.
- If needed, adjust NIC settings.
- Test pinging between devices:
- If you are using your NIE provided laptop, the built-in firewall may block incoming ICMP traffic, but you should be able to ping outbound. That means you should be able to ping other devices, but other devices may not be able to ping you.
Step 5: Adjust VLANs¶
- Sign into SW01 and save the restored config.
- Set
GE13to the SECURITY VLAN by setting the Access VLAN to 20. - Check connectivity:
- Run
ipconfig
- Run
-
Bounce the port to force a new lease:
- Go to
Port Management > Port Settings. - Select
GE13and edit. - Set
Administrative Statusto Down, then apply. - Set
Administrative Statusto Up, then apply.
Bouncing Ports on Switches
Sometimes a "logical layer" reconnect (like
ipconfig /renew) is not enough for a device to pick up it's network changes . The best way to force it is to unplug the cable from the switch or the device and then plug it back into the NIC. In Cisco IOS we can accomplish the same by administratively shutting down the port and turning it back on again.If you've used the Cisco CLI then this is the equivalent of issuing a
shutdownandno shutdown(or more commonly referred to as ashutandno shut) command to an interface. - Go to
-
Run
ipconfigagain onPC01.- Confirm it now has an IP in VLAN 20 from the firewall via DHCP.
- Test connectivity:
- Ping from your PC to
PC01—it should fail due to firewall rules.
- Ping from your PC to
Step 6: Check Firewall Traffic¶
- Launch WatchGuard System Manager.
- Open the Traffic Monitor.
- Filter by
PC01's IP address. - Ping
PC01again from your PC. - You should see
Denyattempts in the Traffic Monitor. - This confirms that ICMP traffic from LAN to the Security VLAN is blocked.
Step 7: Create a Policy to Allow VLAN Traffic¶
- Open Policy Manager.
-
Create a new policy:
Press the+button in the ribbon menu to add a new policy and selectPacket Filter > Ping- Name: ALLOW-PING-FROM-LAN-TO-SECURITY
From: LANTo: SECURITY- Configure logging on the Policy so that we can review the traffic in the future.
- Select the Properties tab along the top
- Click the Logging button
- Check the boxes for
send log messageandsend a log message for reportsthen select OK.
- Click OK to save the policy
-
Move the policy above the default Ping rule so it takes precedence.
-
Save and apply the policy to the firewall.
Auto Order Mode
Policy Manager may automatically detect and re-order the policies for you within policy manager. While semi-helpful, it prevents you from being able to make adjustments to the order yourself. Since firewalls process ACLs starting from the top down, this may be an issue when needing to override the order of policies.
To disable this, select
view > Auto-Order Mode > Uncheck. Now you should be able to drag policies to re-order how they process.
Step 8: Test Again¶
- Reopen Traffic Monitor and filter for
PC01. - Ping
PC01again.- You should now see Allowed traffic instead of Denied.
- The logs should reference ALLOW-PING-FROM-LAN-TO-SECURITY.
Step 9: Restrict Policy Scope¶
By default, this policy allows all LAN devices to reach the SECURITY VLAN. Instead, we will restrict access to a single device.
- Open Policy Manager.
- Set up a DHCP Reservation for your PC on the LAN.
- Go to
Network Configuration > VLAN > LAN. - Add a Reserved Address:
- Name: Use your PC’s hostname (
hostnamecommand in CMD). - IP Address: Assign
192.168.10.100. - MAC Address: Get the Ethernet adapter MAC (
ipconfig /all). It's the physical address for the NIC adapter you're plugged in to.
- Name: Use your PC’s hostname (
- Go to
- Create an Alias for this device:
- Go to
Setup > Aliases > Add. - Name: Match your PC hostname or reserved IP.
- Add Member: Choose Host IPv4 and enter
192.168.10.100.
- Go to
- Modify the Ping Policy:
- Remove LAN from the
Frombox. - Add the Alias you just created instead.
- Rename the policy to ALLOW-PING-FROM-PC-TO-SECURITY.
- Save and apply the updated configuration.
- Remove LAN from the
Step 10: Final Testing¶
- Renew your IP lease:
- Run
ipconfig /renew. - Verify that your PC has
192.168.10.100.
- Run
- Test pinging
PC01—it should work. - Test changing your IP manually:
- Assign a different IP in the LAN subnet.
- Set the gateway to the firewall.
- Ping
PC01—it should fail!- This confirms that only the reserved PC is allowed to communicate with the Security VLAN.