{"id":93,"date":"2022-04-03T16:14:42","date_gmt":"2022-04-03T20:14:42","guid":{"rendered":"https:\/\/opentextbc.ca\/fortigatefirewall\/chapter\/destination-nat\/"},"modified":"2023-08-29T17:39:02","modified_gmt":"2023-08-29T21:39:02","slug":"destination-nat","status":"publish","type":"chapter","link":"https:\/\/opentextbc.ca\/fortigatefirewall\/chapter\/destination-nat\/","title":{"raw":"3.2 Destination NAT","rendered":"3.2 Destination NAT"},"content":{"raw":"<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Learning Objectives<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul>\r\n \t<li style=\"font-weight: 400;\">Create a virtual IP address<\/li>\r\n \t<li style=\"font-weight: 400;\">Create a Destination NAT<\/li>\r\n \t<li>Create a Port Forwarding<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n<div class=\"textbox shaded\"><strong>Scenario<\/strong>: We are going to enable Destination NAT (DNAT) and able to reach WordPress from WebTerm1. That means if someone from WebTerm1 opens the browser and types http:\/\/10.10.10.1 should be able to reach WordPress.<\/div>\r\n\r\n[caption id=\"attachment_76\" align=\"aligncenter\" width=\"1125\"]<img class=\"wp-image-76 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2022\/04\/5.jpg\" alt=\"Destination NAT Main scenario\" width=\"1125\" height=\"525\" \/> Figure 3.8: Main scenario[\/caption]\r\n<h2>VIP (Virtual IP address)<\/h2>\r\nGo to <strong>Policy Objects<\/strong> &gt; <strong>Virtual IPs<\/strong> and Create a new Virtual IP:\r\n<ul>\r\n \t<li>Name: <strong>outsideToDMZ<\/strong><\/li>\r\n \t<li>Interface: <strong>Port 4<\/strong><\/li>\r\n \t<li>External IP address: <strong>10.10.10.1<\/strong><\/li>\r\n \t<li>Mapped IP address: <strong>192.168.1.X <\/strong>(Find the local IP address of your WordPress)<\/li>\r\n \t<li>Enable Port Forwarding:\r\n<ul>\r\n \t<li>External Service Port:<strong> TCP 80\u00a0 <\/strong><\/li>\r\n \t<li>Map to Port:<strong> TCP 80<\/strong><\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n[caption id=\"attachment_76\" align=\"aligncenter\" width=\"500\"]<img class=\"wp-image-85\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2022\/03\/12.jpg\" alt=\"Configure Virtual IP\" width=\"500\" height=\"353\" \/> Figure 3.9: Configure Virtual IP[\/caption]\r\n<h2>Create a Firewall Policy<\/h2>\r\nYou will create a new firewall policy to match a specific source, destination, service, and action set to Accept.\r\n<div align=\"left\">\r\n<table class=\"aligncenter\" style=\"width: 100%;\"><caption>Table 3.2: Firewall policy configuration<\/caption>\r\n<tbody>\r\n<tr style=\"height: 18px;\">\r\n<th style=\"height: 18px; width: 161.962px;\" scope=\"col\">Field<\/th>\r\n<th style=\"height: 18px; width: 303.438px;\" scope=\"col\">Value<\/th>\r\n<\/tr>\r\n<tr style=\"height: 18px;\">\r\n<td style=\"height: 18px; width: 161.962px;\">Name<\/td>\r\n<td style=\"height: 18px; width: 303.438px;\">Outside-DMZ<\/td>\r\n<\/tr>\r\n<tr style=\"height: 18px;\">\r\n<td style=\"height: 18px; width: 161.962px;\">Incoming Interface<\/td>\r\n<td style=\"height: 18px; width: 303.438px;\">Port 4<\/td>\r\n<\/tr>\r\n<tr style=\"height: 18px;\">\r\n<td style=\"height: 18px; width: 161.962px;\">Outgoing Interface<\/td>\r\n<td style=\"height: 18px; width: 303.438px;\">Port 2<\/td>\r\n<\/tr>\r\n<tr style=\"height: 18px;\">\r\n<td style=\"height: 18px; width: 161.962px;\">Source<\/td>\r\n<td style=\"height: 18px; width: 303.438px;\">All<\/td>\r\n<\/tr>\r\n<tr style=\"height: 18px;\">\r\n<td style=\"height: 18px; width: 161.962px;\">Destination<\/td>\r\n<td style=\"height: 18px; width: 303.438px;\">Select your VIP Name (outsideToDMZ)<\/td>\r\n<\/tr>\r\n<tr style=\"height: 18px;\">\r\n<td style=\"height: 18px; width: 161.962px;\">Schedule<\/td>\r\n<td style=\"height: 18px; width: 303.438px;\">Always<\/td>\r\n<\/tr>\r\n<tr style=\"height: 18px;\">\r\n<td style=\"height: 18px; width: 161.962px;\">Service<\/td>\r\n<td style=\"height: 18px; width: 303.438px;\">HTTP<\/td>\r\n<\/tr>\r\n<tr style=\"height: 18px;\">\r\n<td style=\"height: 18px; width: 161.962px;\">Action<\/td>\r\n<td style=\"height: 18px; width: 303.438px;\">ACCEPT<\/td>\r\n<\/tr>\r\n<tr style=\"height: 18px;\">\r\n<td style=\"height: 18px; width: 161.962px;\">Log Violation Traffic<\/td>\r\n<td style=\"height: 18px; width: 303.438px;\">&lt;enable&gt;<\/td>\r\n<\/tr>\r\n<tr style=\"height: 18px;\">\r\n<td style=\"height: 18px; width: 161.962px;\">Enable this policy<\/td>\r\n<td style=\"height: 18px; width: 303.438px;\">&lt;enable&gt;<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<\/div>\r\nClick <strong>OK<\/strong> to save the changes.\r\n\r\n[caption id=\"attachment_76\" align=\"aligncenter\" width=\"500\"]<img class=\"wp-image-86\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/13.jpg\" alt=\"Set Firewall Policy\" width=\"500\" height=\"359\" \/> Figure 3.10: Set Firewall Policy[\/caption]\r\n\r\nTo confirm traffic matches, go to WebTerm1, open the browser and type http:\/\/10.10.10.1 in the browser. You should be able to reach WordPress.\r\n\r\n[caption id=\"attachment_76\" align=\"aligncenter\" width=\"500\"]<img class=\"wp-image-87\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/14.jpg\" alt=\"You should be able to reach WordPress\" width=\"500\" height=\"357\" \/> Figure 3.11: Verify configuration[\/caption]\r\n<h2>Port Forwarding<\/h2>\r\n[caption id=\"attachment_76\" align=\"aligncenter\" width=\"1125\"]<img class=\"wp-image-76 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2022\/04\/5.jpg\" alt=\"main scenario\" width=\"1125\" height=\"525\" \/> Figure 3.12: Main scenario[\/caption]\r\n<ol>\r\n \t<li>Set the interface of Kali as a DHCP client and enable SSH in Kali. To enable SSH in Kali type Figure 3.13 command:\r\n\r\n[caption id=\"attachment_89\" align=\"aligncenter\" width=\"530\"]<img class=\"wp-image-88 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/15.jpg\" alt=\"To enable SSH in Kali user service ssh start\" width=\"530\" height=\"143\" \/> Figure 3.13: Enable SSH service in Kali[\/caption]\r\n\r\n[caption id=\"attachment_89\" align=\"aligncenter\" width=\"758\"]<img class=\"wp-image-89 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/16.jpg\" alt=\"Verify you've received an IP address from DHCP\" width=\"758\" height=\"212\" \/> Figure 3.14: Verify you've received an IP address from DHCP[\/caption]<\/li>\r\n \t<li>Repeat the previous steps we have done for DNAT and try to reach Kali from port 8080 (Port Forwarding: 8080 \u2192 22)\r\n\r\n[caption id=\"attachment_91\" align=\"aligncenter\" width=\"1094\"]<img class=\"wp-image-90 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/17.jpg\" alt=\"Map External port 8080 to local port 22\" width=\"1094\" height=\"617\" \/> Figure 3.15: Map External port 8080 to local port 22[\/caption]\r\n\r\n[caption id=\"attachment_91\" align=\"aligncenter\" width=\"843\"]<img class=\"wp-image-91 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/18.jpg\" alt=\"Set Firewall Policy\" width=\"843\" height=\"588\" \/> Figure 3.16: Set Firewall Policy[\/caption]<\/li>\r\n \t<li>Verify your connection from WebTerm (<strong>Hint:<\/strong> ssh user@10.10.10.1 -p 8080).\r\n\r\n[caption id=\"attachment_92\" align=\"aligncenter\" width=\"814\"]<img class=\"wp-image-92 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/20.jpg\" alt=\"Verify SSH connection\" width=\"814\" height=\"512\" \/> Figure 3.17: Verify SSH connection[\/caption]<\/li>\r\n<\/ol>","rendered":"<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li style=\"font-weight: 400;\">Create a virtual IP address<\/li>\n<li style=\"font-weight: 400;\">Create a Destination NAT<\/li>\n<li>Create a Port Forwarding<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"textbox shaded\"><strong>Scenario<\/strong>: We are going to enable Destination NAT (DNAT) and able to reach WordPress from WebTerm1. That means if someone from WebTerm1 opens the browser and types http:\/\/10.10.10.1 should be able to reach WordPress.<\/div>\n<figure id=\"attachment_76\" aria-describedby=\"caption-attachment-76\" style=\"width: 1125px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-76 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2022\/04\/5.jpg\" alt=\"Destination NAT Main scenario\" width=\"1125\" height=\"525\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/5.jpg 1125w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/5-300x140.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/5-1024x478.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/5-768x358.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/5-65x30.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/5-225x105.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/5-350x163.jpg 350w\" sizes=\"auto, (max-width: 1125px) 100vw, 1125px\" \/><figcaption id=\"caption-attachment-76\" class=\"wp-caption-text\">Figure 3.8: Main scenario<\/figcaption><\/figure>\n<h2>VIP (Virtual IP address)<\/h2>\n<p>Go to <strong>Policy Objects<\/strong> &gt; <strong>Virtual IPs<\/strong> and Create a new Virtual IP:<\/p>\n<ul>\n<li>Name: <strong>outsideToDMZ<\/strong><\/li>\n<li>Interface: <strong>Port 4<\/strong><\/li>\n<li>External IP address: <strong>10.10.10.1<\/strong><\/li>\n<li>Mapped IP address: <strong>192.168.1.X <\/strong>(Find the local IP address of your WordPress)<\/li>\n<li>Enable Port Forwarding:\n<ul>\n<li>External Service Port:<strong> TCP 80\u00a0 <\/strong><\/li>\n<li>Map to Port:<strong> TCP 80<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<figure id=\"attachment_76\" aria-describedby=\"caption-attachment-76\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2022\/03\/12.jpg\" alt=\"Configure Virtual IP\" width=\"500\" height=\"353\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/03\/12.jpg 853w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/03\/12-300x212.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/03\/12-768x543.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/03\/12-65x46.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/03\/12-225x159.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/03\/12-350x247.jpg 350w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption id=\"caption-attachment-76\" class=\"wp-caption-text\">Figure 3.9: Configure Virtual IP<\/figcaption><\/figure>\n<h2>Create a Firewall Policy<\/h2>\n<p>You will create a new firewall policy to match a specific source, destination, service, and action set to Accept.<\/p>\n<div style=\"text-align: left;\">\n<table class=\"aligncenter\" style=\"width: 100%;\">\n<caption>Table 3.2: Firewall policy configuration<\/caption>\n<tbody>\n<tr style=\"height: 18px;\">\n<th style=\"height: 18px; width: 161.962px;\" scope=\"col\">Field<\/th>\n<th style=\"height: 18px; width: 303.438px;\" scope=\"col\">Value<\/th>\n<\/tr>\n<tr style=\"height: 18px;\">\n<td style=\"height: 18px; width: 161.962px;\">Name<\/td>\n<td style=\"height: 18px; width: 303.438px;\">Outside-DMZ<\/td>\n<\/tr>\n<tr style=\"height: 18px;\">\n<td style=\"height: 18px; width: 161.962px;\">Incoming Interface<\/td>\n<td style=\"height: 18px; width: 303.438px;\">Port 4<\/td>\n<\/tr>\n<tr style=\"height: 18px;\">\n<td style=\"height: 18px; width: 161.962px;\">Outgoing Interface<\/td>\n<td style=\"height: 18px; width: 303.438px;\">Port 2<\/td>\n<\/tr>\n<tr style=\"height: 18px;\">\n<td style=\"height: 18px; width: 161.962px;\">Source<\/td>\n<td style=\"height: 18px; width: 303.438px;\">All<\/td>\n<\/tr>\n<tr style=\"height: 18px;\">\n<td style=\"height: 18px; width: 161.962px;\">Destination<\/td>\n<td style=\"height: 18px; width: 303.438px;\">Select your VIP Name (outsideToDMZ)<\/td>\n<\/tr>\n<tr style=\"height: 18px;\">\n<td style=\"height: 18px; width: 161.962px;\">Schedule<\/td>\n<td style=\"height: 18px; width: 303.438px;\">Always<\/td>\n<\/tr>\n<tr style=\"height: 18px;\">\n<td style=\"height: 18px; width: 161.962px;\">Service<\/td>\n<td style=\"height: 18px; width: 303.438px;\">HTTP<\/td>\n<\/tr>\n<tr style=\"height: 18px;\">\n<td style=\"height: 18px; width: 161.962px;\">Action<\/td>\n<td style=\"height: 18px; width: 303.438px;\">ACCEPT<\/td>\n<\/tr>\n<tr style=\"height: 18px;\">\n<td style=\"height: 18px; width: 161.962px;\">Log Violation Traffic<\/td>\n<td style=\"height: 18px; width: 303.438px;\">&lt;enable&gt;<\/td>\n<\/tr>\n<tr style=\"height: 18px;\">\n<td style=\"height: 18px; width: 161.962px;\">Enable this policy<\/td>\n<td style=\"height: 18px; width: 303.438px;\">&lt;enable&gt;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>Click <strong>OK<\/strong> to save the changes.<\/p>\n<figure id=\"attachment_76\" aria-describedby=\"caption-attachment-76\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-86\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/13.jpg\" alt=\"Set Firewall Policy\" width=\"500\" height=\"359\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/13.jpg 844w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/13-300x215.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/13-768x551.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/13-65x47.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/13-225x162.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/13-350x251.jpg 350w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption id=\"caption-attachment-76\" class=\"wp-caption-text\">Figure 3.10: Set Firewall Policy<\/figcaption><\/figure>\n<p>To confirm traffic matches, go to WebTerm1, open the browser and type http:\/\/10.10.10.1 in the browser. You should be able to reach WordPress.<\/p>\n<figure id=\"attachment_76\" aria-describedby=\"caption-attachment-76\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/14.jpg\" alt=\"You should be able to reach WordPress\" width=\"500\" height=\"357\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/14.jpg 1253w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/14-300x214.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/14-1024x731.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/14-768x549.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/14-65x46.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/14-225x161.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/14-350x250.jpg 350w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption id=\"caption-attachment-76\" class=\"wp-caption-text\">Figure 3.11: Verify configuration<\/figcaption><\/figure>\n<h2>Port Forwarding<\/h2>\n<figure id=\"attachment_76\" aria-describedby=\"caption-attachment-76\" style=\"width: 1125px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-76 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2022\/04\/5.jpg\" alt=\"main scenario\" width=\"1125\" height=\"525\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/5.jpg 1125w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/5-300x140.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/5-1024x478.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/5-768x358.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/5-65x30.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/5-225x105.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/5-350x163.jpg 350w\" sizes=\"auto, (max-width: 1125px) 100vw, 1125px\" \/><figcaption id=\"caption-attachment-76\" class=\"wp-caption-text\">Figure 3.12: Main scenario<\/figcaption><\/figure>\n<ol>\n<li>Set the interface of Kali as a DHCP client and enable SSH in Kali. To enable SSH in Kali type Figure 3.13 command:<br \/>\n<figure id=\"attachment_89\" aria-describedby=\"caption-attachment-89\" style=\"width: 530px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/15.jpg\" alt=\"To enable SSH in Kali user service ssh start\" width=\"530\" height=\"143\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/15.jpg 530w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/15-300x81.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/15-65x18.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/15-225x61.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/15-350x94.jpg 350w\" sizes=\"auto, (max-width: 530px) 100vw, 530px\" \/><figcaption id=\"caption-attachment-89\" class=\"wp-caption-text\">Figure 3.13: Enable SSH service in Kali<\/figcaption><\/figure>\n<figure id=\"attachment_89\" aria-describedby=\"caption-attachment-89\" style=\"width: 758px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-89 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/16.jpg\" alt=\"Verify you've received an IP address from DHCP\" width=\"758\" height=\"212\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/16.jpg 758w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/16-300x84.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/16-65x18.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/16-225x63.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/16-350x98.jpg 350w\" sizes=\"auto, (max-width: 758px) 100vw, 758px\" \/><figcaption id=\"caption-attachment-89\" class=\"wp-caption-text\">Figure 3.14: Verify you&#8217;ve received an IP address from DHCP<\/figcaption><\/figure>\n<\/li>\n<li>Repeat the previous steps we have done for DNAT and try to reach Kali from port 8080 (Port Forwarding: 8080 \u2192 22)<br \/>\n<figure id=\"attachment_91\" aria-describedby=\"caption-attachment-91\" style=\"width: 1094px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-90 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/17.jpg\" alt=\"Map External port 8080 to local port 22\" width=\"1094\" height=\"617\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/17.jpg 1094w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/17-300x169.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/17-1024x578.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/17-768x433.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/17-65x37.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/17-225x127.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/17-350x197.jpg 350w\" sizes=\"auto, (max-width: 1094px) 100vw, 1094px\" \/><figcaption id=\"caption-attachment-91\" class=\"wp-caption-text\">Figure 3.15: Map External port 8080 to local port 22<\/figcaption><\/figure>\n<figure id=\"attachment_91\" aria-describedby=\"caption-attachment-91\" style=\"width: 843px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/18.jpg\" alt=\"Set Firewall Policy\" width=\"843\" height=\"588\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/18.jpg 843w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/18-300x209.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/18-768x536.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/18-65x45.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/18-225x157.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/18-350x244.jpg 350w\" sizes=\"auto, (max-width: 843px) 100vw, 843px\" \/><figcaption id=\"caption-attachment-91\" class=\"wp-caption-text\">Figure 3.16: Set Firewall Policy<\/figcaption><\/figure>\n<\/li>\n<li>Verify your connection from WebTerm (<strong>Hint:<\/strong> ssh user@10.10.10.1 -p 8080).<br \/>\n<figure id=\"attachment_92\" aria-describedby=\"caption-attachment-92\" style=\"width: 814px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/20.jpg\" alt=\"Verify SSH connection\" width=\"814\" height=\"512\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/20.jpg 814w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/20-300x189.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/20-768x483.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/20-65x41.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/20-225x142.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/20-350x220.jpg 350w\" sizes=\"auto, (max-width: 814px) 100vw, 814px\" \/><figcaption id=\"caption-attachment-92\" class=\"wp-caption-text\">Figure 3.17: Verify SSH connection<\/figcaption><\/figure>\n<\/li>\n<\/ol>\n","protected":false},"author":124,"menu_order":4,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-93","chapter","type-chapter","status-publish","hentry"],"part":75,"_links":{"self":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/93","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/users\/124"}],"version-history":[{"count":2,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/93\/revisions"}],"predecessor-version":[{"id":560,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/93\/revisions\/560"}],"part":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/parts\/75"}],"metadata":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/93\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/media?parent=93"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapter-type?post=93"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/contributor?post=93"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/license?post=93"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}