◼️
General Knowledge
  • Introduction
  • Building a Home Lab
  • Certification Roadmap
  • Basics
    • Basic Networking
    • Basic Gigamon Configuration
  • Firewalls
    • PFSense
    • Cisco ASA
  • Hardware Setup and Device Networking
    • Cisco Device
    • MaxVision Servers
    • Gigamon
  • Reporting
    • Network Activity Report (NAR)
    • Network Change Request (NCR)
    • Redmine
  • DCO Tools
    • Splunk
      • Threat Hunting with Splunk
    • Security Onion 2.4
      • Threat Hunting with Security Onion
    • OsQuery
  • Methodology
    • Gather Information
    • Gather Documents
    • Prepare Equipment and Team Procedures
    • Conduct Network Reconnaissance
    • MITTRE ATT&CK Framework
    • Considerations when Recommending Remedial Action
    • Document Everything
    • Defensive Cyber Operations Checklist
  • Requirements
    • Power Requirements
    • Port Density Requirements
    • Opened Port Requirements
  • Building a Virtual Testing Environment
    • Identify Requirements
    • Gather Equipment and tools
    • Initial Draft
    • Building the Environment
    • Example
Powered by GitBook
On this page
  • Introduction
  • IP Schema
  • Routing and Firewalls
  1. Building a Virtual Testing Environment

Initial Draft

Introduction

Once you've gathered all the equipment and scoped out what is required, it's time to make an initial draft of what you want your environment to look like. Personally, I like to draw this out as a network map including as much as I can. IP schema, Workstation Names, Routing, Firewalls, etc.

IP Schema

Usually, we use only private IP's so you can use whatever ones you want. Just make sure it's clearly laid out and you go over it with someone so it makes sense and is not interfeering with other people's equipment.

Routing and Firewalls

There is plenty of open-source routing/firewall software. Personally, I like PFsense, but you can choose whatever you want.

PreviousGather Equipment and toolsNextBuilding the Environment

Last updated 1 year ago