Time
6 hours 28 minutes
Difficulty
Intermediate
CEU/CPE
7

Video Transcription

00:00
Welcome back to the savory course in building. You're in for a sec lap. I'm your host and instructor, Kevin Hernandes.
00:07
In the last month, we went over the basics of PS sense insulation. We went over I. P s what proxy and the BP and configurations that were either two models or through its own built in features.
00:24
In today's selection, we're actually gonna integrate thes pf says Locks into curator.
00:30
Now let's get started
00:33
before we actually jump into curator
00:35
and start working with it. We need to configure lock sources to send data to it.
00:40
Since we just finished working with PFC EMS. Let's go ahead and start with p f sends to send lox to curator.
00:48
It's Logan.
00:56
Here we go.
00:57
Well, it's good or two Status
01:00
system logs.
01:02
And here, you know, these are the locks itself for the system.
01:06
Now, we gotta make sure we actually forward these to our curator a place.
01:11
So
01:12
let's go ahead. Two settings and right here in the bomb,
01:19
you can see it remote, long and options.
01:22
And right here enable remote logging son locks message to remote. Sis. Look, server. This is exactly what we want to do.
01:29
So let's click on them.
01:30
And now you have a source address, right?
01:34
Protocol. And here's where we actually start to figure it out.
01:38
Remote lock servers.
01:38
I p import P port nine p port. So what does this mean? It was like we actually concerned this to three different appliances at the same time.
01:49
Now let's go here.
01:52
Creator Crump Ta ke.
01:55
Copy and paste.
01:59
You have to send everything and hit safe.
02:01
Let's give it a minute for aid to apply the ***.
02:08
Meantime, that slogan.
02:15
If
02:17
for my
02:22
slow
02:24
see you in a seven
02:34
and their ego curator is loaded,
02:46
you can see already have a notification. Tom
02:53
updates were completed.
02:57
You know, operations are unable to determine associated luxuries for I p address, unable to automatically detect
03:04
so this itself. Over here,
03:06
you can see unable to the furniture to associate it. Locks are for I P address. 192168 That one that one that is RPF sense laws.
03:15
So
03:16
if you go to admin
03:17
right here,
03:23
let's give it a minute.
03:29
Here we go.
03:30
You did lock sources.
03:34
Yes,
03:40
you see, it's nothing. And the reason it says nothing. That's because nothing has been applied?
03:46
No, She looks here
03:51
and needs to update X force and remote that we can leave that for later.
03:57
If you do want to see how to do that, you can use click and deploy changes, and it would apply.
04:01
So let's see if that long are at least being for knife here. So
04:12
let's give it a second.
04:18
You can see
04:25
here we go
04:26
that we are indeed receiving locks in curator.
04:31
You see, it's Santo's right here. She actually this might be its own.
04:36
The hard drive itself or is the scent of you see one that won three in a source I p
04:44
let me actually turn on the pointer
04:46
and right here
04:48
Source i p
04:51
It's what we get now the reasons not be recognised because most likely device, it's not fully
04:58
supported. And therefore we have to do manual configuration on itself. So you can see here
05:04
we see some interfaces, we see a block
05:09
and we see in our, uh, Mac address right here. So we do need to work with this
05:17
and the work never how we work with this sweet Raj exes,
05:20
But Reddick says will be able to incorporate this lock's properly formatted
05:26
into
05:28
aren't locked sources
05:29
or if you click next, you see it form. It's very similar.
05:36
And obviously, if we go back to the far wall
05:40
real Tu Long's you can see a very similar type of
05:45
look.
05:46
It obviously depends on what type of, um
05:53
access or what type of activity we're seeing. So, for example, here we're seeing those blocked messages right here. You can see the I. P or the source, right? F e 80.
06:04
Here we go here,
06:09
somewhere around here.
06:11
Let me go to the previous one.
06:15
Here we go, f e 80.
06:18
So this
06:19
it's this right here.
06:26
And that's how you start incorporating things into curator. Now,
06:30
in order to add additional tools there, several options we have right right here. Curator D SM configuration guide. It's one of the things you want to look at it. If you can see I visit this fairly often.
06:45
So once you click on it, you get the public to save in. You can save it.
06:48
Open it.
06:50
And here. God, this is a July 2019. Now, in here
06:56
you go see the different type of appliances, right?
06:59
that can be implementer added into curator.
07:05
I see a pass she
07:10
box blue coat a terrorist.
07:13
So let's look for PF sends
07:16
if you can see it's not there. And that's the reason what's not being
07:20
mine early? Recognize in the lock sources as earlier.
07:26
So we're gonna
07:27
give it a little look and try to configure our own luck. Sirs,
07:30
Such us this building a universal deism.
07:33
Let's go here
07:35
and you can see it's very similar to what we see, right?
07:40
So you go to the ATM. Untapped Luxor assists add luxury 1,000,000 time Universal D S N. You might pick Alexis extension, and then you start configuring it. So let's do that for Lee. Quickly
07:55
Go back here, Mark Sources.
07:58
There you go. I'm gonna go ad
08:07
Mary. Oh, look, Sir's name. You're gonna call it P F Sense
08:11
description. You call election far all the notes Sabarwal.
08:20
We'll just call it Farrell.
08:22
Luxor's time. You can see here. You do have those options we just mentioned.
08:28
You can see p of sense. It's nowhere to be found in here
08:35
so universal
08:39
to use him for now.
08:41
You see, this is long
08:43
blocks or so I've been to fire
08:46
r i p and two Naval. And in this case, since its one appliance even collector itself. Okay,
08:54
um and it's it's safe
08:58
now. Here you go. Obviously, until you don't deploy this, it might not work.
09:03
So let's go back here.
09:07
Yeah, and now it should, actually, so show that Ah, look, sirs, to be added as well
09:15
now, this takes some from 1 to 20 minutes, depending how bigger environment nous.
09:20
So let's give it a few minutes. I'll continue the lesson afterwards. After a few minutes, you can see that the bar is blue instead of yellow.
09:31
Now, if we go back to long sources
09:35
now, instead of just saying
09:37
install right against is actually success,
09:41
you can see that event right here. Last event time.
09:46
They're coming in
09:50
right there.
09:54
So if we go back to lark activity,
09:58
return to event list
10:00
and we look for the last five minutes,
10:07
you know?
10:13
Look down here.
10:15
You can see that p of sense. It's now Lock Sirs in psych Curator.
10:22
Now let's take a short break
10:24
and our next lesson will actually start configuring pf sense as a d S m
10:28
Luxor's. So what do we learn? Today? We added pf sense locks into curator and interrogated them. Asked Universal deism
10:37
in our next lesson will actually start creating costume properties for thes Luxor's that we just created
10:43
hope to see you soon. Have a great day.

Up Next

Building an InfoSec Lab

This course will guide you through the basics of incorporating several Information Security Engineering Tools in your home and/or lab. By building this lab you will be able to obtain corporate-level security within your home network, as well as a higher understanding of the capabilities and advantages these tools bring to your network.

Instructed By

Instructor Profile Image
Kevin Hernandez
Instructor