By the end of this module, you will be able to:
● Configure an Edge router to establish a secure and functional network environment.
● Assign static IP addresses to a variety of devices, including vulnerable web applications and test machines.
● Understand the role of each device in a penetration testing lab setup.
● Ensure proper network segmentation and connectivity between all components.
In this hands-on networking and security lab setup, you will learn:
● How to access and configure an Edge router for internal lab use.
● The process of assigning IP addresses to the following devices:
1. OWASP Juice Shop – a vulnerable web application for security testing.
2. BWAPP – buggy web application for practicing web vulnerabilities.
3. PHPAC – PHP Attack Controller for simulating attacks.
4. Metasploitable – intentionally vulnerable machine for exploit testing.
5. Web-SRV1 & Web-SRV2 – web servers hosting test applications.
6. Remote-PC1 – remote access machine for simulating external threats.
7. PC1, PC2, PC3 – standard user endpoints for testing lateral movement and access control.
● Best practices for IP address planning and subnetting in a lab environment.
● How to verify connectivity and troubleshoot basic network issues.