{"id":1368,"date":"2019-01-21T17:10:49","date_gmt":"2019-01-21T22:10:49","guid":{"rendered":"https:\/\/ithinkvirtual.com\/?p=1368"},"modified":"2019-02-15T14:38:19","modified_gmt":"2019-02-15T19:38:19","slug":"nsx-t-home-lab-part-1-configuring-sophos-xg-firewall","status":"publish","type":"post","link":"https:\/\/ithinkvirtual.com\/2019\/01\/21\/nsx-t-home-lab-part-1-configuring-sophos-xg-firewall\/","title":{"rendered":"NSX-T Home Lab – Part 1: Configuring Sophos XG Firewall"},"content":{"rendered":"\n
Welcome to Part 1 of my NSX-T Home Lab Series. In my previous post<\/a>, I went over the gist of what I plan to do for my nested NSX-T<\/a> Home Lab. In this post, I will cover the setup and configuration of a Sophos XG firewall Home Edition<\/a> which will serve as the router for my nested lab environment. My physical Home Lab is configured with Virtual Distributed Switches, or VDS (sometimes seen as DVS) for short, and since this is a nested lab environment that will not have any physical uplinks connected, I will need to create a new VDS without physical uplinks connected to it along with a portgroup for the nested environment and then configure access to the environment from my LAN. All traffic will flow through virtual router\/firewall to communicate to and from the nested lab.<\/p>\n\n\n\n Prerequisites:<\/strong><\/p>\n\n\n\n I have a bunch of VLANs created for my physical Home Lab as I’ve yet to deploy NSX-T in there, but once I do, I’ll be removing the majority of said VLANs and only keeping the required ones needed to run the lab. With that said, one of the VLANs I have is for “Development” work, such as this so I’ll be connecting one uplink from the router to this VLAN which will serve as the WAN interface while the other uplink will be connected to the new nested portgroup to serve as the LAN for the nested lab. I’ll describe the basics for deploying the Sophos XG firewall, but will not go into full detail as this is pretty trivial and can be deployed using the following guide<\/a> as a reference.<\/p>\n\n\n\n Once the VM has been deployed, the Sophos XG will be configured with a 172.16.1.1<\/strong> address by default. This will need to be changed to the subnet you’re using for your nested LAN interface. Login to the console with the default (admin – admin<\/strong>) credentials, and choose the option for Network Configuration to change the IP for your nested LAN port.<\/p>\n\n\n\n Once this is done, you would normally navigate to that address on port 4444<\/strong> to access the admin GUI. Unfortunately, this will not work since the LAN side has no physical uplinks. So what do we do? We need to run a command to enable admin access on the WAN port. To do so, choose option 4<\/strong> to enter the device console and enter the following command:<\/p>\n\n\n\n The WAN port is set to grab an address from DHCP so you’ll need to determine which IP address this is either by going into your physical router, or using a tool like Angry IP. Once in the Admin GUI, navigate to Administration > Device Access<\/strong> and tick the box for WAN under the HTTPS column. See this post<\/a> for reference.<\/p>\n\n\n\n Now, we can create our VLANs for our nested environment. I’m using the following for my lab:<\/p>\n\n\n\n Navigate to Networking<\/strong> and select Add Interface > VLAN<\/strong> to create each of your networks.<\/p>\n\n\n\n\n
\n
system appliance_access enable<\/pre>\n\n\n\n
VLAN<\/strong><\/span><\/td> Subnet<\/strong><\/span><\/td> Purpose<\/strong><\/span><\/td><\/tr> 110<\/td> 10.254.110.1\/24<\/td> Management<\/td><\/tr> 120<\/td> 10.254.120.1\/24<\/td> vMotion<\/td><\/tr> 130<\/td> 10.254.130.1\/24<\/td> VSAN<\/td><\/tr> 140<\/td> 10.254.140.1\/24<\/td> VM Network<\/td><\/tr> 150<\/td> 10.254.150.1\/24<\/td> Overlay<\/td><\/tr> 160<\/td> 10.254.160.1\/24<\/td> Uplink<\/td><\/tr><\/tbody><\/table>\n\n\n\n