Range Management

Managing existing ranges deployed within your Cyber Ranges account.

Range and System States

Your deployed ranges can be in any number of states. When you first launch a range environment, your range will appear in a Launching state. From here, Cyber Ranges allows you to easily Start, Stop, Snapshot, Revert, and Template a range and its individual systems.

Launching

  • The infrastructure for your range is deploying
  • You cannot manage or otherwise interact with the range in this state

Starting

  • At least one system in the range, or the individual system, is powering on
  • You cannot manage individual systems while they are starting

Running

  • At least one system in your range environment is fully powered on
  • You can manage range/system settings and snapshots in this state
  • You can stop the range/system from this state

Stopping

  • The range or individual system is powering off
  • You cannot manage individual systems while they are stopping

Stopped

  • The range or system is deployed but powered off
  • You can manage range/system settings and snapshots in this state
  • You can start the range/system from this state

Snapshotting

  • The system or range is saving its state with a snapshot of the disk(s)
  • You cannot manage individual systems while they are snapshotting

Reverting

  • The system or range is restoring itself to a previously saved state
  • You cannot manage the individual systems while they are reverting

Power Functions

There are three important functions which control the power state of your ranges and individual systems: Start, Stop, and Reboot.

Start

  • Starting the range will power on every individual system in the environment
  • Starting an individual system will only power on that system, but your range will be in the running state

Stop

  • Stopping the range will power off every individual system in the environment
  • Stopping an individual system will only power off that system and your range will remain in a running state

Reboot

  • Rebooting the range will power cycle every individual system in the environment
  • Rebooting an individual system will only power cycle that system
  • Rebooting does not affect the state of either the range or it's individual systems
  • Systems which are rebooting will display as running in the range dashboard

Accessing your Ranges

Cyber Ranges provides convenient access to the systems running in your range environments. Users can connect directly through the browser with Console Sessions, or they can connect their own systems with a VPN connection.

Console Sessions

You can access range systems directly through your browser by clicking the "console" button on any system visible in the dashboard. This grants administrative/root access via RDP, VNC, or SSH depending on the operating system. You can also run multiple concurrent console sessions to work in multiple range systems simultaneously.

πŸ“˜

Share Files via Console Sessions

Users can easily copy/paste and share files between range systems and their host devices through Console Sessions.

To upload files - press the CTRL-Shift-ALT key combination and select the Share Drive, then Upload Files.

To download files from Windows systems, drag and drop your desired files to the Download folder in the Guacamole drive. To download on Linux, press the CTRL-Shift-ALT key combination, select the Share Drive, then double click on your desired file.

Range Applications

Users can access web applications running within the range environment directly through their browser via range applications. These are configured, managed, and accessed via the Applications tab within deployed range environments.

Applications currently only support web-based applications. They can also support Basic Authentication for browsing sessions.

VPN Connections

Every Cyber Ranges user can manage up to 4 VPN configuration files for each range environment they have access to. These configuration files can provide two separate types of access: Admin or Attacker. You also have the option to create configuration files designed for Windows or Linux/MacOS VPN clients.

🚧

Sharing VPN Configs

VPN Configurations created for your range environment only support one concurrent connection. This means if you share your configuration with another user, only one of you will be able to connect at a time.

To invite others to your range environment, see User Management.

Any VPN client that is compatible with OpenVPN configuration files works, but we suggest using the OpenVPN Client.

Admin VPN Configurations

  • These configurations are intended to provide access to every system in your range environment
  • They allow you to connect even segmented areas of the range network in our featured templates

Attacker VPN Configurations

  • These configurations are intended to provide a limited or external view of the network within the range.
  • In our featured templates, connecting with this type of configuration will provide equivalent access to the Kali (Attacker) system

Managing VPN Configs

  • To create configurations, navigate to the VPN tab for your range and provide a Config Name, Access Type, and Operating System Type. Then Create your certificate
  • Once a configuration is created, you may Download or Revoke the configuration
  • Revoking a configuration file will remove access for that configuration, and disconnect any active sessions

What’s Next