Objectives In this lab, the students will examine the following objectives. The use of Flow Analysis Port Scan to determine the open ports on routers or hosts Discovery of network vulnerabilities and mitigation of possible threats Scenario A small company is using the topology shown below. Minimal security measures have been implemented. Possible vulnerabilities need to be discovered in any of the devices used in the network architecture. This includes routers, switches, and workstations. Topology The last page of the Lab Assignment document contains a full-page Topology.
Remove this page and use it for reference to the topology and the IP addresses. Initial SEC450 Projects Preparation In the Week 1 iLab content item, open the file SEC450_OpNet_iLab_Preparation. docx. As described in this document, use Windows Explorer in the Citrix iLab Environment to copy the G:\OPNET\SEC450 projects directory to the F:\op_models directory. Initial OpNet Preparation The Week 1 iLab is entitled Security Testing. The following steps show how to create the project required for the Week 1 iLab. Log into the Citrix iLab Environment (lab. devry. edu).
Click on the OpNet 17 icon. Click the Accept button to Open OpNet 17. Click File/Open and navigate to the F:\op_models\SEC450\SEC450. project\SEC450 file and click Open. In OpNet 17 with the SEC450 project open, click File/Save As. Save the project in the F:\op_models\SEC450 directory as SecurityTesting. You are now ready to begin the Security Testing iLab with a project called SecurityTesting. Initial Configuration The Dallas and Chicago Router’s FastEthernet and Serial interfaces used for the lab have been correctly configured and enabled. Unused interfaces have been shutdown.
The Essay on Mattson Project Delta Innovation Project Report
In recent years management in corporations outside of software development, in addition to engineers of inventions, such as in the biotech and pharmaceutical industries, have adapted innovation within their fields to the latest trends in creativity. Both Open Source and Extreme Programming initially proved to be key in software development and the respective success of each in areas outside of ...
The RIP routing tables are complete for all routers and hosts. No ACLs have been applied to any of the routers. Lab Data Collection and Submission Download and open the lab document file: SEC450_SecurityTesting_Report. docx. Enter your name and date at the top of the lab document. As you complete each task of the lab assignment, copy all relevant configuration information, web reports, tables, answered questions, and captured screenshots (as specified in the iLab assignment) into this lab document. You will submit the completed SEC450_SecurityTesting_Report.
docx file into the this week’s eCollege iLab Dropbox. Note: RED text indicates the required capture of commands or windows from the OpNet program into your lab document. All completed tables and answered questions in the lab assignment must be transferred to your submitted lab document. Task 1—Verify Connectivity between Router and Hosts Right click on the ISP Router and select OpenVirtualCLI. In the CLI window for the ISP Router, execute the commands to verify the settings on the interfaces and display the routing table. Note: Use show ip interface brief to check the interfaces.
Complete the table below based on the dynamic routes displayed in the routing table. Routing protocol Destination Network Metric Outbound Interface Verify connectivity between the ISP Router and the Dallas and Chicago Host and Server PCs by pinging their IP addresses from the Virtual CLI. Select the Task 1 commands in the Virtual CLI using the mouse. Click on the Copy button. Use V to paste the commands into your lab document. Task 2—Flow Analysis Security Port Scans We will perform a Flow Analysis Port Scan to see what TCP and UDP ports might be open.
Open ports that are not being used should be disabled because they allow a possible entry point into the network for unauthorized users. Open Flow Analysis on the Menu bar and select Security/Port Scan Analysis/Perform Analysis. In the Import zones dialog that appears, the Select zone to address mapping file: text box should have a value of F:\op_models\SecurityZones. gdf. If it doesn’t appear, type this value in the text box. Click Next. In the Select interested zones dialog, include the Dallas_Host, Dallas_Server, and Public_Server zones. Click Next.
The Term Paper on Public Relations
Public relations is the process used by businesses or organizations to present the most favorable image for them to the public. It is the responsibility for public relations professionals to provide carefully crafted information to the target audience about the individual, its goals and accomplishments, and any thing else that may be of public interest. The public relations professional also helps ...
In the Select zone pairs to analyze dialog, check the Scan across all zone pairs option, and click Next. In the Reporting Options dialog, ensure that an Output folder on your F:\ drive is specified. Click the Run button to begin the network scan. A Port Scan Analysis web page report will appear. Expand the Global Tables tree option, and click Summary. In the Port Scan Summary, you will see all permitted services between the Dallas_Host, Dallas_Server, and Public_Server zones. Open the Permitted services links Public_Server->Dallas_Host and Public_Server->Dallas_Server.
Note the TCP and UDP port numbers that are open. Use to capture the Public_Server->Dallas_Host and the Public_Server->Dallas_Server windows, and use V to paste the two captured windows into your lab document. What are the UDP and TCP ports that are permitted in traffic from the Public_Server to the Dallas_Host? What are the UDP and TCP ports that are permitted in traffic from the Public_Server to the Dallas_Server? Destination UDP Ports Permitted TCP Ports Permitted Dallas_Host Dallas_Server Task 3—Deny Upper TCP ports Public_Server->Dallas Server
The TCP port numbers 0–255 are well known port numbers that define specific TCP/IP services. Upper TCP port numbers can be used for various attacks from the outside of our network. Use the Dallas Router Virtual CLI to define an extended ACL 100 that will deny all TCP services with port numbers above 255 from the Public Server to the Dallas Server while allowing all other traffic. Apply the ACL to the outside (S0/1) interface of the Dallas Router for all inbound traffic. Execute a show running-config command to verify your configuration.
Copy these Virtual CLI commands and the command output to your lab document. As we did in Task 2, we will perform another Flow Analysis Port Scan to see what TCP and UDP ports are now open. Open Flow Analysis on the Menu Bar and select Security/Port Scan Analysis/Perform Analysis. In the Import zones dialog that appears, the Select zone to address mapping file: text box should have a value of F:\op_models\SecurityZones. gdf. If it doesn’t appear, type this value in the text box. Click Next. In the Select interested zones dialog, include the Dallas_Host, Dallas_Server, and Public_Server zones. Click Next.
The Essay on Education Public Morality In Australia
ter> The Influence of Education & Public Morality in Australia during 1788-1900 While Christianity played a crucial part in all aspects of Australian society throughout the pre-federation years 1788 to 1900, it had a significant impact on education and public morality. Th influence of Christianity in education was evident through the establishment of a separate education system and, in ...
In the Select zone pairs to analyze dialog, check the Scan across all zone pairs option, and click Next. In the Reporting Options dialog, ensure that an Output folder on your F:\ drive is specified. Click the Run button to begin the network scan. A Port Scan Analysis web page report will appear. Expand the Global Tables tree option, and click Summary. In the Port Scan Summary, you will see all permitted services between the Dallas_Host, Dallas_Server, and Public_Server zones. Open the Permitted services links Public_Server->Dallas_Host and Public_Server->Dallas_Server. Note the TCP and UDP port numbers that are now open.
Use to capture the Public_Server->Dallas_Host and the Public_Server->Dallas_Server windows, and use V to paste the two captured windows into your lab document. What are the UDP and TCP ports that are now permitted in traffic from the Public_Server to the Dallas_Host? What are the UDP and TCP ports that are permitted in traffic from the Public_Server to the Dallas_Server? Destination UDP Ports Permitted TCP Ports Permitted Dallas_Host Dallas_Server Explain the differences between the UDP/TCP Ports tables before and after the ACL has been applied. Explain what affect this ACL has on security for the Dallas Server?