Create a new security group

Assignment Help Computer Network Security
Reference no: EM133702034

WORKING WITH AMAZON ELASTIC COMPUTE CLOUD (AMAZON EC2) INSTANCES AND AMAZON MACHINE IMAGES

TASKS:

Log on to AWS Academy using your AWS Academy starter account and click on the AWS Console button.
Launch a new instance using the Amazon EC2 console, in your default Region/Availability Zone.
Select the Amazon Linux AMI.
Choose the t2.micro instance type.
Launch the instance in the default virtual private cloud (VPC).
Assign the instance a public IP address (of your choice) and add a tag to the instance of Key: Name, Value: MDSC-MCYB6210- YourName.
Create a new security group called MDSC-MCYB6210-Group-YourName.
Add a rule to the group MDSC-MCYB6210-Group-YourName, allowing Secure Shell (SSH) access from any IP address.
Launch the instance and, when prompted for a key pair, create a new public-private key pair-MDSC-MCYB6210Key-YourName. Download the private key (a .pem file) to your workstation.
In the AWS Academy Canvas Page, click on SSH Access to EC2 Link, and choose the option based on the Operating System on the computer you are using for this lab.

Run the chmod command on the key file, as follows: chmod 400 MDSC-MCYB6210Key-YourName
SSH into the instance using the public IP address, the user name ec2-user, and the MDSC-MCYB6210Key-YourName .pem file. The command format is:
ssh -i ‘<private_key_name>.pem' ec2- user@<external_IP_Address_of_Instance>
Use relevant Unix commands to navigate through the directory structure of your AWS t2 instance and view the types of folders and files available.
Close the SSH session by typing the exit command.
Return to the AWS console and terminate the instance you created.

Tip: Assuming you launched the instance with the vockey key pair, and that you have opened TCP port 22 in the instance's security group, you can also SSH to an EC2 instance by using the terminal to the side of these instructions. The terminal already has the key pair available to it. Simply enter the command ssh -i ~/.ssh/labsuser.pem ec2-user@<public-ip> where <public-ip> is the actual IPv4 public address of the instance.

These instructions are for Windows users only.

You will use PuTTY to SSH to Amazon EC2 instances. If you do not have PuTTY installed on your computer, download it here

Open putty.exe
Configure PuTTY to not timeout:
This allows you to keep the PuTTY session open for a longer period of time.
Choose Connection
Set Seconds between keepalives to 30
Configure your PuTTY session: Choose Session
Host Name (or IP address): Copy and paste the IPv4 Public IP address for the instance. To find it, return to the EC2 Console and choose Instances. Check the box next to the instance and in the Description tab copy the IPv4 Public IP value.
Back in PuTTy, in the Connection list, expand SSH
Choose Auth (don't expand it) Choose Browse
Browse to and select the .ppk file that you downloaded Choose Open to select it
Choose Open
Choose Yes, to trust the host and connect to it.
When prompted login as, enter: ec2-user This will connect you to the EC2 instance.

These instructions are for Mac/Linux users only.
Read through the two bullet points in this step before you start to complete the actions, because you will not be able see these instructions when the AWS Details panel is open.
Choose the AWS Details link above these instructions.
Choose the Download PEM button and save the labsuser.pem file.
Typically your browser will save it to the Downloads directory.
Open a terminal window, and change directory cd to the directory where the .pem file was downloaded. For example, run this command, if it was saved to your Downloads directory:
cd ~/Downloads
Change the permissions on the key to be read only, by running this command: chmod 400 labsuser.pem
Return to the AWS Management Console, and in the EC2 service, choose Instances. Check the box next to the instance you want to connect to.
In the Description tab, copy the IPv4 Public IP value.
Return to the terminal window and run this command (replace <public-ip> with the actual public IP address you copied): ssh -i <filename>.pem ec2-user@<public-ip>
Type yes when prompted to allow a first connection to this remote SSH server.

Be sure to review the Learning Resources before completing this activity. Click the weekly resources link to access the resources.

BY DAY 7
Submit a report summarizing your experiences with carrying out the tasks and including screenshots of the tasks you performed.

Refer to the Week 1 Lab 1 Rubric for specific grading elements and criteria. Your Instructor will use this grading rubric to assess your work.

Reference no: EM133702034

Questions Cloud

Who bears the bulk of blame when iot devices are compromised : Who bears the bulk of the blame when IoT (e.g., Alexa, Siri, etc.) devices are compromised, and malicious activity leads to the loss of life?
Family in wound assessment process : Discuss two reasons as to why it is important to involve the person and carer/family in the wound assessment process?
Discuss legal considerations of case between united states : Discuss the legal considerations of the case between the United States and Iran in 1980 that are relevant to international law.
Demonstrate comprehension of man-centered servant leadership : In a minimum of 850 words demonstrate comprehension of man-centered and Christ-centered servant leadership as it relates to leadership assumptions and methods.
Create a new security group : Create a new security group called MDSC-MCYB6210-Group-YourName. Add a rule to the group MDSC-MCYB6210-Group-YourName, allowing Secure Shell (SSH) access from
Physically deformed has his family with health interview : Mr B, a patient who is in a wheel chair and is physically deformed has his family with him at the health interview.
Complaint of headache and nausea : Chief Complaint: A 28 year old man presents to the urgent care center with a 48 hour complaint of headache and nausea.
Cut injections insulin for diabetic patient : Reflection Using a sprout framework. About my experience of administering a sub cut injections insulin for a diabetic patient.
Analyze the problem in detail including likely first-order : Analyze the problem in detail, including the likely first-order and second-order effects. propose a targeted solution to problem, based on your problem analysis

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd