Create instruction guide for post-installation configuration

Assignment Help Computer Engineering
Reference no: EM132333244

Assignment: Using the networked VMs from the Access Control Environment Installation assignment, perform a port scan of the PFSense firewall system using the Kali VM. Create a screenshot showing the results.

Using the scan results, choose five open/closed ports and determine the applicable protocol/application.

For each port, research and explain why it is good (or bad) that the default configuration is standardized.

Research and implement the basics of PFSense post-installation configuration.

1. Update to the latest stable version.

2. Set HTTPS to port 8443.

3. Include the traffic graph on the dashboard.

4. Disable port traffic for World of Warcraft.

5. Disable port traffic for torrent applications.

6. Disable inbound ICMP protocol.

7. Choose a social media website and disable all domains for that website.

8. Choose a video streaming website and enable all domains for that website.

Using the Kali VM, run another port scan. Note the differences against the original scan.

As a follow-up, research and explain the common vulnerabilities associated with the standard installation of this PFSense firewall.

Create a 700- to 1,200-word step-by-step instruction guide for the post-installation configuration. Make sure to include all required explanations and at least eight screenshots.

Reference no: EM132333244

Questions Cloud

Tangible performance and persistence : Intuitively, persistence and high performance would correlate closely.
What you think about the test as a team-building tool : Write a 500-600-word paper, in APA format, describing your MBTI type and what you think about this test as a team-building tool. Use at least three credible.
Organization bottom line and overall performance : Please cite and reference in your response. Are you people kidding me, that's my question. I just sat here and pit together.
Relationships in the database description : Which statement below is NOT true of the one-to-many relationships in the database description below?
Create instruction guide for post-installation configuration : Create a 700- to 1,200-word step-by-step instruction guide for the post-installation configuration. Make sure to include all required explanations and at least.
Design an epm system around flexible or inflexible elements : Is it best to design an EPM system around flexible or inflexible elements? Generally, when first developing an EPM system, do companies prefer to use formality.
Web analytics 2 paradigm : Briefly list and explain each key question associated with the Web Analytics 2.0 paradigm.
Identify the steps in the writing process : Apply the conventions of standard written American English to produce correct, well-written essays. Identify the steps in the writing process.
Discussing issue on community stigma towards HIV patients : Open University Malaysia - NBNS1103 Transculture In Nursing Assignment - discussing issue on community's stigma towards HIV/AIDS patients

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd