Disable port traffic for world of warcraft games

Assignment Help Computer Engineering
Reference no: EM133637812

In this lab, you will use the GVM Vulnerability Scan Report that was generated in the Vulnerability Scanning Lab. 

Note: There is no specific video associated with the Part 1 tasks. The Part 1 tasks are designed for you to perform independent research and to challenge your creativity. Please review the Topic 1 video entitled "1.5 Access Control Environment Installation Lab - pfSense Console Part 3" which touches upon pfSense functionality, especially creating rules, and object group aliases.

Choose five open/closed ports and determine the applicable protocol/application.

Perform the following tasks to implement the basics of pfSense post-installation configuration:

  1. Update to the latest stable version.
  2. Set HTTPS to port 8443.
  3. Include the traffic graph on the dashboard.
  4. Disable port traffic for World of Warcraft games ports (not the World of Warcraft website). Refer to "World of Warcraft Router and Firewall Port Information," located in the topic Resources, as needed.
  5. Disable inbound ICMP protocol.
  6. Choose a social media website and disable all domains for that website.
  7. Choose a video streaming website and enable all domains for that website.
  8. Provide screenshots of the original port scan, the traffic graph of the dashboard, the World of Warcraft disabled ports, the disabled inbound ICMP protocol, disabled domains for the social media website, enabled domains for the video streaming website, and the GVM Scan Report.

Part 2

Write a 250- to 500-word lab report (to include all screenshots from Part 1) addressing the following:

  1. Summarize the issues encountered, lessons learned, and successes in a bullet point format.
  2. Describe the screenshots provided.
  3. Examine a specific architecture and identify potential vulnerabilities. Include a description of 2-3 vulnerabilities of the hybrid network used in this lab.
  4. Explore in-depth advanced and novel areas of networks and protocols. Include a description of what you learned from exploring the networks and protocols in this lab.

Reference no: EM133637812

Questions Cloud

How would you describe the current national : How would you describe the current national (United States Cybersecurity policy on AI, why is it good and what should be done to better bolster our policy
Describe how the attacker was able to get in and out : Describe how the attacker was able to get in and out of the system, as well as the threat vector. Examine and explain the effects of the attack on the various
War between israel-hamas impacting the palestinian people : Art addressing Anti Asian Hate, the war in Ukraine and most recently the war between Israel and Hamas impacting the Palestinian people.
What is the hardened border paradox : What is the Hardened Border Paradox What is the "Open Border Paradox? How can both be overcome? Compare and contrast the two
Disable port traffic for world of warcraft games : Disable port traffic for World of Warcraft games ports (not the World of Warcraft website). Refer to "World of Warcraft Router and Firewall Port Information
What is the function of iptables command : What is packet filtering firewall and Differentiate Stateless Operation from Stateful Inspection - What is the function of iptables command
How to create a health information privacy : How to create a health information privacy and security policy for the organization?
Explain various ways of authentication system : Write a pseudocode that would detect whether a given number is divisible by 5 or not and Explain various ways of authentication system
Which would serve as the best foundation : Which is the weakest? Which would serve as the best foundation for an agreement between parties? Why

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd