Discuss the traffic pattern you observed

Assignment Help Management Information Sys
Reference no: EM133437942

In this assignment, you will act as an attacker to identify the vulnerabilities in the LAN network and a defender to apply proper countermeasures. You need to provide a screenshot for each task below.

Task A: Sword - Network Scanning

Power on the listed VMs and complete the following steps from the External Kali (you can use either nmap or zenmap to complete the assignment)

- External Kali
- pfSense
- Ubuntu
- Windows Server 2008

Make sure you didn't add/delete any firewall policy before continuing.

1. Use Nmap to profile the basic information about the subnet topology (including open ports information, operation systems, etc.) You need to get the service and backend software information associated with each opening port in each VM.

2. Run Wireshark in Ubuntu VM while External Kali is scanning the network. Discuss the traffic pattern you observed. What do you find? Please write a 200-word essay to discuss your findings.

Task B: Shield - Protect your network with firewall
In order to receive full credits, you need to fill the table (add more rows if needed), implement the
firewall rule(s), show me the screenshot of your firewall table, and verify the results.

1. Configure the pfSense firewall rule to block the ICMP traffic from External Kali to Ubuntu VM. Rule # Interface Action Source IP Destination IP Protocol (port # if appliable)

2. Clear the previous firewall policies and configure the pfSense firewall to block all ICMP traffic from External Kali to the LAN side.
Rule # Interface Action Source IP Destination IP Protocol
(port # if appliable)

3. Clear the previous firewall policies and configure the pfSense firewall to block ALL traffic from External Kali to the LAN side, except for the FTP protocol towards Windows Server 2008.
Rule # Interface Action Source IP Destination IP Protocol
(port # if appliable)

4. Keep the firewall policies you created in Task B.3 and repeat Task A.1. What's the difference?

Reference no: EM133437942

Questions Cloud

What applications will be included in the baseline : What applications will be included in the baseline? If you chose to develop several baselines, what applications will be in each baseline
What is the biggest challenge in preparing a performance : What is the biggest challenge in preparing a performance-based work statement and what can be done to overcome that challenge?
Discusses many crucial elements and components of effective : How could this have been fixed? Please provide enough details for us to understand your team and how you would implement the crucial team elements your group
Analyze how the use of biometrics in the movie : Analyze how the use of biometrics in the movie is or is not "real" and how the movie producers may have presented the incorrect usage.
Discuss the traffic pattern you observed : Discuss the traffic pattern you observed. What do you find? Please write a 200-word essay to discuss your findings
Public health professional : Once a policy is introduced, it should be routinely reviewed to ensure that the goals of the policy are being met. As a public health professional,
Describe the escalation of commitment bias : Describe the escalation of commitment bias, and give an example of it an action. Identify and describe four tactics that managers can use to reduce this bias?
Explain each identified challenge thoroughly : Identify atleast 3 current and well known financial challenges facing intercollegiate athletic programs. Explain each identified "challenge" thoroughly.
What should be entailed in a contingency plan : What should be entailed in a contingency plan and what should be in the detailed plan listed in the Contingency plan.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Provide a real-world scenario on steganography

Discuss the many benefits as well as challenges or drawbacks in using steganography to secure data.

  What did you think-learn about the article

What did you think/learn about the article? Share your thoughts.Does the article leave you wanting to research other similar topics?

  Define the overall network architecture

Explain the importance of communication protocols. Identify the protocols in your design and provide rationale for your decision. Define the overall network architecture

  Compare and contrast a business case and a business plan

For this assignment, I want you to compare and contrast a Business Case and a Business Plan. Include definitions and applications. Also please explore business case templates.

  Hardware solutions versus software solutions

What are the advantages of hardware solutions versus software solutions?

  E-commerce and its impact on global enterprises

Prepare Literature Review on E-commerce and its impact on global enterprises - Incumbent conditions of Saudi Arabia e-commerce industry

  What makes a good executive summary

Discuss potential capstone project ideas and your thoughts on why it would be a good project. What are some concerns you would have for this type of project?

  Identity and access management systems

Describe the importance of Identity and Access Management systems in enforcing security in an organisation.

  Describe the flow of data through your network

Describe the flow of data through your network, and explain how your network design provides multiple layers of security.

  What is a primary actor in a use-case

What is a primary Actor in a Use-Case? How is it drawn in the diagram? How is that same actor represented in the DFD diagram?

  What techniques or controls are available to data analysts

What resources are available to the security professional interested in leveraging math to engage in security related activities?

  Describe the stages of technology development

The stages of technology development in Technology Industry - Describe the stages of technology development in Technology Industry by outlining a logical road map that contributes to Industry's business goals based on current technologies,

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd