Discuss the traffic pattern you observed

Assignment Help Management Information Sys
Reference no: EM133437942

In this assignment, you will act as an attacker to identify the vulnerabilities in the LAN network and a defender to apply proper countermeasures. You need to provide a screenshot for each task below.

Task A: Sword - Network Scanning

Power on the listed VMs and complete the following steps from the External Kali (you can use either nmap or zenmap to complete the assignment)

- External Kali
- pfSense
- Ubuntu
- Windows Server 2008

Make sure you didn't add/delete any firewall policy before continuing.

1. Use Nmap to profile the basic information about the subnet topology (including open ports information, operation systems, etc.) You need to get the service and backend software information associated with each opening port in each VM.

2. Run Wireshark in Ubuntu VM while External Kali is scanning the network. Discuss the traffic pattern you observed. What do you find? Please write a 200-word essay to discuss your findings.

Task B: Shield - Protect your network with firewall
In order to receive full credits, you need to fill the table (add more rows if needed), implement the
firewall rule(s), show me the screenshot of your firewall table, and verify the results.

1. Configure the pfSense firewall rule to block the ICMP traffic from External Kali to Ubuntu VM. Rule # Interface Action Source IP Destination IP Protocol (port # if appliable)

2. Clear the previous firewall policies and configure the pfSense firewall to block all ICMP traffic from External Kali to the LAN side.
Rule # Interface Action Source IP Destination IP Protocol
(port # if appliable)

3. Clear the previous firewall policies and configure the pfSense firewall to block ALL traffic from External Kali to the LAN side, except for the FTP protocol towards Windows Server 2008.
Rule # Interface Action Source IP Destination IP Protocol
(port # if appliable)

4. Keep the firewall policies you created in Task B.3 and repeat Task A.1. What's the difference?

Reference no: EM133437942

Questions Cloud

What applications will be included in the baseline : What applications will be included in the baseline? If you chose to develop several baselines, what applications will be in each baseline
What is the biggest challenge in preparing a performance : What is the biggest challenge in preparing a performance-based work statement and what can be done to overcome that challenge?
Discusses many crucial elements and components of effective : How could this have been fixed? Please provide enough details for us to understand your team and how you would implement the crucial team elements your group
Analyze how the use of biometrics in the movie : Analyze how the use of biometrics in the movie is or is not "real" and how the movie producers may have presented the incorrect usage.
Discuss the traffic pattern you observed : Discuss the traffic pattern you observed. What do you find? Please write a 200-word essay to discuss your findings
Public health professional : Once a policy is introduced, it should be routinely reviewed to ensure that the goals of the policy are being met. As a public health professional,
Describe the escalation of commitment bias : Describe the escalation of commitment bias, and give an example of it an action. Identify and describe four tactics that managers can use to reduce this bias?
Explain each identified challenge thoroughly : Identify atleast 3 current and well known financial challenges facing intercollegiate athletic programs. Explain each identified "challenge" thoroughly.
What should be entailed in a contingency plan : What should be entailed in a contingency plan and what should be in the detailed plan listed in the Contingency plan.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd