Get Cheapest Assignment in Australia, UK, US, UAE, Canada and NZ Order Now

Firewell Setup and Configuration Linux Assignment

0 Comments

Firewell Setup and Configuration Linux Assignment | IT

Book your assignment for Firewell Setup and Configuration at Punjabassignmenthelp@gmail.com now order Now!!

Task Details.: This Assignment requires you to perform a security testing on the network In identify the threes, prepare a Risk Mitigation report and to configure some of the settings using Kali Linux to & BOUM the network end the distributed applied; ions. The assignment consists of two parts.Part A:UEe Nmap — a security testing in Kali Linux !a perform penetration testing on the network (features. o$ Nmap listed Law). Prepare a slur; Risk Mitigation plan to identify the threats for the assets_ This plan will guide you to proceed with the lrewell settings required for the organization es you focus on the second part of the ass ignmerri. Features of Nrrap:Host discovery: useful for identifying hosts in any network Pori scanning: lets you enumerate open ports on the local or remote hostc OS detection: useful for fetching •pair.g system anal hardware information about any connected de riceApp version detection•: allows. you to determine applied.!ion name end version number ScJiplable interaction: extends Nmap default capabilities by using Nmap Scripting Engine N SE) Pert a:Configure. a Few settings on the firewall for the network using Kali Linux corn errands to achieve a required level of security_ The initial Eel. of commands are given to you to -Mart with. You may need to perform an online search to complete the reI of the requirements for the firewall settings.Case Studio for the Assignment 0MG is a small buying ass enterprise comprising.g a network to reach their business requirements. A network needs to be secured Pio achieve their business goals_ The System end Network administrator of CMC realizes that it is necessary to impose a certain level of filtering !or the network to be secure and Mal is when H. can sustain from attacks, which may damage the whole network. To. develop a secure network, network administrators must have a good understanding of all the attacks that are caused by an intruder and their mitigation techniques. Choosing a particular mitigation technique for an attack has an impact on the overall performance of the net rock because each attack has different ways for mitigation._ The network admins! raptors identify the assets that need to be protected by performing a risk analysis, threats, and vulnerabilities that the network.rk may pose.

Firewell Setup and Configuration

The risk a=nalysis provides sufficient information about all risks and helps to build e network with high security_ Alter risk analysis, designing e set of seourit3, policies are very important to provide a high level of security.Security policies provide information for the network. users For using and hauling the network. A firewall is considered !o. be a part of the security policy providing necessary. protection to the network and the applications.You are Me System and Network AdminiEtracor of CLIC and the top !management of CMC urges you to design the requited firewall for the organization’s network. Looking into. the r,=quierrient.S !of the security end adhering to. information sec-daily policy you ere required 1.13 preside firewall. settings to secure the network from different types of possible attacks that can harm the business network_BELAPerform the ‘an “owing task:Use Nmap from Kali on your Virtual Box2. ‘A’ rite an introduction ro include the CIEISCAPtilarl or the tool3. Demonstrate four tasks Nmap can perform. Discuss on haw This tool can be used for mitigating differ types. of threats_ The discussion should include the name and brief description of the threat. and must be supported by screenshots.
1. Discuss the performance of the tools based on the following: a. Security features end b. Time is taken to detect shy threat 5. Perform firewall testing using Nmap .5.. Ferarri the report generated from Ite above tasks write a short Risk Magianism Plan to identify the type of throws on the organization’s assets_ Sada Configure the following setting on the fireball using the appropriate commands in Kali Linux. The list of commands is provided by; over. Command Description:n U fix slErtits To check firewall status Ufw enable Enable firewall Ufw to allow Allow services_ port range. n’i network Ufw deny Blocking a service 1. Check the firewall status 2. Enable Of disable the firewall anconziniyy 3. Allow semis such as TCP, SSFI and samba using their port num bec or name 4. Verify the firewall rules after eddring the above sereices 5. Secure a web server by blookirfg HTTP (131:1) service and allowing WU-PS(443) service only E. MOW a range of ports l’itsrn 21:1 to 430. and deny a range of pcirls from 100 to ‘300 7_ Verify ttie fireviall rules H. Allow HTTP from a sipecrlic submet to access your web services El. Block connections la El network irrterface