Preview

SEC450 Dallas Router Security Auditor Report

Satisfactory Essays
Open Document
Open Document
349 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
SEC450 Dallas Router Security Auditor Report
SEC450 Dallas Router Security Audit Lab Document

NOTE: Use Carriage Returns and Page Breaks as needed to prevent table contents from extending across page boundaries.

Task 1: Run the Security Audit using NetDoctor

* Go to Appendix A at the end of the NetDoctor report. Copy and paste the Appendix A page into your lab document the table cell below:.

Paste Appendix A Here Appendix A: All Rules and SummariesAdministrationEXEC Passwords Not Using Type 5 Encryption (1 note)User Account Not At Level 1 (2 notes)Route Maps and ACLsDeny All ACL (1 warning)System LoggingACL Deny Statement Not Logged (1 note) |

Task 2: Make Configuration Changes for Dallas Router

* Use A to select all of the commands in the edited device configuration file. Use C to put the commands in the clip board. Paste these commands into the table cell below with V.

Paste the edited Device Configurations Here
…show more content…
enable secret ciscousername local1 privilege 1 password 0 pass1username local2 privilege 1 password 0 pass2memory-size iomem 10!ip subnet-zero!interface FastEthernet0/0 ip address 192.168.100.1 255.255.255.0 ip nat inside duplex auto speed auto!interface Serial0/0 bandwidth 1544 no ip address shutdown!interface FastEthernet0/1 no ip address shutdown duplex auto speed auto!interface Serial0/1 bandwidth 1544 ip address 200.100.10.2 255.255.255.0 ip nat outside ip access-group 100 in!router rip version 2 passive-interface FastEthernet0/0 passive-interface FastEthernet0/1 network 200.100.0.0 network 192.168.100.0!ip nat inside source static 192.168.100.10 10.100.10.10 extendableip nat inside source static 192.168.100.11 10.100.10.11 extendableip classlessip http serverno ip http secure-server!access-list 100 deny ip host 200.100.20.10 any logaccess-list 100 deny ip host 200.100.0.10 any logaccess-list 100 permit ip any any

You May Also Find These Documents Helpful

  • Satisfactory Essays

    4. In the source window right click on the device and select add source and add the written verilog code as shown in figure 3 and figure 4.…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This section only evaluates your entry of config commands that relate to actual device configuration.…

    • 680 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 4

    • 920 Words
    • 4 Pages

    3. The following command was copied and pasted into configuration mode when a user was telnetted into a Cisco switch:…

    • 920 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    In Appendix B in your textbook are the descriptions of the various test protocols. Following here is the laboratory report you are to complete and submit.…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab; what you learned by performing it; how it relates to this week’s TCOs and other course material; and, just as important, how you feel it will benefit you in your academic and professional career. (20 points) , In this lab I was able to implement and troubleshoot ACLs. In working through this lab, I learned how to create an extended access list to deny specific Telnet traffic. I did this by applying the access list to multiple interfaces and used show commands to verify the access list syntax. I then verified that the access list worked by generating different types of traffic. I was able to practice troubleshooting skills by copying a problematic list from the TFCP server and used show commands in order to discover why the new access list did not work. At the end of the lab, I reconfigured the access list so that it would work in the way that it was intended to…

    • 601 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    iii. All EPHI must be removed and relocated to a system that supports the foregoing security password structure.…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    This paperwork of IT 244 Week 1 Individual Introduction to the Information Security Policy Appendix C comprises:…

    • 396 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The raw data is present in Appendix A; the histogram is present in Appendix B; the descriptive statistics are present in Appendix C.…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Good Essays

    Because this is only a test deployment, you will be using a Windows 8 computer to function as the web server. In this exercise, you will install Internet Information Services on your workstation and then configure it to host two websites.…

    • 970 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    lab analysis

    • 436 Words
    • 2 Pages

    Follow the directions on the left side of the menu to complete the lab. Use the data chart to answer the following questions. You do not have to submit your lab to be recorded.…

    • 436 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Type your Name DSI# and the date on page 1 and submit this completed Lab Report document to the Week 4 iLab Dropbox.…

    • 269 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Lab 1

    • 422 Words
    • 3 Pages

    In this lab activity, you will draft a statement of work (SOW). You should complete Lab 1.3: Create a Statement of Work from the lab manual. You should submit a document by completing the table in Steps 2 and 3.…

    • 422 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    ACLs Notes

    • 822 Words
    • 6 Pages

    We have to Permit Data of Network 172.16.0.0 to flow out from E0 and E1 Ethernet Interfaces of the router and enter into the both sides Network 172.16.4.0 and 172.16.3.0.…

    • 822 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Riordan Sr-Rm-013

    • 722 Words
    • 3 Pages

    Preventing attacks on your networks can be something that is stressful and very time consuming. Riordan has a Service request (SR-rm-013) in which the company shows concern about various security aspects within the company and the requirements of the Sarbanes-Oxley. Multiple different aspects of the company’s current security structure should be revised and updated to meet the standards of Sarbanes-Oxley Act.…

    • 722 Words
    • 3 Pages
    Good Essays