[meteor_slideshow slideshow=”arp1″]
NOTE: Use Carriage Returns and Page Breaks as needed to prevent table contents from extending across page boundaries.
Task 1 – Verify Initial Connectivity between Router and Hosts
Run a Flow Analysis to update the topology. Open the Visual CLI on the ISP router and ping all of the Servers and Host PCs including the Attack PC. Select the CLI commands within the Virtual CLI window using your mouse. Click the copy button and use V to paste the commands into the table cell below:
Paste the Virtual CLI Ping Commands Here
Task 2 – Set up Security Policy for Offsite Database Server
Expand the Global Tables -> Network Security tree item and select Conformance. As you can see, all of the four permitted demand flows conform to the Security Policy. Use to capture the Conformance web report and use V to paste it into the table cell below:
Paste the Conformance web report Here
Click on Violations and notice that the denied database traffic is reaching the Attack PC. Use to capture the Violations web report and use V to paste it into your lab document.
Paste the Violations web report Here
What is needed to bring the network into compliance with the Security Policy? Explain.
Select the ACL commands in the Virtual CLI using the mouse and click on the Copy button. Use V to paste the commands into the table cell below:
Paste the ACL commands Here
Note that there is a new option called Configuration for Global Tables. Click on this option. It shows any ACLs that are impacting protected traffic. Use to capture the Configurations web report and use V to paste it into the table cell below:
Paste the Configurations web report Here
Notice that there is no Violations option. Open the Conformance report and verify that all of our Security Policy demands have been met. Use to capture the Conformance web report and use V to paste it into the table cell below:
Paste the Conformance web report Here
Expand the Object Tables tree. Select Public Server -> Attack PC DB and Security Demand Routing. No Database traffic is allowed to the Attack PC, it is filtered by ACL 100. Use to Capture the Security Demands Routing web report and use V to paste it into the table cell below:
Paste the Security Demands Routing web report Here
Select the commands you entered in the Virtual CLI using the mouse and click on the Copy button. Use V to paste the commands into the table cell below:
Paste the Virtual CLI Commands Here
[meteor_slideshow slideshow=”arp2″]
A-Research-Paper.com is committed to deliver a custom paper/essay which is 100% original and deliver it within the deadline. Place your custom order with us and experience the different; You are guaranteed; value for your money and a premium paper which meets your expectations, 24/7 customer support and communication with your writer. Order Now
Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.
[order_calculator]