Preview

IS3220 Lab 9 Chris Wiginton

Powerful Essays
Open Document
Open Document
1518 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3220 Lab 9 Chris Wiginton
IS3220 Lab 9
Chris Wiginton
ITT Technical Institute, Tampa FL
Instructor: Sherman Moody
18 November, 2014

1. Briefly explain how the Gufw internal Ubuntu host IP ststeful firewall can be used in a layered security strategy at the Workstation Domain level.
Go to System>Administration>Firewall configuration. It supports common tasks such as allowing or blocking pre-configured, common P2P, or individual ports. Gufw is powered by UFW, runs on Ubuntu, and anywhere else Python, GTK, and UFW are available.
2. Briefly explain how each of the Linux-based tools demonstrated in this lab can be used to monitor bandwidth, protocol, and network traffic information. bmon is a portable bandwidth monitor and rate estimator. It supports various input methods for different architectures. Various output modes exist including an interactive curses interface,lightweight HTML output but also formatable ASCII output. iftop listens to network traffic on a named interface and displays a table of current bandwidth usage by pairs of hosts.
Pktstat displays a real-time list of active connections seen on a network interface, and how much bandwidth is being used by what. Partially decodes HTTP and FTP protocols to show what filename is being transferred. X11 application names are also shown.
Iperf is a tool to measure maximum TCP bandwidth, allowing the tuning of various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, datagram loss.
Tcptrack is a sniffer which displays information about TCP connections it sees on a network interface.
3. Given that the Ubuntu internal firewall is not installed by default, should you enable this firewall if your organization already has a firewall? Why or why not?
Yes, because it is still critical to protect the LAN-WAN edge. However, network firewalls now must also keep communications between internal network segments in check so that internal employees cannot access network and data resources that corporate policy

You May Also Find These Documents Helpful

  • Powerful Essays

    bmon is a portable bandwidth monitor and rate estimator. It supports various input methods for different architectures. Various output modes exist including an interactive curses interface,lightweight HTML output but also formatable ASCII output.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    give us a great idea to where we stand with the output of true bandwidth demand of the…

    • 3502 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    2. Why is it a good idea to put shared servers and services on a DMZ when both internal and external users need access?…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    -In reference to previous network plan U1A1 GPO and AD will be created and upheld for the internal network. GPO will be in place to provide username and password security policy for external network users. (System/Application Domain)…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    iLab Week4

    • 563 Words
    • 2 Pages

    The following is a graph representing the ethernet delay or traffic. The Blue Line represents the…

    • 563 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Corporation Tech will face many security risks with their current network. The user domain is the single most vulnerable part of any network and as such poses the most obvious security risk. To mitigate risks involving the users is to implement policies and training to educate the user on proper use and security best practices. By educating the user on security practices such as secure passwords, safe web surfing, and securing their workstations, many potential attacks can be avoided. Policies and training are also necessary because they can be used as evidence when taking administrative action against a user or intruder in the event the system or data information is compromised.…

    • 612 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In the LAN-to-WAN domain the internal network is connect to a wide area network. This domain contains routers, firewalls, email content filters, and other similar devices. Routers will route the traffic leaving and coming into the network strict security ACLs will be applied to these devices. Hardware firewalls will be implemented into the network for further packet filtering. Intrusion prevention/detection systems will be on the network to protect against attacks to our network. The email is subject to scanning and filtering to prevent spam, malware, and viruses. (Kim & Solomon, 2012)…

    • 539 Words
    • 3 Pages
    Good Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    Software firewalls are installed on individual computers and they need sufficient configuration to be effective. Software firewalls contain a set of related programs, usually located at a network gateway server, that protect the resources of a private network from users on other networks or from internal users. Software firewalls allow application screening to verify the interaction between the requesting client and the requested resource.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Currently the security for the internet server and the location of it in the network is not as protected as it should be and it is not the best design either. The internet server must be located out of the company firewall to protect the systems and network internally. By doing this it separates the remote server system the system has proper validation and connection through the system allows access to the rest of the network. Staffs that are located in the firewall can authenticate through a proxy system and then access the internet, which in turn allows them to communicate…

    • 560 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It is meant by analysing of traffic on the internet. Monitoring of the internet is achieved to determine packet volume for network configuration as well as to find out how personnel are spending their time on the internet.…

    • 1121 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Many network engineers today understand the value in good network management. Yet, some don't realize the possibility of monitoring the bandwidth of a network. There are a lot of tools available today on the market that can help with bandwidth monitoring. Bandwidth monitoring tools are best to use when your ISP provider has a limit on downloading and uploading. Most tools not only offer monitoring, they also offer detection of any suspicious activity on the network. I found a really great tool to monitor network bandwidth; it's made by Paessler the network monitoring company called the PRTG. The PRTG tool can monitor network device uptime, improve network performance, and track bandwidth usage. PRTG networking software uses SNMP, NetFlow, and packet sniffing to give the user a full overview of all the traffic on the network. The software allows you to analyze network traffic, as well as classify the traffic by a specific IP address, protocol or port. As I was doing my research, I realized that this tool had so many other features to offer like availability monitoring, performance monitoring, VOIP traffic monitoring, network analysis and troubleshooting, and Windows monitoring. The availability performance tool offers advanced PING test that will check to see if it can reach your website and network…

    • 473 Words
    • 2 Pages
    Satisfactory Essays