SEC450 Security Testing - iLab1
Objectives
In this lab, the students will examine the following objectives.
Discover network vulnerabilities and mitigation of possible threats
Learn the use of Access Control List (ACL) to implement mitigation
Scenario
A small company is using the topology shown below. Minimal security measures have been implemented. Possible vulnerabilities need to be discovered in any of the devices used in the network architecture. This includes routers, switches, and workstations.
Topology
The last page of the Lab Assignment document contains a full-page Topology. Remove this page and use it for reference to the topology and the IP addresses.
Initial Configuration
Routers’ Routing Protocols, FastEthernet and Serial interfaces used for the lab have been correctly configured and enabled. Unused interfaces have been shutdown. The RIP routing tables are complete for all routers and hosts. No ACLs have been applied to any of the routers. Below is the running-config file in Dallas router.
version 12.3(4)T7
!
hostname Dallas
!
interface FastEthernet0/0 ip address 192.168.100.1 255.255.255.0
!
interface FastEthernet0/1 ip address 192.168.10.1 255.255.255.0 shutdown
!
interface Serial0/0 bandwidth 1544 ip address 192.168.30.1 255.255.255.0 shutdown
!
interface Serial0/1 bandwidth 1544 ip address 200.100.10.2 255.255.255.0
!
router rip network 192.168.100.0 network 200.100.10.0
!
ip default-network 200.100.10.0 ip route 0.0.0.0 0.0.0.0 serial0/1
!
! line con 0 line aux 0 line vty 0 4 password cisco line vty 5 15 password cisco
!
end
Lab Data Collection and Submission
Download and open the lab document file: SEC450_SecurityTesting_Report.docx. Enter your name and date at the top of the lab document. As you complete each task of the lab assignment, entering the commands and, answering questions (as specified in the iLab assignment) into this