Database Server Security Demands – iLab3
Objectives
In this lab, the students will examine the following objectives.
Become familiar with well-known and ephemeral ports
Create ACL to meet requirements on database security demands
Learn best practices to create and apply ACLs.
Scenario
A small company is using the topology shown below. The Public Server is actually an off-site Database Server that contains company records. Assume that the 200.100.0.0/16 network represents the Internet. The Dallas and Chicago Servers and hosts need to access the database server securely. Only users in the Dallas and Chicago LANs should be able to access the database server.
Topology
The last page of the lab assignment document contains a full-page topology. Remove this page and use it for reference to the topology and the IP addresses.
Initial Configuration
The Dallas, Chicago, and ISP Routers’ FastEthernet and Serial interfaces used for the lab have been correctly configured and enabled. Unused interfaces have been shutdown. The RIP routing tables are complete for all routers and hosts. No ACLs have been applied to any of the routers. Below is the initial running-config file in ISP router.
version 12.3(4)T7
!
hostname ISP_Router
!
interface FastEthernet0/0 ip address 200.100.0.1 255.255.255.0
!
interface FastEthernet1/0 ip address 200.100.40.1 255.255.255.0
!
interface Serial0/0 ip address 200.100.10.1 255.255.255.0
!
interface Serial0/1 ip address 200.100.20.1 255.255.255.0
!
router rip network 200.100.0.0 network 200.100.10.0 network 200.100.20.0 network 200.100.40.0
!
line con 0 line aux 0 line vty 0 4 password cisco line vty 5 15 password cisco
!
end
Lab Data Collection and Submission
Download and open the lab document file: SEC450_DB-SecurityDemands_Report.docx. Enter your