Case Undertaking Three-1: Evading Firewalls and the IDPS- 600 Phrases
You might have been assigned to make use of Nmap to develop testing procedures for a way attackers would possibly attempt to evade detection at your group’s firewalls and IDPS. Put together a report that explains which Nmap choices can be utilized to evade firewalls and IDPSs, and the way these choices perform.
Case Undertaking Four-1: Tunneling IPv6- 2 pages
You might have been assigned to report back to your community directors on the usage of Teredo. Put together a two-page memo that outlines why Teredo was developed, how it’s applied in Home windows working techniques, for which forms of networks it’s applicable, and the way lengthy it must be applied.
Case Undertaking Four-2 Creating ACLs
You might have been assigned to create entry management lists to filter particular visitors on a Cisco router. Present the instructions wanted to filter the suitable visitors in every of the next ACLs.
ACL 1
Permit Telnet connections to the 192.168.1.zero community from the host 10.Three.Four.7 .
Permit established connections from 172.16.zero.zero community to wherever.
Allow all different entry.
ACL 2
Forestall Telnet connections from 192.168.1.zero community to 172.16.zero.zero community.
Forestall reserved addresses from accessing any community.
Deny spoofing from the printed tackle.
Allow all different entry.