Secure Network Architecture Lab Report

.docx

School

University of Cincinnati, Main Campus *

*We aren’t endorsed by this school

Course

IT 3071

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

4

Uploaded by EarlGalaxy13424

Report
Network Security Lab Report Lab Title: Secure Network Architecture Name: Imaan Movania Network Diagram(s) System Information VM Name Operating System IP Address FQDN Role/Purpose RT1- Local Linux Vyos 10.1.0.0 10.20.0.0 RT1- Local.corp.515support.com vLan Identification KALI Linux 10.20.0.192 Kali.corp.515support.com Traces packets and does ARP spoofing PC1 Windows 10.20.0.101 PC1.corp.515support.com Client PC Ohio Cyber Range Institute, University of Cincinnati
10 PC2 Windows 10 10.20.0.201 PC2.corp.515support.com Client PC MS1 Windows Server 16 10.1.0.102 Updates.corp.515support.com Web server authentication, hosts DHCP and allows HTTPs communication DC1 Windows Server 16 10.1.103 DC1.corp.515support.com Sends files between VLANS Objective The main takeaway from this lab is to display the importance of segmenting your network thus creating a secure network design. We focus on creating a Man-in-the-Middle attack with ARP spoofing and then reconfigure and segment the network through VLANS and subnets. We start off with creating a web server configuration on MS1, we do this so we can have secure communications over HTTPs. We utilize the KALI server to intercept the traffic around the VLAN and analyzing it with Wireshark. After we simulate the attack, we are then taught how to create a robust and secure network and include physical factors into play. In summary, this lab aims to point out display weaknesses and vulnerabilities of an unsegmented network and gives us proof of the benefits of implementing segmentation with VLANs and subnets. Procedure We start off by tinkering with the MS1 web server and configure the HTTPS communications and authentication. We install a module for HTTPS redirect, and we obtain a certificate for the domain. Our setup allows URL rewrite rules and allows basic authentication on that web server. Ohio Cyber Range Institute, University of Cincinnati
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help