Essay on Database Server Security Demands Opnet Ilab

1153 Words Aug 15th, 2013 5 Pages
Database Server Security Demands Opnet iLab

Task 1 – Verify Initial Connectivity between Router and Hosts

• Run a Flow Analysis to update the topology. Open the Virtual CLI on the ISP router, execute the enter command and ping all of the Servers and Host PCs including the Attack PC. Select the CLI commands within the Virtual CLI window using your mouse. Click the copy button and use V to paste the commands and output results into your lab document.
ISP_Router>enable
ISP_Router#show ip interface brief
Interface IP Address OK? Method Status
FastEthernet0/0 200.100.0.1 YES NVRAM up
FastEthernet1/0 200.100.40.1 YES NVRAM up
Serial0/0 200.100.10.1 YES NVRAM up
Serial0/1 200.100.20.1 YES NVRAM up
…show more content…
Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms
ISP_Router#ping 192.168.200.11

Type escape sequence to abort.
Sending 5 100-byte ICMP Echos to 192.168.200.11, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms
ISP_Router#ping 200.100.0.10

Type escape sequence to abort.
Sending 5 100-byte ICMP Echos to 200.100.0.10, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms
ISP_Router#ping 200.100.40.99

Type escape sequence to abort.
Sending 5 100-byte ICMP Echos to 200.100.40.99, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms
ISP_Router#

Task 2 – Set up Security Policy for Offsite Database Server

• Expand the Global Tables -> Network Security tree item and select Conformance. As you can see, all of the four permitted demand flows conform to the Security Policy. Use to capture the Conformance web report and use V to paste it into your lab document.

• Click on Violations and notice that the denied database traffic is reaching the Attack PC. Use to capture the Violations web report and use V to paste it into your lab document.

• What is needed to bring the network into compliance with the Security Policy? Explain.

__Inorder to bring the network into compliance with security policy they both have to be defined. After they

More about Essay on Database Server Security Demands Opnet Ilab

Open Document