Assessment :Firewall Setup & Configuration

   

Added on  2022-09-09

14 Pages1431 Words14 Views
Assessment 1:Firewall Setup & Configuration
Assessment :Firewall Setup & Configuration_1
Executive Summary
This project assesses the understanding of the firewall and design configuration. It also
helps to reduce the potential security risks for performing the network’s security testing, which is
used for determining threats and prepares a report on risk mitigation. The analysis is used for
securing a network, including the distributed application.
Assessment :Firewall Setup & Configuration_2
Table of Contents
1. Project Outline........................................................................................................................1
2. Part A.......................................................................................................................................1
2.1 Use Nmap.........................................................................................................................1
2.2 Description of Nmap.......................................................................................................3
2.3 Nmap Analysis.................................................................................................................4
2.4 Risk Mitigation Plan.......................................................................................................7
3. Part B.......................................................................................................................................8
3.1 Firewall Setup Configuration........................................................................................8
4. Conclusion.............................................................................................................................10
References.....................................................................................................................................11
Assessment :Firewall Setup & Configuration_3
1. Project Outline
This report intends on conducting network security test and also wish to evaluate the
understanding on firewall and design configuration, which are used to reduce the potential
security risks. The performance of the security testing is used to determine the threats and
prepares a risk mitigation report. The analysis is utilized for securing the network, including the
distributed applications. This project is divided into two parts, part A is used to perform the
security testing in Kali Linux that performs the Pen testing on a network by using the Nmap tool.
It prepares short risk mitigation plan for determining the threats of asset which are used for
proceeding the firewall setting essential for an organization. The part B is used to configure a
network firewall setting with the help of Kali Linux commands for achieving the required level
of security.
2. Part A
In this part, the Nmap tool is used to perform the penetration testing on Kali Linux which
is used to determine the threats and prepares the mitigation report.
2.1 Use Nmap
First, install the Kali Linux on Virtua box as demonstrated below.
1
Assessment :Firewall Setup & Configuration_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Penetration Testing on Linux Machine: Task 3
|32
|3649
|332

Network Vulnerability And Cyber Security
|15
|1453
|15

Penetration Testing: Techniques and Tools
|26
|2326
|63

Firewall Testing on Kali Linux using Nmap
|18
|1810
|98

Firewall and Configuration Report 2022
|22
|1741
|23

Security Assessment on a Firewall
|11
|891
|145