Documente Academic
Documente Profesional
Documente Cultură
NSM Sandbox
FBRD Assignment Week 2
Brook Cayce, Nicholas Diley, John Rodriguez
John Rodriguez
Nicholas Diley
Brook Cayce
NTS350
For NTS350, we are required to set up a network security monitoring
environment for packet capture and network analysis. The configuration currently in
our environment is simple at the moment. All our machines have been configured
on the NTS350 VLAN 4 network.
Our analyst virtual machine is running Kali Linux 2.0. The configuration below
is what has been set up for our analyst workstation:
IP address: 10.0.103.10
Netmask: 255.255.255.0
Our storage unit virtual machine is running FreeNAS. The configuration below
is what has been set up for our storage unit:
IP address: 10.0.103.20
Netmask: 255.255.255.0
John Rodriguez
Nicholas Diley
Brook Cayce
NTS350
John Rodriguez
Nicholas Diley
Brook Cayce
NTS350
Our first sensor to capture traffic data on the NTW216 vlan is running
FreeBSD. The configuration below is what has been set up for our NTW216 sensor:
IP address (our VLAN): 10.0.103.254
Netmask (our VLAN): 255.255.255.0
IP address (NTW216 VLAN): 192.168.108.254
Netmask (NTW216 VLAN): 255.255.255.0
John Rodriguez
Nicholas Diley
Brook Cayce
NTS350
Our second sensor to capture traffic data on the NTS330 vlan is running
FreeBSD. The configuration below is what has bene set up for our NTS330 sensor:
IP address (our VLAN): 10.0.103.253
Netmask (our VLAN): 255.255.255.0
IP address (NTW216 VLAN): 172.16.121.254
Netmask (NTW216 VLAN): 255.255.255.0
The boxes created would be the two sensors that will be utilized within our VLAN
and other classes' VLANs, Kali 2.0 is our workstation environment, our Snort
environment, and an storage box.
John Rodriguez
Nicholas Diley
Brook Cayce
NTS350
References