Sunteți pe pagina 1din 6

UNIVERSITY OF ADVANCING TECHNOLOGY

NSM Sandbox
FBRD Assignment Week 2
Brook Cayce, Nicholas Diley, John Rodriguez

John Rodriguez
Nicholas Diley
Brook Cayce
NTS350
For NTS350, we are required to set up a network security monitoring
environment for packet capture and network analysis. The configuration currently in
our environment is simple at the moment. All our machines have been configured
on the NTS350 VLAN 4 network.
Our analyst virtual machine is running Kali Linux 2.0. The configuration below
is what has been set up for our analyst workstation:
IP address: 10.0.103.10
Netmask: 255.255.255.0

Our storage unit virtual machine is running FreeNAS. The configuration below
is what has been set up for our storage unit:
IP address: 10.0.103.20
Netmask: 255.255.255.0

John Rodriguez
Nicholas Diley
Brook Cayce
NTS350

Our packet analyzing virtual machine is running Security Onion. The


configuration below is what has been set up for our storage unit:
IP address: 10.0.103.30
Netmask: 255.255.255.0

John Rodriguez
Nicholas Diley
Brook Cayce
NTS350

Our first sensor to capture traffic data on the NTW216 vlan is running
FreeBSD. The configuration below is what has been set up for our NTW216 sensor:
IP address (our VLAN): 10.0.103.254
Netmask (our VLAN): 255.255.255.0
IP address (NTW216 VLAN): 192.168.108.254
Netmask (NTW216 VLAN): 255.255.255.0

John Rodriguez
Nicholas Diley
Brook Cayce
NTS350

Our second sensor to capture traffic data on the NTS330 vlan is running
FreeBSD. The configuration below is what has bene set up for our NTS330 sensor:
IP address (our VLAN): 10.0.103.253
Netmask (our VLAN): 255.255.255.0
IP address (NTW216 VLAN): 172.16.121.254
Netmask (NTW216 VLAN): 255.255.255.0

The boxes created would be the two sensors that will be utilized within our VLAN
and other classes' VLANs, Kali 2.0 is our workstation environment, our Snort
environment, and an storage box.

John Rodriguez
Nicholas Diley
Brook Cayce
NTS350
References

Bejtlich, Richard. The Tao of Network Security Monitoring: Beyond Intrusion


Detection. Boston: Addison-Wesley, 2005. Print.
"Security Onion." : Is a Linux Distro for IDS, NSM, and Log Management. Web. 21
Sept. 2015. <http://blog.securityonion.net/p/securityonion.html>.

S-ar putea să vă placă și