Student Name ________________________________ Date 05/09/2013_____________
SEC572 Security Testing iLab
Task 1 – Verify Connectivity between Router and Hosts
Complete the table below based on the dynamic routes displayed in the routing table:
Routing protocol Destination Network Metric Outbound Interface
R - RIP 192.168.100.0/24 1 Serial0/0
R- RIP 192.168.200.0/24 1 Serial0/1
• Select the Task 1 commands and output in the Virtual CLI using the mouse. Click on the Copy button. Use V to paste the commands into your Lab Document.
ISP_Router con0 is now available
Press RETURN to get started.
ISP_Router>
ISP_Router>
ISP_Router>
ISP_Router>
ISP_Router>enable
ISP_Router#show ip interface brief
Interface IP Address OK? ...view middle of the document...
168.100.0/24 [120/1] via 00.100.10.2, Serial0/0
R 192.168.200.0/24 [120/1] via 00.100.20.2, Serial0/1
C 200.100.0.0/24 is directly connected, FastEthernet0/0
C 200.100.10.0/24 is directly connected, Serial0/0
C 200.100.20.0/24 is directly connected, Serial0/1
C 200.100.40.0/24 is directly connected, FastEthernet1/0
ISP_Router# ping 192.168.100.10
Type escape sequence to abort.
Sending 5 100-byte ICMP Echos to 192.168.100.10, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms
ISP_Router#ping 192.168.100.11
Type escape sequence to abort.
Sending 5 100-byte ICMP Echos to 192.168.100.11, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms
ISP_Router#ping 192.168.200.10
Type escape sequence to abort.
Sending 5 100-byte ICMP Echos to 192.168.200.10, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms
ISP_Router#ping 192.168.200.11
Type escape sequence to abort.
Sending 5 100-byte ICMP Echos to 192.168.200.11, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms
ISP_Router#
Task 2 – Flow Analysis Security Port Scans
• Open the Permitted services links Public_Server->Dallas_Host and Public_Server->Dallas_Server. Note the TCP and UDP port numbers that are open. Use to capture the Public_Server->Dallas_Host and the Public_Server->Dallas_Server windows and use V to paste the two captured windows into your Lab Document. [Note: expand the window to show the entire table content]