[Network security]Firewall Configuration
overview
- Build a virtual machine to serve as a hardened machine
- Establish a segmented architecture to isolate and protect network services
This lab tells how important to reduce the attack surface to protect IT assets such as websites, systems, and apps from attackers. Attackers must research the target by scanning to gain information.
Reducing attack surfaces helps prevent attackers from scanning and minimizing the unnecessary services exposed outside the organizations.
It is possible to reduce the attack surface by setting up firewalls, implementing a segmented architecture, and stopping services, not in use.
Access the Windows 10 machine and the Smoothwall login interface (192.168.100.20:441)
Use the Nmap command to see which port is open. Nmap -sV means SYN scan + verbose option.
Purple interfaces are wireless networks and not used here, so select them as current exceptions and remove them.
Set eth1 interface to configure 192.168.20.100
Test to ping 192.168.20.100 that the smooth wall machine can reach the owasp machine.
Configure Smoothwall access of incoming.