Wednesday, February 18, 2009

IS316 Lesson Plan 2/18/2009

Packet Tracer Configuration



Check initial settings
· Check that
o BM2,M+BM4,BM6 have no fixed IP address – they obtain it from the Birmingham Server (Check DNS setting on the server).
o BM1,BM3, BM5, BM7 have fixed IP addresses in the 192.168.50.0 network.
o LV1 and LV2 are on the 192. 168.75.0 network.
· Check that all the PCs within a network can ping each other and the server on the network .
o BM1-7 and Birmingham server and 192.168.50.254 (on router) are pingable
o LV1, LV2 and Liverpool server are all pingable
· Check that you cannot ping from one network to the other
o Ping LV1 from BM7
o Check the time to live info!!!!!
· Now double click on the Liverpool server and click on the CLI (Command Line Interface)
Displaying Details of the router
Show Interface details
Router>enable
Router#show ip interface brief

Interface IP-Address OK? Method Status Protocol
Fastethernet0/0 Unassigned Yes Manual Administratively down down
Fastethernet0/1 Unassigned Yes Manual Administratively down down
Serial0/0 Unassigned Yes Manual Administratively down down
Serial0/1 Unassigned Yes Manual Administratively down down
Change the Router name
Router#configure terminal
Router(config) Hostname Liverpool
Liverpool(config)#
Configure Interfaces
Fastethernet interface
Liverpool(config)#Interface Fastethernet0/0
Liverpool(config-if)#ip address 192.168.75.254 255.255.255.0
Liverpool(config-if)#no shutdown

Serial interface
Liverpool(config-if)#interface serial0/0
Liverpool(config-if)#ip address 192.168.200.2 255.255.255.252
Liverpool(config-if)#no shutdown

View results
Liverpool(config-if)#exit
Liverpool(config)#exit
Liverpool#show ip interface brief

Interface IP-Address OK? Method Status Protocol
Fastethernet0/0 192.168.75.254 Yes Manual up up
Fastethernet0/1 Unassigned Yes Manual Administratively down down
Serial0/0 192.168.200.2 Yes Manual up up
Serial0/1 Unassigned Yes Manual Administratively down down

Check if connection between networks is now working
o Check that all interfaces are glowing green (connected and running)
o Using the simulation mode check you can send a packet from
o Birmingham router to Liverpool router
o LV1 to Liverpool router
o BM1 to Birmingham router
o LV1 to Birmingham router
o BM1 to Liverpool router
o BM1 to LV1
o Note you may need to send them a couple of times to check that they do work!

Now turn off the Liverpool server and do it all again!
o Watch it turn on in the CLI

Wednesday, February 11, 2009

Project Part 6

Project
Part 6
Tasks:
Final presentation and supporting documentation
Deliverables and format:
Submit your answer in a Microsoft PowerPoint with
supporting documents in Microsoft Word
Font: Arial; 10
Line Spacing: Double
Assigned and Due Date:
Assigned: Week 9
Due: Week 11

IT316 Lesson Plan February 11, 2009

UNIT 9 – EXPLAIN HOW TO BUILD
FIREWALL
READING
• Chapter10, pp. 319–356
OBJECTIVES
After completing this unit, the student will have the opportunity to:
7. Implement and administer a firewall.
7.1 Describe categories of firewalls (desktop and enterprise).
7.2 Explain when each category is used.
7.3 Identify how to administer a firewall.
8. List the main component of National Institute of Standards and Technology (NIST)
publication 800-41 as it applies to firewall.

SUGGESTED ACTIVITIES, ASSIGNMENTS & DELIVERABLES
Assignment/Activity Deliverable
Case Assignment 1:
From textbook, complete Case Project 10-2 on page 355: Remote Access Software and Firewalls
The students will submit an essay in Microsoft Word format.
Font: Arial
Font Size: 10 Point
Due: By end of Week 9

Case Assignment 2:
From textbook, complete Case Project 10-3 on page 355: Which Firewall to Use
The students will submit an essay in Microsoft Word format. It should be a minimum of pages.
Font: Arial
Font Size: 10 Point
Due: By end of Week 9
Project Part 5: Submission
Project Part 6: Initiation
Refer to syllabus under course project for deliverables.
Verify their understanding of the project as well as the
deliverables required.
REVIEW QUESTIONS
Chapter 10
1. Review Questions 1–20, pp. 343–346
LAB 1:
Complete Project 10-1 on page 346 from the textbook, Holden, Greg, Guide to Firewalls and Network
Security Intrusion Detection and VPNs
LAB 2:
Complete Project 10-2 on page 347 from the textbook, Holden, Greg, Guide to Firewalls and Network
Security Intrusion Detection and VPNs
LAB 3:
Complete Project 10-3 on page 346 from the textbook, Holden, Greg, Guide to Firewalls and
Network Security Intrusion Detection and VPNs

Wednesday, February 4, 2009

Project Part 5

Project
Part 5
Tasks:
What can be done to provide security regarding the personnel
who operate remotely?
Deliverables and format:
Submit your answer in a Microsoft Word document

IS316 Lesson Plan 02/04/2009

UNIT 8 – EXPLAIN HOW TO IMPLEMENT A VIRTUAL PRIVATE NETWORK
READING
• Chapter 9, pp. 277–318
OBJECTIVES
After completing this unit, the student will have the opportunity to:
9. Implement virtual private network—VPN.
9.1 Define VPN.
9.2 Explain the components of a VPN.
9.3 Explain types of VPN solutions.
9.4 Identify VPN setups.
9.5 Identify various tunneling protocols.
9.6 Enable secure remote access via a VPN.
9.7 Identify best practices for configuring and maintaining VPNs.


SUGGESTED ACTIVITIES, ASSIGNMENTS & DELIVERABLES
Assignment/Activity Deliverable
Case Assignment 1:
From textbook, complete Case Project 9-1 on page 318:
Setting Up a VPN
The students will submit an essay in Microsoft Word format. It should be a minimum of 2 pages.
Font: Arial
Font Size: 10 Point
Due: By the end of Week 8
Project Part 4: Submission
Project Part 5: Initiation
Refer to syllabus under course project for deliverables.
Verify their understanding of the project as well as the
deliverables required.

REVIEW QUESTIONS
Chapter 9
1. Review Questions 1–20, pp. 306–309

LAB 2:
Complete Project 9-1 on page 310 from the textbook, Holden, Greg, Guide to Firewalls and Network Security Intrusion Detection and VPNs
LAB 3:
Complete Project 9-2 on page 310 from the textbook, Holden, Greg, Guide to Firewalls and Network Security Intrusion Detection and VPNs
LAB 4:
Complete Project 9-7 on page 314 from the textbook, Holden, Greg, Guide to Firewalls and Network Security Intrusion Detection and VPNs

Wednesday, January 28, 2009

Project Part 4

Tasks:
• How would the operations of packet filtering and
encryption be used:
􀂃 Preventing the spread of malicious code
􀂃 Preventing intrusion attacks
Deliverables and format:
Submit your answer in a Microsoft Word document
Font: Arial; 10
Line Spacing: Double
Assigned and Due Date:
Assigned: Week 6
Due: Week 8

IS316 Lesson Plan 01/28/09

OBJECTIVES
After completing this unit, the student will have the opportunity to:
11. Explain bastion host.
11.1 Define bastion host.
11.2 Define the general requirements for installing a bastion host.
11.3 Describe how to configure a bastion host.
8. List the main component of National Institute of Standards and Technology (NIST)
publication 800-41 as it applies to firewall.


SUGGESTED ACTIVITIES, ASSIGNMENTS & DELIVERABLES
Assignment/Activity Deliverable

Read Chapter 9, pp. 277–318
Chapter 9 Review Questions

Case Assignment 1:
From textbook, complete Case Project 8-1 on page 274:
Analyze Bastion Host Requirements
The students will submit an essay
in Microsoft Word format. It
should be a minimum of 1 page.
Font: Arial
Font Size: 10 Point
Due: By end of Week 7
REVIEW QUESTIONS
Chapter 8
1. Review Questions 1–15, pp. 159–161
LAB 1: HARDWARE AND SOFTWARE FIREWALLS
Learning Objectives:
• Contrast hardware and software firewalls.
Lab Procedures:
• Install software firewalls on student hard drives.
Security Intrusion Detection and VPNs
LAB 2:
Complete Project 8-3 on page 270 from the textbook, Holden, Greg, Guide to Firewalls and Network SKIP THIS LAB
Security Intrusion Detection and VPNs
LAB 3:Complete Project 8-4 on page 271 from the textbook, Holden, Greg, Guide to Firewalls and NetworkSecurity Intrusion Detection and VPNs
http://www.netscantools.com/downloadfiles/old/nst431.zip
LAB 4:Complete Project 8-5 on page 272 from the textbook, Holden, Greg, Guide to Firewalls and NetworkSecurity Intrusion Detection and VPNs