Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Draw a proper and understandable network Topology for the VMs mentioned on Packet Tracer to compare with our teachers topology because they made it confusing

Draw a proper and understandable network Topology for the VMs mentioned on Packet Tracer to compare with our teachers topology because they made it confusing for us to understand:
Network Topology:
3 internal VMs:
Metasploitable Windows (IPs': Repo: 169.254.11.246, sec.lab: 172.20.21.21/24),
Metasploitable Linux (IPs': eth0: 172.20.21.22/24, eth1: 172.20.12.22/24),
Security Onion (IPs': mgmt: ens192: 172.20.14.25/24, mirror: ens224: 172.17.0.1/24)
1 GW
1 external VM -> Kali Attacker (IPs': eth0: 172.20.12.10/24, eth1: 172.20.14.10/24)
Pros: Can simulate attacks from internal & external
Cons: 1 more VM (GW), more HW resources needed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Concepts of Database Management

Authors: Philip J. Pratt, Joseph J. Adamski

7th edition

978-1111825911, 1111825912, 978-1133684374, 1133684378, 978-111182591

More Books

Students also viewed these Databases questions