Auto-translation used

Basic techniques for working with the hardware and software of the "NETWORK SECURITY" stand

We are learning network security in practice! We are getting acquainted with the stand and its capabilities. 

Network security is a set of measures and technologies aimed at protecting computer networks and data from unauthorized access, use, disclosure, violation, modification or destruction. Our stand "Network Security" provides an excellent platform for students majoring in telecommunications at ALT Mukhamedzhan Tynyshpayev University JSC to study and practice the basic techniques of work in this field. In this post, we will talk about the key components of the stand and the basic principles of working with them. 

  1. Hardware part:Overview of the main devices: routers, switches, firewalls, servers, client machines, intrusion detection and prevention systems (IDS). Connecting and configuring devices: a step-by-step guide on connecting stand components to a single network, configuring IP addresses, subnet masks, and gateways.Hardware security features: learning how firewalls work, configuring them to filter traffic, and protecting against DoS/DDoS attacks.
  2. Overview of the main devices: routers, switches, firewalls, servers, client machines, intrusion detection and prevention systems (IDS).
  3. Connecting and configuring devices: a step-by-step guide on connecting stand components to a single network, configuring IP addresses, subnet masks, and gateways.
  4. Hardware security features: learning how firewalls work, configuring them to filter traffic, and protecting against DoS/DDoS attacks.
  5. Software:Installation and configuration of operating systems: work with various operating systems (Windows, Linux) on servers and client machines.Network Traffic Analysis: Using Wireshark to capture and analyze network packets, identify anomalies and suspicious activity.Setting up and using protection tools: installing and configuring antivirus software, firewalls, VPN clients, and access control systems.Security testing: conducting pen penetration testing using Kali Linux, identifying vulnerabilities and weaknesses in the system.
  6. Installation and configuration of operating systems: work with various operating systems (Windows, Linux) on servers and client machines.
  7. Network Traffic Analysis: Using Wireshark to capture and analyze network packets, identify anomalies and suspicious activity.
  8. Setting up and using security tools: installing and configuring antivirus software, firewalls, VPN clients, and access control systems.
  9. Security testing: conducting pen penetration testing using Kali Linux, identifying vulnerabilities and weaknesses in the system.
  10. Basic working methods:Configuring firewall rules: defining rules for filtering traffic, blocking unwanted sites and services.VPN Connection Configuration: create and configure VPN tunnels for secure remote network access.Authentication and authorization: setting up user authentication mechanisms, delimiting access to resources.Security Monitoring: Configure a monitoring system to monitor network activity and detect suspicious events.
  11. Configuring firewall rules: defining rules for filtering traffic, blocking unwanted sites and services.
  12. Configuration of VPN connections: creation and configuration of VPN tunnels for secure remote access to the network.
  13. Authentication and authorization: setting up user authentication mechanisms, delimiting access to resources.
  14. Security Monitoring: Configure a monitoring system to monitor network activity and detect suspicious events.

   15. Stand configuration

1. The switching rack is equipped with:

- hardware firewall (D-Link DSA-2108A) – 2 pcs;

- Layer 3 switch (D-Link DGS-3130) – 1 pc;

- Layer 2 switch (D-Link DGS-1100) – 1 pc;

- unmanaged switch (D-Link DES-1005) – 1 pc;

- Wi-Fi router (D-Link DIR-615) – 2 pcs;

- RJ-45 switching panel – 1 pc;

- socket block – 1 pc.

2. The PCs included in the stand package have two pre-installed software options.

PC1 (SRV) consists of a PC system unit with the Debian 12 operating system and a pre–installed software package (hereinafter referred to as the software):

- The Apache2 HTTP server;

- VirtualBox virtualization software;

- Wireshark network traffic analyzer.

PCM2-PC4 (WS2-WS4) consist of a PC system unit with the Linux Mint operating system, monitor, keyboard, mouse manipulator, as well as a pre-installed software package:

- Wireshark Network Traffic Analyzer;

- VirtualBox virtualization software;

- Midnight Commander file manager.

Conclusion: The Network Security booth is an excellent tool for gaining practical skills in the field of information security. By gradually mastering the hardware and software, you will be able to gain a deeper understanding of how network technologies work and learn how to effectively counter threats.

Comments 0

Login to leave a comment