Skip to content

breatheco-de/Building-and-Securing-a-Network-with-a-DMZ

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Building and Securing a Network with a DMZ**

By @vanemorocho and other contributors at 4Geeks Academy

Estas instrucciones están disponibles en 🇪🇸 español 🇪🇸

🌱 How to start this project?

Download here the file and open it with Packet Tracer.

Once you have opened the file with Packet Tracer you will see the floating window with the instructions to follow.

📝 Instructions

Create a simulated network environment that includes a Demilitarized Zone (DMZ), configure firewalls, gateways, and network detection systems, and ensure network security.

Components:

  1. Network Design:

    • Design a network layout that includes a DMZ, internal network, and external network.
    • Set up virtual machines or use a network simulation tool to create the network environment.
  2. Firewall Configuration:

    • Configure firewalls to segment the network into DMZ and internal networks.
    • Set up firewall rules to control traffic between the internal network, DMZ, and external network.
  3. DMZ Setup:

    • Deploy services in the DMZ such as a web server, mail server, or DNS server.
    • Ensure that the DMZ is isolated from the internal network but still accessible from the external network.
  4. Gateway or Proxy Server:

    • Configure a gateway or proxy server to manage traffic between the internal network and the external network.
    • Implement access control policies on the proxy server.
  5. Network Detection and Response (NDR):

    • Deploy and configure NDR tools to monitor network traffic and detect suspicious activities.
    • Set up alerts and logging for network events.
  6. Security Testing:

    • Perform network scans and vulnerability assessments using tools like Nmap to identify potential security issues.
    • Test the firewall rules and network segmentation to ensure that unauthorized access is prevented.
  7. Documentation and Reporting:

    • Document the network design, firewall rules, and security configurations.
    • Prepare a report summarizing the project, including any vulnerabilities discovered and the steps taken to address them.

This project will give participants hands-on experience with configuring and securing a network environment, applying the concepts of network defense, firewalls, DMZ, and network detection and response.

🚛 How to deliver this project?

Once you've finished the Packet Tracer instruction steps, please save your changes and attach the file to the 4geeks.com platform in the corresponding project.

  • Configuration of the Internal, External, and DMZ networks in the proposed network design.
  • Configuration of the firewall and gateway to control traffic between the internal, external, and DMZ environments.
  • Screenshots of access and traffic blocking tests between the specified environments.
  • Report detailing the proposed design's applied security measures and security recommendations.

Contributors

Thanks goes to these wonderful people (emoji key):

  1. Vanessa Morocho (vanemorocho) contribution: (build-tutorial) ✅, (documentation) 📖

  2. Alejandro Sanchez (alesanchezr), contribution: (bug reports) 🐛

This and many other exercises are built by students as part of the 4Geeks Academy Cybersecurity Bootcamp by Alejandro Sánchez and many other contributors. Find out more about our Full Stack Developer Course, and Data Science Bootcamp.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published