Skip to content

Firewall Configuration

In this lab, I used a multitude of different VM’s to play offense and defense. On the Offensive side, I ran a port scan using nmap and utilized Wireshark on the Kali Linux VM to view traffic patterns on the other machines. As the defender, I configured firewall rules to block and allow traffic, and observed the results of the configurations. The first document is the assignment guidelines, and the second document are the steps I conducted and the written lab report.

Assignment-3-Sword-vs.-Shield-1-1

annotated-Assignment20320-20Sword20vs.20Shield-1-1