0% found this document useful (0 votes)
8 views

cyber security record outputs

The document outlines various methods for enabling ActiveX in Google Chrome and provides detailed steps for establishing a peer-to-peer network connection using two systems. It includes instructions for configuring network settings, setting up VLANs, and securing access with passwords. Additionally, it discusses the importance of saving configurations and provides examples of commands for managing network devices.

Uploaded by

mohdhasham330
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
8 views

cyber security record outputs

The document outlines various methods for enabling ActiveX in Google Chrome and provides detailed steps for establishing a peer-to-peer network connection using two systems. It includes instructions for configuring network settings, setting up VLANs, and securing access with passwords. Additionally, it discusses the importance of saving configurations and provides examples of commands for managing network devices.

Uploaded by

mohdhasham330
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 8
SCE 2 2 22 Ci omen Ld < CYBER SECURITY RECORD Enabling ActiveX on Ovome ‘There are two methods that you can use fr ths. Go thaugh them both and choose the method that's eas for yout oom, Methods ‘en your Googe ome bowser Chrome Remote Desktop step2 ick onthe Google Chore menu option (tee hortonta a vert nests, depending on the version that youhav instal), a © G Q Rotate screen Play Share Search From there, you i be ale ose a the secur settings that you can change Sot own ‘nd sll the Promet option er oth “Dowmlaed Signed AteX Cnt" and "Dowland Unsigned Activex Control sacs". Also, rake sre that Enable hasbeen checked nthe "Run ‘eRWEX Contol and Pl” sectio. ick on OX and estar your browser forthe chang tobe saved. 6, WRITE THE STEPS TO ESTABLISH PEERTO PEER NETWORK CONNECTION USING TWO SYSTEMIN ALAN? ‘Aarware You Wi Heed 4 atlas two computers 18888- Ci omen Ld < CYBER SECURITY RECORD Step: Seta management and default gateway ‘The management? adress where youcan into te swtch or future sministratie lass: Orce your management P Setup, you can uefa SI nt the stn and configu it ‘ver the network est, we aces Privileged EXEC mode with the “enable such conguration command: From mere, we enter Global Configuration mode wih “cong (or “congue tema [ester configuration commands, one gor Line. En with “CuTL/2".) suten(conia)# No, we aces the VAN interac! Ssutten(cong)titerface wlan 2 suten(con igi" Now, we can assign the management IP and suet. this example, assign 1010.12.11 wth 2255255255 subnet. sure to replace that withthe core values or your steht suteen(conFg-t0ip odes 10.20.1132 25.255.28.0 suien(con gt We canesitinterfaceconfgwation mage and asen a default gateway For the sth from otal coniguation mode suten(conig-sfhenst Suien(conFgynipcefaut-gateay 1.26.22. susze(consa)# Step 3: Set hoxtname and domain are In adation to sting the I adress of the atch, you should ge ia lgialhastmame. Todo that we eter global configuration mode and use te hostname command ‘suitch(conghmestrane Poppersedeegttch Peopentretaesntt config) Siriry we can alto aa domain name withthe domain command eopentrt ester conta Peopentrt ester conig)n a © G Q Rotate screen Play Share Search BEER EEE eee eee eee ee eee eer eee reppectetggsnttcconig)tip domain rate cafe. Leal Peppntetaesuten( cota) Step 4: Se gis on VIV oes ane conse port Strong pasword ae an important part of hardening a managed switch, so nest wel adda password tol vita ternal (TY ines Oe ston he 16 VTV nes which ae ef Femote aces, swell configure the ate range em 0-15: Peopentrgsnttccontigyine vty 835 Peopentrt eset contigs) posvord Peopentratggsnttrcofig- ine} Secreto Tage Peopentrt eset contig Line} textt Peopentrasnttencontig)ine console @ Peopentrt eset contigs) posvord Peoprarggsntch config}? 9 gSeretForconslaben ETL Steps: Set veges EXC passwort In ation to password orctecing the VIV an console ines, we can and shoud protect Privileged EEE made witha password. We can othat rom elaal configuration mode: Peopentrt eset contig Line} texit PeoperindggsnitcnconFgyteable secret TopheentPriviScpeswon Peopentrtgsutte config) step 6: nate SH ‘come point youl ind youre inneed of access to your network eves, and yore not Dysieatyn the sane room as them, To access a ats CL ver the nears youl need to tse Telnetor 5. From a secu perspective, Telnet is usually @non-startr because ats lwonsed in paint. Tat eaves us wih SS. ‘The at step to enabling SH is generating he RSA hes: Peopentrtesnttccontig)erypto ey generate se The name for the hays will be: Peppertedegsuite.cafedhnny stays oosing 8 kay mules greater thon 512 may take 2 fev minutes oe many Bs 4 the nous (208) 1 Generating 2088-0 RSE hays, eps wll be nn-eportale. [0] Peopertrtaesnttc cong) Next, well the SH version to 2 Peopensrtgsuteencontg)ip ssh version 2 Feppectrtagsntchcofis)# Now, we an set Sup en spectic VV ines. use the st ines here: Fone 2 Ci omen Ld < CYBER SECURITY RECORD eopertetaasnitchconie)terypto ey generate se Chose the sin of he hy mls Sn the range of 360 88 for yur Geel Pp ow many ts £9 the nodules (2088) 1 Generating 2088-96 RSA keys, ey wll Be non-eportoble [0] Pepponaetaesutten(cotiay eopentresnttc contig) ssh version 2 Peopentrt este contig)n Now, wecan set SS upon spect VY nes. i use the fst nes here: reppectetggsnttch cong) vty 8S pevtesgsuiten config Line)eranpart aout 22h aly, weltalthe steht heck he local vor oatbase to authenticate users Peoeriraesn ten cong-Linefloein Toca Peoecietaesutccote-1ie) Step 7: Create VAs (ne of the most obvious reasons to sea manage stn she ait to ceate VANS to separate network segments. We cand that by ising the wan command, and hen asining our VIAN a name. For example, fo weateVLAN2 and name -cale Peopertrtaasnttc config Line¥vian 2 Peopentreasnttencontg-vian¥nane cafe Peopentrt ester cofig-vion)t ‘You can now ext, an epeat hese stops fr as many VANS a5 you nes. step 8: Add aces ports toa WAN ‘er we creat ou VANS, we can ak port to them. For example oad pots 5,6, an 7 95, sees psn VLAN 2, we can ise these sien conigufaton commana a © G Q Rotate screen Play Share Search Step 8: Add access ports to a VLAN ‘After we create our VLANS, we can add ports to them. For example, to add ports 5, 6, and 7 as access ports in VLAN 2, we can use these switch configuration commands PepperAndEgeSwitch(config-vlan)#exit PepperAndEggSwittch(config)#interface range fast PepperAndEggSwitch(config)#interFace range fastEthernet 0/5-7 PepperAndEggswitch(conFig-if-range)tswitchport mode access PepperAndEgeSwitch(config-if-range)#switchport access vlan 2 PepperAndEgeswittch(config-if-range)# ‘Step 9: Configure trunk ports If you need one port to transmit traffic from multiple VLANs, you'll need to designate it a “trunk Port”. To make a port a trunk port, we simply access its configuration and set the mode to ‘trunk. For example, to make port 2 on our switch a trunk port: PepperAndé ggsui tch(contig-4f-range)#exit PepperandtggSuitch(config)winterface fastethernet 0/2 PepperAndEggSwitch(config-if)#switchport mode trunk PepperAndé ggSuitch(config-if)# ‘Step 10: Save configuration ‘When our configuration is complete, we can save our changes to the startup configuration. Don’t forget this step, or all your work will be gone come the next switch reboot! PepperAndEgeSwitch(config-if exit PepperAndEggSwitch(config)#exit PepperAndEggswittch# XSYS-5-CONFIG_I: Configured from console by console PepperAndEggSwittchtcopy running-config startup-config Destination filename [startup-config]? Building configuration. [ok] PepperAndEggSwittch# if (ipaddress return Output ) The output of the program will be: Enter input string. ‘CodeSpeedy@1213, Strong password. Enter input string. codets Moderate password Enter dnput string. Nave leak password 14, WRITE THE STEPS TO TRANSFER FILES BETWEEN WIRELESS COMMUNICATION USING BLUETHOOTH AND FTP?

You might also like