You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
37 lines
1.2 KiB
37 lines
1.2 KiB
|
|
= Hybrid Cloud Connectivity
|
|
|
|
|
|
== Create VPN
|
|
|
|
|
|
****
|
|
TIP: Create VPN
|
|
|
|
video::565597681[vimeo,start=1 ]
|
|
****
|
|
|
|
== Find All IP Addresses and used ports on a Network
|
|
|
|
On modern operating systems, ports are numbered addresses for network traffic. Different kinds of services use different ports by default.
|
|
|
|
image:./nmapscan.png[width=400,float="right"]
|
|
For example, normal web traffic uses Port 80, while POP3 email uses Port 110. One of the ways that a firewall works is by allowing or restricting traffic over a particular port.
|
|
|
|
Because the ports can cause a security risk, it’s critical to know which ports are open and which are blocked.
|
|
|
|
http://docs.swarmlab.io/SwarmLab-HowTos/swarmlab/docs/build/site/swarmlab_sec-intro/docs/index.html[Network Scanning]
|
|
|
|
Nmap, short for Network Mapper, is a free, open-source tool for vulnerability scanning and network discovery. Network administrators use Nmap to identify what devices are running on their systems, discovering hosts that are available and the services they offer, finding open ports and detecting security risks.
|
|
|
|
|
|
|
|
|
|
== Tasks
|
|
|
|
Make sure you have enough practice in the following tasks:
|
|
|
|
* Create VPN
|
|
* Discover IP addresses and Ports
|
|
* ping a remote node
|
|
* Use a remote service e.g. Datacollector
|
|
|