Recall that in Project 1-4, you surveyed available Azure subscription options and had the opportunity to...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Recall that in Project 1-4, you surveyed available Azure subscription options and had the opportunity to create an Azure subscription. In this project, you'll explore NSGS and ASGs in Azure. Complete the following steps: 1. In your Azure portal, create a VNet named something like MyVNet, and use the following details: a. Give it a /24 CIDR range, such as 192.168.0.0/24. b. Create a new resource group named something like MyRG. c. Give the subnet a name, such as MySubnet, and a /26 CIDR range, such as 192.168.0.0/26. 2. In the navigation pane, click All services. Select the Networking category, and click Network security groups. Click Create network security group. Give the NSG a name, such as MyNSG. Place it in your project's resource group that you created in Step 1. Click Create. 3. After the NSG is created, click it to see information about it. Answer the following questions: a. What inbound and outbound security rules are listed in your NSG? b. How many network interfaces are associated with this NSG? c. What subnets are currently associated with this NSG? Why do you think this is? 4. Notice that NSGS are associated either with network interfaces or with subnets. Microsoft recommends using subnets rather than network interfaces as a general rule, so now you're ready to associate your subnet with this NSG. Click Subnets under the NSG's Settings group, and then click +Associate. Choose your VNet and then choose the subnet. Click OK. 5. Return to the Virtual networks page, and click your VNet. Do you see your NSG listed here? 6. Click Subnets and then click your subnet. Do you see your NSG listed here? 7. In the navigation pane, click All services. Select the Networking category and click Application security groups. Click Create application security group. Give the ASG a name, such as MyASG. Place it in your project's resource group that you created in Step 1. Click Review + create and then click Create. When it's ready, click Go to resource. 8. Create a new Linux VM using the following details: a. Add the VM to the resource group you created for this project. b. Change the size to B1s. c. Use a password authentication type for simplicity in this project. d. Under INBOUND PORT RULES, select Allow selected ports and choose SSH. e. Confirm the VM will be added to your project VNet and subnet. What does Azure say about the VM's NSG? ---- 1/NAI_ 1 L! -- LIVKA/_ _1: _I_ AL... --- LI I_FL -FLI---- MAILL NOO - J.LI -L_L L: 1/1- Il-. : L 11. - 1: _^ Da vark. LI_:__. LL:- 8. Create a new Linux VM using the following details: a. Add the VM to the resource group you created for this project. b. Change the size to B1s. c. Use a password authentication type for simplicity in this project. d. Under INBOUND PORT RULES, select Allow selected ports and choose SSH. e. Confirm the VM will be added to your project VNet and subnet. What does Azure say about the VM's NSG? 9. Open the VM's information page and click Networking on the left under Settings. What NSG is associated with this VM? How many inbound port rules are currently listed? Why do you think this is? 10. Click Topology. What is the NSG connected to? le 11. Close the Topology blade. On the VM's Networking blade, click the Application security groups tab. Click Configure the application security groups. Select the ASG you created in Step 7, and save your changes. 12. Return to the details page for your NSG and click Inbound security rules, and then click +Add. Configure a new inbound security rule using the following details: a. Allow traffic from any source. b. Leave the Source port ranges as * because port filtering is typically performed on the destination port in Azure, not the source port. If you're feeling adventurous, change the Source port ranges to 22, and read the caution message at the bottom of the blade. Then change the Source port ranges field back to *. c. For Destination, notice that you can choose an IP address, VNet, or ASG as the destination for traffic covered by this rule. Select Application security group, and select the ASG you created in Step 7. d. Allow traffic to the destination on port 22 using the TCP protocol with a priority of 100 and a name of SSH_traffic. e. Click Add. 13. Return to the details page for your VM. How many inbound port rules are listed now? 14. Click the SSH_traffic rule. What warning does Azure give you about this rule? le 15. Delete all the resources you created in this project, including the VNet, subnet, NSG, ASG, VM, and resource group. In what order did you delete these resources? What error messages did you encounter? How did you handle these problems? Check through your account to confirm that all related resources have been deleted. le Upload Recall that in Project 1-4, you surveyed available Azure subscription options and had the opportunity to create an Azure subscription. In this project, you'll explore NSGS and ASGs in Azure. Complete the following steps: 1. In your Azure portal, create a VNet named something like MyVNet, and use the following details: a. Give it a /24 CIDR range, such as 192.168.0.0/24. b. Create a new resource group named something like MyRG. c. Give the subnet a name, such as MySubnet, and a /26 CIDR range, such as 192.168.0.0/26. 2. In the navigation pane, click All services. Select the Networking category, and click Network security groups. Click Create network security group. Give the NSG a name, such as MyNSG. Place it in your project's resource group that you created in Step 1. Click Create. 3. After the NSG is created, click it to see information about it. Answer the following questions: a. What inbound and outbound security rules are listed in your NSG? b. How many network interfaces are associated with this NSG? c. What subnets are currently associated with this NSG? Why do you think this is? 4. Notice that NSGS are associated either with network interfaces or with subnets. Microsoft recommends using subnets rather than network interfaces as a general rule, so now you're ready to associate your subnet with this NSG. Click Subnets under the NSG's Settings group, and then click +Associate. Choose your VNet and then choose the subnet. Click OK. 5. Return to the Virtual networks page, and click your VNet. Do you see your NSG listed here? 6. Click Subnets and then click your subnet. Do you see your NSG listed here? 7. In the navigation pane, click All services. Select the Networking category and click Application security groups. Click Create application security group. Give the ASG a name, such as MyASG. Place it in your project's resource group that you created in Step 1. Click Review + create and then click Create. When it's ready, click Go to resource. 8. Create a new Linux VM using the following details: a. Add the VM to the resource group you created for this project. b. Change the size to B1s. c. Use a password authentication type for simplicity in this project. d. Under INBOUND PORT RULES, select Allow selected ports and choose SSH. e. Confirm the VM will be added to your project VNet and subnet. What does Azure say about the VM's NSG? ---- 1/NAI_ 1 L! -- LIVKA/_ _1: _I_ AL... --- LI I_FL -FLI---- MAILL NOO - J.LI -L_L L: 1/1- Il-. : L 11. - 1: _^ Da vark. LI_:__. LL:- 8. Create a new Linux VM using the following details: a. Add the VM to the resource group you created for this project. b. Change the size to B1s. c. Use a password authentication type for simplicity in this project. d. Under INBOUND PORT RULES, select Allow selected ports and choose SSH. e. Confirm the VM will be added to your project VNet and subnet. What does Azure say about the VM's NSG? 9. Open the VM's information page and click Networking on the left under Settings. What NSG is associated with this VM? How many inbound port rules are currently listed? Why do you think this is? 10. Click Topology. What is the NSG connected to? le 11. Close the Topology blade. On the VM's Networking blade, click the Application security groups tab. Click Configure the application security groups. Select the ASG you created in Step 7, and save your changes. 12. Return to the details page for your NSG and click Inbound security rules, and then click +Add. Configure a new inbound security rule using the following details: a. Allow traffic from any source. b. Leave the Source port ranges as * because port filtering is typically performed on the destination port in Azure, not the source port. If you're feeling adventurous, change the Source port ranges to 22, and read the caution message at the bottom of the blade. Then change the Source port ranges field back to *. c. For Destination, notice that you can choose an IP address, VNet, or ASG as the destination for traffic covered by this rule. Select Application security group, and select the ASG you created in Step 7. d. Allow traffic to the destination on port 22 using the TCP protocol with a priority of 100 and a name of SSH_traffic. e. Click Add. 13. Return to the details page for your VM. How many inbound port rules are listed now? 14. Click the SSH_traffic rule. What warning does Azure give you about this rule? le 15. Delete all the resources you created in this project, including the VNet, subnet, NSG, ASG, VM, and resource group. In what order did you delete these resources? What error messages did you encounter? How did you handle these problems? Check through your account to confirm that all related resources have been deleted. le Upload
Expert Answer:
Related Book For
Statistics For Business And Economics
ISBN: 9780132745659
8th Edition
Authors: Paul Newbold, William Carlson, Betty Thorne
Posted Date:
Students also viewed these computer network questions
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Because of its seemingly insatiable "addiction to oil," in the past the US was and still purchases crude oil primarily from countries in the Middle East. It is said that each day, the average payment...
-
Data follow for the Dogar division of Nanda Inc.: Required: 1. Compute the margin and turnover ratios for each year. 2. Compute the ROI for each year. Year 1 Year 2 Sales Operating income Average...
-
The residents of the town Ectenia all love economics, and the mayor proposes building an economics museum. The museum has a fixed cost of $2,400,000 and no variable costs. There are 100,000 town...
-
During the assembly of an exhaust valve, sufficient distance must be maintained between the valve tip and the cylinder wall. If \(85 \%\) of valve assemblies have the required distance, use Table 1...
-
StorSmart Company makes plastic organizing bins. The company has the following inventory balances at the beginning and end of March: Additional information for the month of March follows: Raw...
-
Flag question: Question 1 Question 11pts _________________ is the ability to manage results of all types electronically including laboratory and radiology procedure reports, both current and...
-
1. The average distance in kilometers from a school in Chicago to the closest fast food restaurant is 0.60 with a standard deviation of 0.45. Express each of the following distances as a z score: a....
-
For a particular Java assembler interface, it is known that the operand stack size has the following probability distribution function: 0 1 2 3 4 . 2 5 . 2 0 . 1 8 . 1 7 . 2 0 What is the Expected...
-
What legal and ethical considerations should a counsellor be aware of when working with self-harm and suicidal behaviours?
-
If you are tasked to develop a training module on the topic of "conflict management" (how to manage conflict in the workplace), what training method would you use to develop this module, and why...
-
Part of a human resource manager's job is to analyze the benefits programs to ensure that an organization is compliant and that the costs are within budget. There are a number of required programs...
-
Why are the legal, safety, and regulatory requirements important to the HR process and to healthcare organizations?
-
Your agency has implemented a new policy that states all clients who are using illegal drugs will be reported to the police. You vigorously oppose such a policy and decide to ignore it. Aside from...
-
how can we use/compare using this formula d = a sin t ? A point P in simple harmonic motion has a frequency of oscillation o per minute and amplitude of 4 ft. Express the motion of P by means of an...
-
PC Contractors, Inc., was an excavating business in Kansas City, Missouri. Union Bank made loans to PC, subject to a perfected security interest in its equipment and other assets, including...
-
John Swanson, president of Market Research Inc., has asked you to estimate the coefficients of the model Y = 0 + 1X1 + 2X21 + 3X2 where Y is the expected sales of office supplies for a large retail...
-
From a random sample of six students in an introductory finance class that uses group-learning techniques, the mean examination score was found to be 76.12 and the sample standard deviation was 2.53....
-
The following model was fitted to a sample of 25 students using data obtained at the end of their freshman year in college. The aim was to explain students weight gains: y = 0 + 1x1 + 2x2 + 3x3 + ...
-
What can an employee exclude from income if he receives a safety or length of service award?
-
If your employer provides a retirement plan and has made all the contributions to your account, do you have basis in the account?
-
What are the benefits of an accountable plan?
Study smarter with the SolutionInn App