Time
6 hours 28 minutes
Difficulty
Intermediate
CEU/CPE
7

Video Transcription

00:00
Welcome back to the surgery course in building your impulse set leg. I'm your host and instructor, Kevin Hernandez.
00:07
In our last listen, we discuss a different technologies applications soft for tools that we can utilize in our info sect lab. We look at tools such as I. P s
00:19
firewall ideas a cm's what? Proxies,
00:24
Virtual machines after directory with nobility, scanners, pen testing, forensics, among others.
00:31
In this lesson, what will start looking into the different harbor requirements each and every one of these applications will require. Now, this is very important, as the hardware requirements will dictate how many appliances or how many tools we can fit into one machine using our Belcher machines. Social s Excite, right?
00:51
Uh, power hungry or a resource hungry tools such as I am might need to have it
00:57
own dedicated bucks. However, you can always compensate these by the amount of resource is you put into the machine. A machine with, let's say, 32 gigabytes of RAM will be able to host a lot more Burton machines that a system, let's say four gigabytes of ram, right?
01:12
And this is something we do have to consider when building a machine, so it's very crucial you go through the list and building this details
01:21
and keeping track of your resource is actual building the laps now as mentioned before,
01:26
If you have a system that's office line, you will have less. Resource is and it's really requires. So I'll keep that into consideration based your host environment, right? Also, if you have 100 systems versus 20 systems, that will also reduce a requirement or increase Thomas well, so these are not set in stone. Just take the Massa
01:46
kind of recommendation or a small guide, right?
01:48
So let's start working on to this and we will start by looking into a firewall.
01:53
So let's get into it. Every. Remember from our previous document we have PF sends I be force and untangle less potential firewalls to utilize. So let's start looking into these less Harwood pf sense. Then we'll movinto before us and entangle. Now.
02:09
It's not that wise to have three firewalls in your same network from different vendors.
02:15
If it's a small office or home office, right, Yes, you will have a lot of upkeep, and that might come in a lot of
02:22
issues s you build a slap, right? So in this case, try to pick one that you really like or more accustomed to,
02:32
or the one that meets better your criteria for me from agree perspective, etcetera. Right. So let's start with p of sense here,
02:44
and we literally go to the nature sourced original source here.
02:49
Now, in here, you have to look at the different products so you can have taken their toll. Applies that have different solutions. Incinerate.
02:55
So
02:58
let's go to products through quick.
03:00
And here you can see the details off. Some of the devices stay half so small Office, branch, office. And from here, you can get a general idea what? I'm on a resource, if you require, such as one gigabyte ram it given guides off storage and three ports, which, actually, this is what this brings. Right? So
03:19
you got a general idea of what you need
03:23
from the hard work perspective.
03:24
But if you're bringing your own tool,
03:28
let's say bill your own. Here, you can see you need this resource is over here.
03:34
So what we're gonna do is we're gonna open excel sheet
03:38
and in districts sell sheet, right? We're gonna add those
03:42
resource is here. So let's have the tool on the left
03:46
PF sense right in here. We're gonna have
03:49
minimum
03:52
recommend it,
03:53
right? And let's say CPU, right?
03:59
Recommended to CPU.
04:02
And then we also have been among the room
04:08
recommended rim.
04:13
And there might be a couple of things here such a storage, but in this case is not show. So that's okay.
04:19
This this is one gigabyte hard drive.
04:21
So what's that? Storage.
04:27
So minimum CPU, it's 500 hertz.
04:32
And for ram, its founder and 12 megabytes.
04:35
And to recommend it, it's long did to her.
04:41
And one gigabyte of ram and four sources This one gigabyte. However, if you recall correctly earlier
04:47
from this little device over here
04:49
Ah, it has a gigabytes of storage options. So I'm gonna use the bigger one of the two.
04:55
Yes, s a safety precaution. OK, And that's about it for p f sense. So let's look at I p fire instead of eye before, uh, had a typo
05:04
Sorry for that in here.
05:06
I have never utilized this one. But if you go to download
05:11
right here and you go too sorry support
05:16
and you go to the communication
05:19
you can have system requirements right here, and you can see you need a X 86.
05:25
Fine.
05:26
Um, it says 5 12
05:30
or one gig
05:31
for storage. Um, doesn't really give too much details to gigs here.
05:38
Support after three terabytes. And for this case, it says one gigahertz. So it looks very, very similar to what PF sense utilizes. And that being the case, I'm gonna literally just copy paste them, and that's gonna be in and maybe
05:56
upgrade here, right here, That one to your heart's recommended one. Do you hurt to see?
06:00
So this leave it as if,
06:02
as it's literally the same amount off storage. And let's look at the other source right, which is
06:11
untangle.
06:14
And let's pick this for future use, right.
06:17
So as we look for entangle, you see, it's a next generation farmer. All's well,
06:23
and if you go here to get entangled for download, you'll see it are here. Now, this is Ah, 14 day trial with paid abs, and then you have to either pay for the apse itself or the complete subscription. So it really depends what you're looking for.
06:42
But right here,
06:44
you see, you have free I ps, you have free firewall, virus locker, light and fish blocker. So what you will have to pay for Sorry. These are two free ones. Will be SSL inspector, for example. You have will have to pay for a web filter
07:00
Spam blocker application control
07:03
at all these different other tools, right? So it really depends what you need if this will meet or not. Your requirements now
07:11
warning ISS. If you, for example, required to put your email or phone number to do any type of installation,
07:19
they will be contacting you and I require you to buy software by the 19 terror. This doesn't seem like that type of product, but has a warning in case you do end up using it. In this case, you see, it is a 80 gigs hard drive,
07:35
two gigabytes of memory into network card. So it looks very similar, uh, excluding the memory, which a little bit higher. So we'll make those notes. And it doesn't say which type of frequency or hurts Rick are for the CPU. So this case will go to one gigahertz, right?
07:55
So let's put
07:57
one big here
07:59
for Ram. It doesn't. It says, too
08:03
solicitude unites. Here, Here, in this case, is 80 gigabytes. There's a lot of difference when it comes to resource is.
08:11
But you got a general idea
08:15
what it's require from each of these, right?
08:20
And now that you have the list completed,
08:22
one of things elected its try to be as organized as possible. So it right here I will type firewalls
08:28
right in our merchants entities.
08:31
And they were still looking into our next product right here.
08:35
And there were start building around that right.
08:39
One thing you can start doing now, if you want it, you can start downloading the different tools. So, for example, USB image. You can download it
08:46
and you can do the same thing as you can see for I p fire here. So let's go back to the fire,
08:54
all right? And you can download it
09:03
here
09:05
and go for a flash image. That way, you don't have to be downloading or using all the tools to be able to accomplish this endless to the same thing for PF sentence. And here go download and you have e takes the four bit
09:24
and a stall. Ergo, USB members dollar right
09:28
Onda Council
09:30
else who
09:31
PGA just in case
09:33
down. And let's finish wait for those to be finished. And don't basically be a wrap up for this. So what you're really learned is
09:43
tracking. The resource is required for elaborate specifically for. The firewalls will be doing this same thing for other tools. And that will give us a general idea how much ram will need or how many appliances you can put in the device you require. In my case, fire was one of the most important ones
10:01
out there, especially being next generation far walls.
10:05
If you go back down to that list, we might not need a dedicated I Pierre who might not need it. A dedicated where proxy right. But it is very important to consolidate if your resources are limited.
10:18
Most products out there, such as Palo Alto Checkpoint,
10:22
already have these things integrated into them. So having them injured lap as one, it's not unrealistic, and it's something to be expecting,
10:31
so I hope to see you soon in our next lesson will be looking at a different tool, such as
10:37
De wet proxies are DEA. Zion's have a great day

Up Next

Building an InfoSec Lab

This course will guide you through the basics of incorporating several Information Security Engineering Tools in your home and/or lab. By building this lab you will be able to obtain corporate-level security within your home network, as well as a higher understanding of the capabilities and advantages these tools bring to your network.

Instructed By

Instructor Profile Image
Kevin Hernandez
Instructor