Lab 2:  Network Security Groups and Application Security Groups

Objective

You have been asked to implement your organization’s virtual networking infrastructure and test to ensure it is working correctly. In particular:

  • The organization has two groups of servers: Web Servers and Management Servers.
  • Each group of servers should be in its own Application Security Group.
  • You should be able to RDP into the Management Servers, but not the Web Servers.
  • The Web Servers should display the IIS web page when accessed from the internet.
  • Network security group rules should be used to control network access.

Exercise 1: Create the virtual networking infrastructure

Step 1: Type Virtual networks and press the Enter key and click + Create.

Step 2: Fill in the details

On the IP addresses tab of the Create virtual network blade, set the IPv4 address space to 10.0.0.0/16.

Exercise 2: Create application security groups

Step 3: Type Application Security Groups and press the Enter key and click + Create and fill the following form to create an ASG.

Do the same process to create a management server.

Exercise 3: Create a network security group and associate the NSG to the subnet

Step 4: Type Network Security Groups and press the Enter key and click + Create and fill the following form to create a NSG.

Step 5: Associate the NSG with the Virtual network created in Step 1. On the myNsg blade, in the Settings section, click Subnets and then click + Associate.

Select the network and click OK.

Exercise 4: Create inbound NSG security rules to all traffic to web servers and RDP to the servers.

Follow the same steps to create RDPconnection for management servers.

Create a VM and connect it to the virtual network

Do the same for other servers.

Connect VM to the ASG.

Do the same for other servers.

Setup the web service

Copy the public IP address and run on the browser.


Discover more from Information Security Blogs

Subscribe to get the latest posts sent to your email.

Leave a comment

Discover more from Information Security Blogs

Subscribe now to keep reading and get access to the full archive.

Continue reading