The lab setup
The devices being used in this chapter are a bit different from the previous chapters. In the previous chapters, we were isolating a particular device to focus on the topic at hand. For this chapter, we will use a few more devices in our lab to illustrate the function of the tools we will be using. The connectivity and operating system information are important as they have ramifications regarding the security tools that we will show later in this chapter. For example, if we want to apply an access list to protect the server, we need to know what the topology looks like and which direction the client is making their connections from. The Ubuntu host connections are a bit different than what we have seen so far, so please refer to this lab section when you see the example later if needed.
We will be using the same Cisco VIRL tool with four nodes: two hosts and two network devices. If you need a refresher on Cisco VIRL, feel free to go back to Chapter 2, Low-Level Network...