Access control firewall

Assignment Help Basic Computer Science
Reference no: EM132773974

Access Control Firewall Assessment

In this assignment, students will perform a security assessment on a firewall.

Using the networked VMs from the Access Control Environment Installation assignment, perform a port scan of the PFSense firewall system using the Kali VM. Create a screenshot showing the results.

Using the scan results, choose five open/closed ports and determine the applicable protocol/application.

For each port, research and explain why it is good (or bad) that the default configuration is standardized.

Research and implement the basics of PFSense post-installation configuration.

Update to the latest stable version.

Set HTTPS to port 8443.

Include the traffic graph on the dashboard.

Disable port traffic for World of Warcraft.

Disable port traffic for torrent applications.

Disable inbound ICMP protocol.

Choose a social media website and disable all domains for that website.

Choose a video streaming website and enable all domains for that website.

Using the Kali VM, run another port scan. Note the differences against the original scan.

As a follow-up, research and explain the common vulnerabilities associated with the standard installation of this PFSense firewall.

Reference no: EM132773974

Questions Cloud

How the intervention would be evaluated : Create a professional presentation of your evidence-based intervention and change proposal to be disseminated to an interprofessional audience of leaders.
Find physical counts of inventory : Find Physical counts of inventory? Are not necessary under the perpetual system and should be taken at least once month. / Should be taken at least once a month
Design jobs that are intrinsically motivating : Many companies strive to design jobs that are intrinsically motivating. Visit several small and large company websites and search their career section.
Compute the pension expense for the year : Veldre SpA provides the following information about its defined pension plan for the year 2019. Compute the pension expense for the year 2019
Access control firewall : Using the networked VMs from the Access Control Environment Installation assignment, perform a port scan of the PFSense firewall system
What are some of the legal ramifications that can occur : What are some of the legal ramifications that can occur if you accept assigned that is out of your scope of practice? Practicing out of scope, can put RN into.
Think about the best and worst companies you know : Think about the best and worst companies you know. What is extraordinary (or extraordinarily bad) about these firms? Are their strategies clear and focused or d
Community wellness and anticipates community needs : How does a organization monitors community wellness and anticipates community needs
How the company could reduce the problem of customers : SMC is a large company, Discuss how the company could reduce the problem of customers terminating their pay-tv service after only three months.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the probability that both adults dine out

What is the probability that both adults dine out more than once per week? rounded in three decimal places

  Explain the difference between public

Explain the difference between public, private, and community clouds. What are some of the factors to consider when choosing which of the three to use?

  Calculate the totals for each of the resources and expenses

Using Column F, calculate the totals for each of the resources and expenses. Label the column appropriately. Format the total values with an accounting style and two decimal places.

  Contract offers are made to you

Two contract offers are made to you. The first contract offers $10,000 at the end of each year for the next five years and then $20,000

  Latest threats and security issues

Security professionals need to ensure that they keep up to date with the latest threats and security issues. This allows them to update their risk profiles, such as identifying if their systems are vulnerable. In order to determine what the risk t..

  How blockchain implementation would improve data security

Discussing discussing how a blockchain implementation would improve data security in a military, education, or other context.

  Should large cigarette companies be allowed to merge

Why would the Government be interested in stopping the merger? Should large cigarette companies be allowed to merge?

  Assisting employees with temporary housing

?Answers might include continuing to pay salaries, assisting employees with temporary housing, providing communication links to other parts of the country

  What are key issues with interacting

What are key issues with interacting and using a computer for people who are visually impaired?

  Present a business idea supported

The purpose of this assignment is to allow students the opportunity to present a business idea supported by strong financial information.

  Technology and enterprise resource planning

Discuss how your company will use Enterprise Resource Planning (ERP) to integrate the various functions of an entity.

  Big data mining in the cloud

Every organization is facing the challenge with large data sources. It increases complexity of data to understand and store.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd