Explain what outbound filtering rules would you recommend

Assignment Help Operating System
Reference no: EM132411878

M7A2: Hands-on Lab: Firewall Rule Configuration

Note: Incorrect modifications to the firewall configuration could block access to legitimate communication for you and others who route through the same firewall. Please document all your steps and be prepared to roll back the changes should they cause problems to you or others on the same network.

Firewalls serve as the primary means of defense at the perimeter level. Some firewalls also come with Intrusion Prevention System (IPS) capabilities, while others do not. Many operating systems such as Windows, MacOS, and Unix come with built-in firewalls.

Here are some instructions on reviewing and changing the configuration of the firewall for different types of operating systems:
• Configure Windows Firewall in Windows 10/8/7
• OS X: About the application firewall
• The Beginner's Guide to iptables, the Linux Firewall

In case, you don't have one of the above operating systems, or would like to configure a firewall other than the default operating system firewall, you may choose to download and configure ZoneAlarm free firewall form the following resource:
ZoneAlarm. (n.d.). ZoneAlarm free firewall 2017.

Instructions for configuring this firewall can be found at the following location:

ZoneAlarm. (n.d.). Customizing program access permissions.

The following exercise requires you to configure certain rules on a firewall and provide explanations as to what these rules help to achieve. You may do this on your own laptop or on the router/firewall that your network uses to connect to the Internet. Please document your steps and responses with screenshots:

• With regards to outbound traffic, does your firewall already have certain rules to block specific ports or applications? Please list some of these rules and explain two of them in detail.
• Create a new rule to block any specific port or protocol (i.e. ICMP or HTTP, or other ports or protocols). Show the configuration steps to create such a rule.
• Explain what outbound filtering rules would you recommend? What types of attacks would you be able to block by doing this?
• With regards to inbound access to your laptop or network-can you determine what traffic (ports, protocols, IP addresses) is allowed to connect to your laptop/network?
• Create a new rule to block incoming traffic to the Windows SMB service. What are the port number(s) used by this protocol? What attacks would be mitigated by creating such a rule?
• Provide three examples of inbound traffic from the Internet to your laptop / network that you would want to block to mitigate specific attacks.
• With regards to an IPS, you could place it either between the Internet and your firewall or you could place it behind your firewall. In the first case, the IPS would analyze all traffic in and out of your network; while in the second case it would analyze only the traffic allowed in by the firewall. Which placement is better and why?
• Finally, explain briefly the differences between the following different types of firewalls:
o Normal firewall
o Unified Threat Management (UTM)
o Next Generation Firewall
Use the American Psychological Association (APA) style (6th edition) to write your assignment. The length of your assignment should be 3 to 5 pages, and you should include at least three quality references.

Attachment:- Firewall Rule Configuration.rar

Reference no: EM132411878

Questions Cloud

Paper about an environmental issue that interests you : Write a 2 page single spaced paper about an environmental issue that interests you. Use and cite 5 scientific references/literature.
What is the value of walker industries : What is the value of Walker Industries assuming that it reinvests at its historical rate (b) for the next 8 years and experiences its historical rate of growth
Importance of correctness and accuracy of referencing : essay explaining what the main strategy development tools are and how they are used in business. Your essay must contain a comprehensive discussion
Write on catalan people of spain search for independence : Catalan people of Spain search for independence as it relates to nationalism, the current crisis in Spain - write on a topic of their choice
Explain what outbound filtering rules would you recommend : Explain what outbound filtering rules would you recommend? What types of attacks would you be able to block by doing this?
Prepare a post merger consolidate balance sheet : Simulate a merger and acqusition (Newmont is buyng SSRM) - Prepare a post merger consolidate balance sheet and Prepare a price to offer to the target company
Perform exploratory data analysis by looking at graphs : Bayesian Data Analysis - perform exploratory data analysis by looking at graphs and numerical summaries in addition to performing some preliminary data
How hash functions are used in different computing areas : Research and explain in your own words what and how hash functions are used in these different computing areas and describe
BUS 309 Operations Management Assignment : BUS 309 Operations Management Assignment Help and Solution, Emirates College of Technology - Assessment Writing Service Write a report for operation Management

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd