Hands-on project-firewall rules

Assignment Help English
Reference no: EM131689437

Hands-On Project - Firewall Rules

In this project you will create two simple firewall rules in Windows Advanced Firewall. This may be the first time you have made a modification to the firewall on your computer. The first rule will block all ICMP traffic. This will effectively prevent you from using the ping command to send ICMP packets to other computers. You will use a command prompt to verify the rule was effective.

The second rule will block all outgoing Port 80 traffic. Port 80 is traditionally associated with Web traffic (HTTP). Once you create and enable the rule, all outgoing Port 80 traffic will be blocked. You will use a Web browser to verify the rule was effective, however, secure Web traffic (HTTPS) running over Port 443 will still be accessible.

Both of the rules in this project will apply to outgoing traffic only. It is important to remember to disable the rules at the end of the project so your ICMP and Port 80 traffic will not be blocked.
Directions:

  1. Click Start.
  2. In the search box, type cmd
  3. Press Enter.
  4. Type ping www.google.com
  5. Press Enter. (This will ping www.Google.com)
  6. Type time
  7. Press Enter twice.
  8. Take a screenshot.
  9. Click Start, Control Panel, System and Security, and Windows Firewall.
  10. Click Advanced settings.
  11. Click Outbound Rules.
  12. Click New Rule (right-hand pane).
  13. Click Custom, Next, and Next.
  14. Change the dropdown box to ICMPv4.
  15. Click Next, Next, Next, and Next.
  16. Name the rule YourName_Block_ICMP. (Replace YourName with your first and last names. In this case, it was RandyBoyle_Block_ICMP.)
  17. Click Finish.
  18. Return to your command prompt.
  19. Type ping www.google.com
  20. Press Enter. (This will ping www.google.com. You should get a "General failure" error.)
  21. Type time
  22. Press Enter twice.
  23. Take a screenshot.
  24. Open a Web browser.
  25. Browse to www.Google.com. (This will verify that you do have Internet access.)
  26. Return to the Windows Advanced Firewall window.
  27. Click Outbound Rules.
  28. Click New Rule (right-hand pane).
  29. Click Port, and Next.
  30. Type "80" into the text box for Specific remote ports. (This will effectively block all outgoing Web traffic from your computer. You will disable/delete this rule later.)
  31. Click Next, Next, and Next.
  32. Name the rule YourName_Block_Port_80. (Replace YourName with your first and last names. In this case, the rule was named RandyBoyle_Block_Port_80.)
  33. Click Finish.
  34. Return to your Web browser.
  35. Browse to any non-secure (not HTTPS) website of your choosing. You can browse to any website as long as it does not make an HTTPS connection (Port 443). The rule you made only blocks Port 80 Web traffic.
  36. Take a screenshot of the blocked website. (In this case, it was www.Microsoft.com.)
  37. Return to the Windows Advanced Firewall window.
  38. Select both of the rules you created.
  39. Right-click the selected rules.
  40. Click Disable Rule. (If you don't disable the rules, your ICMP and Web traffic will still be blocked.)
  41. Take a screenshot of your disabled rules.

Submit your Screenshots and answer the following questions:

  • How could blocking all ICMP traffic protect you?
  • Could you still access some websites with your Port 80 rule enabled? Why?
  • Why would you want to allow incoming (not outgoing) Port 443, but block incoming Port 80?
  • Could malware rename itself in order to get through a firewall? Why would this work?

Your well-written paper should meet the following requirements:

  • Be two to four pages in length
  • Contain an illustrative table or a diagram created from properly cited external references
  • Include two credible external references in addition to the textbook
  • Formatted according to APA writing guidelines.

Reference no: EM131689437

Questions Cloud

What kinds of evidence and information you plan to use : Here is where you're going to decide what kinds of evidence and information you plan to use in order to bolster your claim.
Explain procedure for sharing information with outside party : Describe procedures for sharing information with outside parties. Include the eight basic elements of an incident response plan.
Mean amount of time of audience who listen radio daily : An advertising agency that serves a major radio station wants to estimate the mean amount of time that the stations audience spends listening to the radio daily
Analyze the impact on overall morale : What best practices might a company implement to avoid negative behavior within their organization?
Hands-on project-firewall rules : In this project you will create two simple firewall rules in Windows Advanced Firewall. This may be the first time you have made a modification.
Discuss the linguistic-relativity hypothesis : In fact, there's considerable research, mainly from anthro- pology, that supports the linguistic-relativity hypothesis
Discuss the different steps to create a basic web page : What is the URL? Discuss the different steps to create a basic web page. Give the different list types available in HTML with example.
What media the lans in each building are using to connect : Indicate device and what media the LANs in each building are using to connect to the other buildings. How your network would look?
Discuss effect of variation on selecting sample size needed : A growing niche in the restaurant business is gourmet-casual breakfast, lunch, and brunch. Chains in this group include Le Peep, Good Egg, Eggs & I.

Reviews

Write a Review

English Questions & Answers

  Write a profile

Write a profile on bishop poleni.

  Education system

Write a rearch paper on education system

  Write an report

The U.S. President Barack Obama said America can "win the future" by rebuilding its manufacturing sector (on June 8, 2011, after visiting an automotive training center at a community college in Virginia, outside Washington). Do you agree, and why?

  Discuss the accuracy of this statement

'Consideration does not have to be adequate or commercially realistic, nor does it need to be expressed in monetary terms, it merely needs to be "sufficient".' Discuss the accuracy of this statement.

  Write an essay on the youngest billionaire

Write an essay on the youngest billionaire

  Transformational leadership in the public sector

The more hierarchical an organization's authority structure, the lower the reported practice of transformational leadership behaviors.

  Modal verbs or modal constructions

Identify all the modal verbs or modal constructions in the passage

  Write a latter to mom thanking to adopting and caring

Write a latter to mom thanking for adopting and caring,

  Ways of knowing & authority in your discipline

To explore and become familiar with your discipline; to prepare you for your major researched essay.

  Writing an effective business letter

Prepare a letter in either block or modified block format, addressed to your employer or supervisor and copied to your marker.

  Discuss the kingdom of saudi arabia

Discuss the Kingdom of Saudi Arabia

  Developing an annotated bibliography

Developing an annotated bibliography

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd