Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

A network administrator configured a device's firewall, but made a few errors along the way. Some of your favorite applications may have been denied... We

A network administrator configured a device's firewall, but made a few errors along the way. Some of your favorite applications may have been denied... We can't worry about that yet, first step is to make sure external hosts aren't able to exploit vulnerable firewall rules. Find all the vulnerable ports and list them.

Number Protocol Source IP Destination IP Destination Port Action
1 TCP any 192.168.0.2 80 ALLOW
2 TCP any 192.168.0.2 25 DENY
3 TCP any 192.168.0.2 443 ALLOW
4 TCP any 192.168.0.2 22 DENY
5 TCP any 192.168.0.2 513 ALLOW
6 TCP any 192.168.0.2 25565 DENY
7 TCP 192.168.0.0/24 192.168.0.2 631 ALLOW
8 TCP any 192.168.0.2 9875 DENY
9 UDP any 192.168.0.2 53 ALLOW
10 UDP any 192.168.0.2 any DENY
11 TCP any 192.168.0.2 3389 ALLOW
12 TCP any 192.168.0.2 32976 ALLOW
13 TCP any 192.168.0.2 42806 DENY
14 TCP 192.168.0.2 any any ALLOW
15 TCP any 192.168.0.2 6443 DENY
16 TCP any 192.168.0.2 666 ALLOW
17 TCP any 192.168.0.2 23 ALLOW
18 TCP any 192.168.0.2 12975 ALLOW

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Computer Networking A Top-Down Approach

Authors: James F. Kurose, Keith W. Ross

5th edition

136079679, 978-0136079675

More Books

Students also viewed these Computer Network questions

Question

How can a VIE escape the CICA Handbook definition of control?

Answered: 1 week ago