Question
Background: Firewalls may often provide the first line of defense between the public and private networks. This is accomplished by determining how to set up
Background:
Firewalls may often provide the first line of defense between the public and private networks. This is accomplished by determining how to set up a firewall topology that best suits the needs of an organization and then designing and writing the rules (AKA: filters, ACLs, ACEs, etc.) to define how the firewall operates.
Instructions: Examine the firewall configuration shown in the topology figure at the bottom of this document. 1) Identify and give a name to segments 1, 2, 3, and the device. Be specific when you identify the device.
2) Using the common firewall rule structure shown below and using the deny by default philosophy, develop inbound (from the internet) firewall rules to define the operation of this simple topology. You should use the least number of rules possible.
Common Rule Structure:
Protocol | Source Address | Source Port | Target Address | Target Port | Action |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started