Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

Similar documents
Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Network Configuration Settings

Firewalls (IPTABLES)

Firewall VPN Router. Quick Installation Guide M73-APO09-380

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Figure 41-1 IP Filter Rules

EXPLORER. TFT Filter CONFIGURATION

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Managing Ports and System Services using BT NetProtect Plus firewall

Firewall Firewall August, 2003

Multi-Homing Dual WAN Firewall Router

Linux MDS Firewall Supplement

Cisco Configuring Commonly Used IP ACLs

IP Filter/Firewall Setup

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Basic Network Configuration

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Load Balance Router R258V

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Accessing Remote Devices via the LAN-Cell 2

Manuale Turtle Firewall

Bypassing PISA AGM Theme Seminar Presented by Ricky Lou Zecure Lab Limited

Lab Configuring Access Policies and DMZ Settings

PIX/ASA 7.x with Syslog Configuration Example

Firewalls. Chien-Chung Shen

Lab Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance

DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS. Single Computer running I m InTouch with a DSL or Cable Modem Internet Connection

Lab Developing ACLs to Implement Firewall Rule Sets

Lab Objectives & Turn In

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Linux MPS Firewall Supplement

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

Firewall implementation and testing

Stateful Inspection Technology

Classification of Firewalls and Proxies

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Cisco Secure PIX Firewall with Two Routers Configuration Example

Source-Connect Network Configuration Last updated May 2009

shortcut Tap into learning NOW! Visit for a complete list of Short Cuts. Your Short Cut to Knowledge

- Basic Router Security -

NETASQ MIGRATING FROM V8 TO V9

MilsVPN VPN Tunnel Port Translation. Table of Contents Introduction VPN Tunnel Settings...2

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Security Technology: Firewalls and VPNs

41376 UDP performing get device status Command Workstation (CWS), Harmony, Bi-directional Driver TCP/UDP

Networking for Caribbean Development

How To Manage My Smb Ap On Cwm On Pc Or Mac Or Ipad (Windows) On A Pc Or Ipa (Windows 2) On Pc (Windows 3) On An Ipa Or Mac (Windows 5) On Your Pc

Firewalls. Pehr Söderman KTH-CSC

Firewall Defaults and Some Basic Rules

Virtual Server in SP883

FIREWALLS & CBAC. philip.heimer@hh.se

Chapter 4 Restricting Access From Your Network

Testing Network Security Using OPNET

PIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example

PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES

Firewall Design Principles

8. Firewall Design & Implementation

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

M2M Series Routers. Port Forwarding / DMZ Setup

Security threats and network. Software firewall. Hardware firewall. Firewalls

Lab Configuring Access Policies and DMZ Settings

Application Monitoring using SNMPc 7.0

Exam Questions SY0-401

Configuring the Cisco Secure PIX Firewall with a Single Intern

How To Configure Virtual Host with Load Balancing and Health Checking

Filtering remote users with Websense remote filtering software v7.6

Firewall Policy: IGIC

Device Log Export ENGLISH

Security. TestOut Modules

PrintFleet Enterprise Security Overview

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

Overview - Using ADAMS With a Firewall

Specialized Programme on Internetworking Design and LAN WAN Administration

PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example

Rapid Vulnerability Assessment Report

Overview - Using ADAMS With a Firewall

Firewalls. Network Security. Firewalls Defined. Firewalls

Immotec Systems, Inc. SQL Server 2005 Installation Document

Address Resolution Protocol (ARP)

Connecting to and Setting Up a Network

Copyright 2006 Comcast Communications, Inc. All Rights Reserved.

COMPUTER NETWORK TECHNOLOGY (300)

Configuring TCP/IP Port & Firewall Monitoring With Sentry-go Quick & Plus! monitors

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Chapter 4 Firewall Protection and Content Filtering

How To Connect To Ecs.Org From A Pc Or Mac Or Ipad (For A Laptop) With A Network Connection (For Mac) With The Ipad Or Ipa (For Pc Or Ipac) With An Ipa Or Ip

A typical router setup between WebSAMS and ITEd network is shown below for reference. DSU. Router

How to Open HTTP or HTTPS traffic to a webserver behind the NetVanta 2000 Series unit (Enhanced OS)

Creating a VPN with overlapping subnets

Parallels Plesk Panel

Lab Configure Cisco IOS Firewall CBAC

Transcription:

70 Lab #5 Lab #5 Assessment Spreadsheet A Review the default settings for Windows Firewall on your student workstation and indicate your settings below: GENERAL Recommended (Firewall On/Off) Don t Allow Exception Rules (On/Off) Not Recommended (On/Off) EXCEPTIONS File Print Sharing Remote Assistance Remote Desktop upnp Framework ADVANCED Network Connection Settings: 1394 Connections Cisco AnyConnect VPN Local Area Connection Wireless Network Connection Security Logging: Logging Options Logging File Options ICMP: Allow incoming request Allow incoming time request Allow incoming router request Allow outgoing destination unreachable Allow outgoing source quench Allow outgoing parameter problem Allow outgoing time exceeded Allow redirect Allow outgoing packet too big

Assessment Spreadsheet B 71 Lab #5 Assessment Spreadsheet B 5 Configure a Microsoft Windows Workstation Internal IP Configure your Windows workstation internal firewall according to the following policy definition. Test and validate your implementation after you configure it based on the policy definition. The following is your workstation internal firewall policy definition: 1. Implement the default Microsoft Windows internal firewall 2. Add/Block the following additional programs: a. Yahoo! Messenger IM Chat 3. Block the following applications: a. Telnet b. TFTP c. SNMP d. ICMP echo-request e. ICMP echo-reply 4. Allow the following applications under Advanced settings: a. FTP b. SMTP c. POP3 d. HTTPS e. HTTP

72 Lab #5 Lab #5 Assessment Worksheet In this lab, you determined the properties and behavior of the default Windows Firewall settings for your workstation, enabled Windows Firewall on the vworkstation computer, set specific values for blocking or enabling certain transactions, and tested to ensure that Windows Firewall is working properly. Lab Assessment Questions & Answers 1. Given that the Microsoft Windows internal firewall is turned on by default, should you disable this firewall if your organization already has a firewall? Why or why not? 2. What kind of firewall is the Microsoft Firewall? Explain your answer.

Assessment Worksheet 73 3. How do you block specific applications or programs from communicating via TCP/IP from your vworkstation? 4. To configure your internal firewall, you must first identify the applications that you must enable and communicate with throughout your IP network infrastructure. Given the policy definition, identify the port numbers for both the allowed and disallowed applications: 5 Configure a Microsoft Windows Workstation Internal IP Telnet Port Number: 23 TCP UDP or TCP TFTP Port Number: 69 UDP UDP or TCP SNMP Port Number: 161 UDP UDP or TCP ICMP echo-request Port Number: None, IP UDP or TCP ICMP echo-reply Port Number: None, IP UDP or TCP FTP Port Number: 21 TCP UDP or TCP SMTP Port Number: 25 TCP UDP or TCP POP3 Port Number: 110 TCP UDP or TCP HTTPS Port Number: 443 TCP UDP or TCP HTTP Port Number: 80 TCP UDP or TCP 5. Where and how do you open the ports and allow specific applications to communicate with your Microsoft Windows systems? 6. What risks are you subjecting your Microsoft Windows systems to by opening up ports on your internal firewall?

74 Lab #5 7. How should you test to determine if your internal firewall configuration is working properly? 8. Define a test plan to test and verify that your internal firewall s open port configurations are working properly.