Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Below is the link which contains Firewall Virtualization Tool and a .dat file. h

ID: 3814398 • Letter: B

Question

Below is the link which contains Firewall Virtualization Tool and a .dat file.

https://drive.google.com/drive/folders/0B3CdCO69eSaGNTEzMkdwakFlZkE?usp=sharing

Need answer of the question asked below by implementing the instructions in visual tool.

Choose "Parameter firewall"

Question: Add some active attacks by clicking on several different options. Are these attacks able to get to your network? Do you feel your system is secure? What is wrong with this scenario?

Network FireA lization rile options lielp Network Traffic: Database tramo Email VOIP traffic 192.1832. Chat Irathr. Workstation traffi Active Atacks OS Exploits Trojan ACK Scan Legitimate Traffic Drsitet You now have a firewall between the internet (represented by a cloud) and your network router. Click the play button and watch what happens. Do you see traffic flowing from the internet into your system or from your network to the internet Explain why or why not. 2. Add some active attacks by clicking on several different options. Are these attacks able to get to your network? Do you feel your system is secure? What's wrong with this scenario? 3. Configure your firewall to allow traffic to flow in and out of your network. Do this by choosing the options' tab at the top of the tool and define firewall rules. You should see a screen similar to the one below:

Explanation / Answer

There is no traffic flowing from the internet into system or from network to the internet.
Because legitimate traffic denied here in case of parameter firewall.

* In case of active attacks by clicking on several different options :

- Attacks are not able to get my network.

- Yes, I feet that my system is secure.

* Firewall Rule to allow traffic to flow in and out of your network.

Options > Define Firewall1 Rules >

1. Give rule name
2. Select Source IP to Any
3. Select Destination IP to Any
4. Select Protocol to Any
5. Save Rule

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote