Preview

CIS 675 Lab 4: Configuring a pfSense Firewall on the Server

Satisfactory Essays
Open Document
Open Document
338 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CIS 675 Lab 4: Configuring a pfSense Firewall on the Server
Lab #4 – Assessment Worksheet
Configuring a pfSense Firewall on the Server

Course Name and Number: CIS 675 INFORMATION SECURITY Student Name: DARSHAN PATHAK (2640944) Instructor Name: Prof Selvan Snow Overview

In this lab, you first planned a configuration of the pfSense Firewall using a spreadsheet, the pfSenseFirewallPlanner_EmailServer, to protect an e-mail server computer. The pfSense Firewall is a current-generation product with most of the functionality and options that are found in most firewall products, though the implementation may vary from firewall to firewall. In the second part of the lab, you configured the pfSense Firewall using the planning spreadsheet that you created in Part 1 of the lab.
Lab Assessment Questions & Answers

1. Most remote configuration and administration uses the _______ protocol.
Remote configuration and administration uses Secure Sell Protocol. 2. SSH stands for?
SSH stand for Secure Sell.

3. The File Transfer Protocol (FTP) uses which transport protocol, TCP or UDP?
The FTP uses TCP.

4. From a security standpoint, it is more desirable to use the numeric IP address of a static IP host, such as an e-mail server, than to allow the address to be looked up the Domain Name Service. True or False?
True.

5. Because the e-mail server will not be required to run a browser, which protocol is not allowed by the firewall rules? HTTP.
.
6. Because the e-mail server uses a fixed, static, predetermined IP address, which protocol is not used, and, therefore, not specifically allowed to pass through the firewall?
DHCP

7. Hypertext Transfer Protocol (HTTP) and Secure HTTP (HTTPS) are the same protocol from a standpoint of passing or blocking them with a firewall. True or false?
FALSE

8. Which protocol is used for a variety of functions in the e-mail server, such as resolving the numeric address of email.user@emailserver.net, and which servers are blacklisted for being sources of Unsolicited

You May Also Find These Documents Helpful

  • Good Essays

    1. Research the following organizations and explain their involvement with the internet public IP addresses.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 5 Assignment 1

    • 1348 Words
    • 6 Pages

    4. The server accept the connection and to send the data from server to client and vice…

    • 1348 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2670 Final Exam Paper

    • 408 Words
    • 2 Pages

    4) An email server uses MX and A records in DNS to determine the target email server to relay…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    5 - The software that runs on the mail server is referred to as the ____________…

    • 1464 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Research the following organizations and explain their involvement with the Internet public IP addresses…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3220

    • 1161 Words
    • 8 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 1161 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1

    • 4209 Words
    • 17 Pages

    83) Which process is responsible for establishing a connection between the client and the server?…

    • 4209 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Router Simulation

    • 331 Words
    • 2 Pages

    9. What numeric port range is commonly used by clients in a client -> server communication session? 0 to 1023…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In the LAN-to-WAN domain the internal network is connect to a wide area network. This domain contains routers, firewalls, email content filters, and other similar devices. Routers will route the traffic leaving and coming into the network strict security ACLs will be applied to these devices. Hardware firewalls will be implemented into the network for further packet filtering. Intrusion prevention/detection systems will be on the network to protect against attacks to our network. The email is subject to scanning and filtering to prevent spam, malware, and viruses. (Kim & Solomon, 2012)…

    • 539 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT1210 Final Exam Review

    • 726 Words
    • 3 Pages

    Truth Table 0 AND 0 = False (0) / 1 AND 0 False (0) / 1 AND 1 True (1)…

    • 726 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chapter 2 Lab Manual

    • 1433 Words
    • 6 Pages

    2. Explain why you would want to limit the type of incoming connections that you allow on a computer. Use your textbook and Internet research to support your answer…

    • 1433 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    a. IP Stateful firewall inspection takes place in layer 4, when traffic attempts to traverse the firewall a requested a source port and a destination port pair become part of the session allowing the source to receive information. Stateful inspection firewalls solve the vulnerability of permitting all the high numbered…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    linux

    • 456 Words
    • 2 Pages

    1. What change is necessary to make sendmail listen to all network traffic on port 25? What file would you edit?…

    • 456 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    UNIT 2 Assignment 2

    • 1272 Words
    • 6 Pages

    2. Ann uses her email address, me@here.com, to send an email to Bob, whose email address is you@there.com. The message contains a few paragraphs of text. Which of the following will be important to the process of making sure that Bob receives this email?…

    • 1272 Words
    • 6 Pages
    Satisfactory Essays