Project Three - Phase 3 - Configuring Firewalls and Verifying IP Connectivity

Project Three - Phase 3 - Configuring Firewalls and Verifying IP Connectivity

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
CNT 4603: Project Three – Phase 3 Page 1 Mark Llewellyn © CNT 4603: System Administration Fall 2010 Project Three – Phase 3: Configuring Firewalls and Verifying IP Connectivity Department of Electrical Engineering and Computer Science University of Central Florida Instructor : Dr. Mark Llewellyn markl@cs.ucf.edu HEC 236, 4078-823-2790 http://www.cs.ucf.edu/courses/cnt4603/fall2010
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CNT 4603: Project Three – Phase 3 Page 2 Mark Llewellyn © Project Three: Phase 3 Title: “Project Three: Creating A Virtual Network – Phase 3” Points: 30 points Due Date: Wednesday October 20 th by 11:55 pm WebCourses time. Objectives: In phase 2 of the project you installed the operating systems in the three virtual machines that make up the savn.local network. This phase of the project will have you configuring the firewalls in the virtual machines and verifying the IP connectivity of the virtual machines in the network. Deliverables: Screen shots like pages 16, 18, 20, and 21.
Background image of page 2
CNT 4603: Project Three – Phase 3 Page 3 Mark Llewellyn © Project Three: Phase Three A personal firewall controls network traffic to and from your computer, permitting or denying communications based on your established security settings. Windows Firewall, Microsoft’ personal firewall software, provides protection against network attacks for computers on which it is enabled. This is done by checking all communications that cross the network connection and selectively blocking certain communications. Because Windows Firewall monitors all aspects of the communications that cross its path, it is considered a stateful firewall . It keeps track of the state of network connections (such as TCP streams and UDP communications) traveling across it.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CNT 4603: Project Three – Phase 3 Page 4 Mark Llewellyn © Project Three: Phase Three The firewall is programmed to identify legitimate packets for various types of connections. Only packets matching a known connection state are allowed by the firewall; others are rejected. An attempt by someone on the Internet trying to connect to your computer is called an unsolicited request . When your computer gets an unsolicited request, Windows Firewall blocks the connection. Windows Firewall is designed to monitor and manage both incoming and outgoing traffic. For example, you can configure Windows Firewall to block all traffic
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 22

Project Three - Phase 3 - Configuring Firewalls and Verifying IP Connectivity

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online