Project Three - Phase 3 - Configuring Firewalls and Verifying IP Connectivity

Project Three - Phase 3 - Configuring Firewalls and Verifying IP Connectivity

Info icon This preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
CNT 4603: Project Three Phase 3 Page 1 Mark Llewellyn © CNT 4603: System Administration Fall 2010 Project Three Phase 3: Configuring Firewalls and Verifying IP Connectivity Department of Electrical Engineering and Computer Science University of Central Florida Instructor : Dr. Mark Llewellyn [email protected] HEC 236, 4078-823-2790 http://www.cs.ucf.edu/courses/cnt4603/fall2010
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
CNT 4603: Project Three Phase 3 Page 2 Mark Llewellyn © Project Three: Phase 3 Title: “Project Three: Creating A Virtual Network – Phase 3” Points: 30 points Due Date: Wednesday October 20 th by 11:55 pm WebCourses time. Objectives: In phase 2 of the project you installed the operating systems in the three virtual machines that make up the savn.local network. This phase of the project will have you configuring the firewalls in the virtual machines and verifying the IP connectivity of the virtual machines in the network. Deliverables: Screen shots like pages 16, 18, 20, and 21.
Image of page 2
CNT 4603: Project Three Phase 3 Page 3 Mark Llewellyn © Project Three: Phase Three A personal firewall controls network traffic to and from your computer, permitting or denying communications based on your established security settings. Windows Firewall, Microsoft’ personal firewall software, provides protection against network attacks for computers on which it is enabled. This is done by checking all communications that cross the network connection and selectively blocking certain communications. Because Windows Firewall monitors all aspects of the communications that cross its path, it is considered a stateful firewall . It keeps track of the state of network connections (such as TCP streams and UDP communications) traveling across it.
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
CNT 4603: Project Three Phase 3 Page 4 Mark Llewellyn © Project Three: Phase Three The firewall is programmed to identify legitimate packets for various types of connections. Only packets matching a known connection state are allowed by the firewall; others are rejected. An attempt by someone on the Internet trying to connect to your computer is called an unsolicited request . When your computer gets an unsolicited request, Windows Firewall blocks the connection. Windows Firewall is designed to monitor and manage both incoming and outgoing traffic.
Image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.
  • Fall '10
  • LLEWELLYN
  • IP address, Internet Control Message Protocol, Denial-of-service attack, Dr. Mark Llewellyn, Mark Llewellyn

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern