Configuring Access Control Lists on a Linux Based Firewalls Lab
This lab is part of a series of lab exercises intended to support courseware for Ethical Hacker training. The development of this document is funded by the Department of Labor (DOL) Trade Adjustment Assistance Community College and Career Training (TAACCCT) Grant No. TC-22525-11-60-A-48. In this lab, students will enumerate hosts on the network usi...
Already have an account? Sign In »

This lab is part of a series of lab exercises intended to support courseware for Ethical Hacker training. The development of this document is funded by the Department of Labor (DOL) Trade Adjustment Assistance Community College and Career Training (TAACCCT) Grant No. TC-22525-11-60-A-48.
In this lab, students will enumerate hosts on the network using various tools.
This lab includes the following tasks: 1 - Setting up the network 2 - Enabling services and configuring firewall rules 3 - Testing the firewall
You should be aware of the common terms that are relevant within the “Configuring Access Control Lists on a Linux-Based Firewalls” lab to successfully complete it.