The Firewall Rule Based Management module provides you with the instruction and devices to develop your hands on skills in the defined topics. This module includes the following exercises:
- Configuring Firewall Rules using Windows Firewall
- Configuring Firewall Rules using Windows Firewall with Advanced Security
- Configuring Firewall Rules using Remote Desktop
- Configuring Firewall Rules from the Command Line Interface
Lab time: It will take approximately 1 hour to complete this lab.
The following exam objectives are covered in this lab:
- SY0-501 2.1 Install and configure network components, both hardware- and software-based, to support organizational security
- SY0-501 2.3 Given a scenario, troubleshoot common security issues
- SY0-501 2.4 Given a scenario, analyze and interpret output from security technologies
- SY0-501 3.2 Given a scenario, implement secure network architecture concepts
Exercise 1 - Configuring Firewall Rules Using Windows Firewall
A firewall protects your computer from unauthorized access by users or applications outside of your corporate network. To make the firewall effective, you need to define/edit firewall rules. These rules analyse the packets coming to the computer or network and compare whether the specified conditions are satisfied and then allow/deny access to the computer or network accordingly. Windows Firewall application enables you to configure and edit firewall rules.
In this exercise, you will create firewall rules using Windows firewall and verify their efficiency in managing access to the computer.
Exercise 2 - Configuring Firewall Rules using Windows Firewall with Advanced Security
Windows versions including Vista, 2008, and later, provide another built-in application for system security - Windows Firewall with Advanced Security. This application offers an expansive view of firewall security and has additional features compared to the scaled down version of firewall in Windows XP.
In this exercise, you will create firewall rules using the Windows Firewall with Advanced Security and verify their efficiency in securing your computer.
Exercise 3 - Configuring Firewall Rules using Remote Desktop
Remote desktop is a built-in feature of Windows XP and later versions. Remote desktop enable you to setup a connection with any remote computing device on your network such that you can access the desktop of the computer and operate its resources as if they were local on your computer. Although similar to a VPN connection, a remote desktop connection gives you more control over the resources of the remote device.
Exercise 4 - Configuring Firewall Rules from the Command Line Interface
Command Line Interface, CLI for short, is one of the methods of communicating with operating system or other software such as applications. In CLI, you issue commands and receive responses in the format of text lines, delineated from each other by command prompts. CLI commands are powerful and can achieve more with each command because they communicate with the software directly. On the other hand, the CLI commands are not intuitive and you must remember the commands, the syntax, and the context to use them correctly.