Overview

Introduction

The Firewalls and Evasion module provides you with the instruction and server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:

  • Install and Configure ZoneAlarm Firewall
  • Using Anonymous Proxy Sites

Lab time: It will take approximately 1 hour to complete this lab.

Exam Objectives

The following exam objectives are covered in this lab:

  • SY0-501 2.1: Install and configure network components, both hardware- and software-based, to support organizational security
  • SY0-501 2.3: Given a scenario, troubleshoot common security issues
  • SY0-501 2.4: Given a scenario, analyze and interpret output from security technologies
  • SY0-501 3.2: Given a scenario, implement secure network architecture concepts

Exercise 1 - Connecting to Hyper V Manager

We will be using Windows 7 through a virtual device built on the PLABDM01 device and from here we will apply a firewall and review how this firewall works on the system.

Exercise 2 - Install ZoneAlarm Firewall and Antivirus

A firewall is a device that prevents unauthorized access to a host or a network either from within the corporate environment or coming from the public network like the Internet. Generally, there are two types of firewalls. A hardware firewall takes the form of a closed proprietary appliance with its own operating system. This is considered faster however a bit expensive. A software firewall is installed on a computer and it utilizes the computer’s operating system. Firewalls either hardware or software use rules to filter incoming and outgoing traffic to the network.

In this exercise, you will install a software-based firewall called ZoneAlarm Free Firewall. This software is a lightweight version of the ZoneAlarm PRO which has additional features and capabilities not found on the free version. You may choose to evaluate both versions and find out if they meet your firewall requirements.

Exercise 3 - Configuring ZoneAlarm

Configuring ZoneAlarm is an essential process to make sure that definitions of databases and an understanding of the program features is clarified to the user in general.

Exercise 4 - Using Anonymous Proxy Sites

Corporate network environments implement strict security policies when it comes to using the Internet. Non-work related websites, such as Facebook amongst others are blocked. However, you can use anonymous proxies or Websites to bypass the firewall. Anonymous proxies are just a simple Websites that allow you to feed in the URL that you intend to visit. These Websites also keep your information anonymous when you visit other Websites. This means that your computer information, such as IP address etc. is not revealed.

You can obtain a large list of anonymous Websites:

http://www.hongkiat.com/blog/how-to-access-blocked-web-sites/

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.