Implement Device Security with Host-Based Firewall and Password Policy
Welcome to the "Implement Device Security with Host-Based Firewall and Password Policy" Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Already have an account? Sign In »

Introduction
Welcome to the Implement Device Security with Host-Based Firewall and Password Policy Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1. Create Firewall Rules
- Exercise 2. Implement Password Policy
After completing this lab, you will be able to:
- Configure a sample website and a secure website
- Verify firewall rules on PLABDM01
- Test firewall rules
- Change a firewall rule
- Create an outbound rule
- Modify password policy
- Verify application of password policy
Exam Objectives
The following exam objective is covered in this lab:
- 6.2 Explain methods to secure devices and best practices.
Lab Duration
It will take approximately 1 hour to complete this lab.
Exercise 1 - Create Firewall Rules
A port is an endpoint of communication in computer networking. In the context of an operating system, a port is a theoretical entity that identifies a network service. The software port is composed of a numeric IP address of a host (computer), and the protocol type associated with a port number—both components identify the network address of a source and a destination host.
Learning Outcomes
After completing this exercise, you will be able to:
- Configure a sample website and a secure website
- Verify firewall rules on PLABDM01
- Test firewall rules
- Change a firewall rule
- Create an outbound rule
Exercise 2 - Implement Password Policy
Desktop and server operating systems use passwords to prevent unauthorized access to the computer. Small to medium-sized organizations can use passwords to secure the network. When user data is accessible from any location or device, it makes sense to adopt stringent measures to ensure that only authorized persons have access to corporate assets.
This exercise will illustrate the use of passwords with the adoption of a restrictive password policy.
Learning Outcomes
After completing this exercise, you will be able to:
- Modify password policy
- Verify application of password policy
See the full benefits of our immersive learning experience with interactive courses and guided career paths.