Perform Firewall Rule-based Management
Welcome to the Perform Firewall Rule-Based Management Practice Lab. In this module you will be provided with the instructions and devices needed to develop your hands-on skills.
Already have an account? Sign In »

Introduction
Welcome to the Perform Firewall Rule-Based Management Practice Lab. In this module you will be provided with the instructions and devices needed to develop your hands-on skills.
Learning Outcomes
In this module, you will complete the following exercises:
- Configuring Firewall Rules using Windows Firewall
- Configuring Firewall Rules using Windows Firewall with Advanced Security
- Configuring Firewall Rules using Remote Desktop
- Configuring Firewall Rules from the Command Line Interface
After completing this lab, you will be able to:
- Verify the Enabled Network Connection
- Create a Windows Firewall Rule
- Test the Firewall Rule
- Reconfigure the Firewall Rule
- Verify the Connection
- Create a Firewall Rule using Windows Firewall with Advanced Security
- Reconfigure the Firewall Rule
- Setup a Remote Session
- Create a Firewall Rule
- Verify the Firewall Rule
- Reconfigure the Firewall Rule Using the Remote Desktop Connection
- Verify Blocked Ping Packets
- Configure the Firewall using CLI Commands
- Verify the efficacy of the Firewall Rule
- Reconfigure the Firewall using CLI
Exam Objectives
The following exam objectives are covered in this lab:
- CAS-003 2.1 Analyze a scenario and integrate network and security components, concepts and architectures to meet security requirement.
- CAS-003 2.2 Analyze a scenario to integrate security controls for host devices to meet security requirements.
- CAS-003 4.3 Given a scenario, integrate and troubleshoot advanced authentication and authorization technologies to support enterprise security objectives
Lab Duration
It will take approximately 1 hour to complete this lab.
Exercise 1 - Configuring Firewall Rules Using Windows Firewall
A firewall protects your computer from unauthorized access by users or applications outside of your corporate network. To make the firewall effective, you need to define/edit the firewall rules. These rules analyze the packets coming to the computer or network and compare whether the specified conditions are satisfied and then allow/deny access to the computer or network accordingly. Windows Firewall application enables you to configure and edit firewall rules.
In this exercise, you will create firewall rules using Windows firewall and verify their efficiency in managing access to the computer.
Learning Outcomes
After completing this exercise, you will be able to:
- Verify the Enabled Network Connection
- Create a Windows Firewall Rule
- Test the Firewall Rule
- Reconfigure the Firewall Rule
Exercise 2 - Configuring Firewall Rules using Windows Firewall with Advanced Security
Windows versions including Vista, 2008, and later, provide another built-in application for system security - Windows Firewall with Advanced Security. This application offers an expansive view of firewall security and has additional features compared to the scaled down version of the firewall in Windows XP.
In this exercise, you will create firewall rules using the Windows Firewall with Advanced Security and verify their efficiency in securing your computer.
Learning Outcomes
After completing this exercise, you will be able to:
- Verify the Connection
- Create a Firewall Rule using Windows Firewall with Advanced Security
- Test the Firewall Rule
- Reconfigure the Firewall Rule
Exercise 3 - Configuring Firewall Rules using Remote Desktop
Remote desktop is a built-in feature of Windows XP and later versions. Remote desktop enables you to setup a connection with any remote computing device on your network such that you can access the desktop of the computer and operate its resources as if they were local on your computer. Although similar to a VPN connection, a remote desktop connection
Learning Outcomes
After completing this exercise, you will be able to:
- Setup a Remote Session
- Create a Firewall Rule
- Verify the Firewall Rule
- Reconfigure the Firewall Rule Using the Remote Desktop Connection
Exercise 4 - Configuring Firewall Rules from the Command Line Interface
Command Line Interface (CLI) is one of the methods of communicating with the operating system or other software such as applications. In CLI, you issue commands and receive responses in the format of text lines, delineated from each other by command prompts. CLI commands are powerful and can achieve more with each command because they communicate with the software directly. On the other hand, the CLI commands are not intuitive and you must remember the commands, the syntax, and the context to use them correctly.
Learning Outcomes
After completing this exercise, you will be able to:
- Verify Blocked Ping Packets
- Configure the Firewall using CLI Commands
- Verify the efficacy of the Firewall Rule
- Reconfigure the Firewall using CLI
See the full benefits of our immersive learning experience with interactive courses and guided career paths.