3 hours 20 minutes
after the logging, we can go to some actions over here
which are on this side. We could go back to the rules. So with the rules, we can click here for a new rule, which we will get to in the second half of this demo. And then we can also, uh, filter some of these rules by profile state or group.
And if we go up to the advanced settings, we can import or export a security policy.
This is helpful for when you are trying to replicate the same policy across multiple firewalls.
The way this works is you can import the policy and that will override the policy here. So if you have like a customized policy, then you can bring that into the firewall. That, or if you customized your firewall policy and you want to copy that over to another firewall,
you can simply export this policy,
and then you can save it to the desktop or wherever you want to save it. At
sometimes, when you customize your policy too much, you started get confused and there's too much going on, and so you might want to simplify it or restore the default policy, which would be this tab right here.
You can also come down to properties, and you can look at some of the properties four year, the domain, the private or the public firewalls. So if we're in the public one here, we can see that the firewall state is on and we can see inbound connections. They are blocked by default.
So by default everything is blocked,
and we have to explicitly determine what we want to allow in
outbound connections. Connections going from the computer out to the Internet are considered to be allowed by default because we are the ones that are sending them now. Obviously, you can block all the connections, and you can allow them.
However you would like depending on what your organization wants, or depending on what you want.
You can also see that the far wall can protect other things like the land and the loop back adapter.
And we can also customize the locking settings here so that when we clicked on that flogging link, this is the link. Work goes on that we can specify what we want to log so we can look at successful connections and whatever else we might want to look at.
So sometimes the firewall can get really confusing. There's a lot going on. There's a lot of a lot of granular permissions and things that you can implement, and sometimes it's very easy to get lost. Thankfully, we have the help. Please use the help. The help can help you. So the help is really just like a book
where you can read about anything that you don't understand.
So if you can come down here, if you don't understand firewall rules, click the link and then you can read information about the firewall rules and what the options are.
So this is this, concludes the first part of the demo. Now that we know how the far wall works and how the fire will operates, we can now go back and create a policy to show how the firewall actually blocks the traffic.
Hope you guys learned a lot in this demo, and I'll see you next time for Part two
CompTIA A+ 220-1001
This CompTIA A+ training covers the 220-1001 exam components needed to earn the CompTIA A+ ...
12 CEU/CPE Hours Available
Certificate of Completion Offered
Penetration Testing and Ethical Hacking
The Penetration Testing and Ethical Hacking course prepares students for certifications, like CEH. This course ...
7 CEU/CPE Hours Available
Certificate of Completion Offered