Write down two firewall rules on the router using the format below (network interface, protocol, flag, source IP or CIDR, source port, destination IP or CIDR, destination port, action) Rule1: block all of the incoming pings sent to the 172.20.241.0/24 subnet; Rules2: block all of the outgoing pings to any computers outside of the 172.20.241.0/24 subnet. What network attacks can the above firewall rules potentially protect against? Please identify one example of these attacks. Explain how this attack can be conducted and how this attack can be blocked using the rules above. For the file rules in Q4.1, is it for stateful inspection or non-stateful inspection (2pts)? Can a non-stateful inspection firewall detect TCP SYN Flood attack? Why or Why not?
Write down two firewall rules on the router using the format below
(network interface, protocol, flag, source IP or CIDR, source port, destination IP or CIDR, destination port, action)
Rule1: block all of the incoming pings sent to the 172.20.241.0/24 subnet;
Rules2: block all of the outgoing pings to any computers outside of the 172.20.241.0/24 subnet.
What network attacks can the above firewall rules potentially protect against? Please identify one example of these attacks. Explain how this attack can be conducted and how this attack can be blocked using the rules above.
For the file rules in Q4.1, is it for stateful inspection or non-stateful inspection (2pts)? Can a non-stateful inspection firewall detect TCP SYN Flood attack? Why or Why not?
Trending now
This is a popular solution!
Step by step
Solved in 5 steps