Task: Configure the firewall (fill out the table) to allow these three rules:
1. Only allow the accounting computer to have HTTPS access to the Administrative server.
2. Only allow the HT computer to be able to communicate with the Server2 System over SCP.
3. Allow the IT computer to have access to both the Administrative Server 1 and Administrative Server 2
Answer: See the explanation
Firewall rules act like ACLs, and they are used to dictate what traffic can pass between the firewall and the
internal network. Three possible actions can be taken based on the rule’s criteria:
Block the connection
Allow the connection
Allow the connection only if it is secured
TCP is responsible for providing a reliable, one-to-one, connection-oriented session. TCP establishes a
connection and ensures that the other end receives any packets sent. Two hosts communicate packet results
with each other. TCP also ensures that packets are decoded and sequenced properly. This connection is
persistent during the session. When the session ends, the connection is torn down.
UDP provides an unreliable connectionless communication method between hosts. UDP is considered a besteffort protocol, but it’s considerably faster than TCP. The sessions don’t establish a synchronized session like
the kind used in TCP, and UDP doesn’t guarantee error-free communications. The primary purpose of UDP is
to send small packets of information. The application is responsible for acknowledging the correct reception of
Port 22 is used by both SSH and SCP with UDP.
Port 443 is used for secure web connections – HTTPS and is a TCP port.
Thus, to make sure only the Accounting computer has HTTPS access to the Administrative server you should
use TCP port 443 and set the rule to allow communication between 10.4.255.10/24 (Accounting) and
10.4.255.101 (Administrative server1)
Thus, to make sure that only the HR computer has access to Server2 over SCP you need use of TCP port 22
and set the rule to allow communication between 10.4.255.10/23 (HR) and 10.4.255.2 (server2)
Thus, to make sure that the IT computer can access both the Administrative servers you need to use a port and
accompanying port number and set the rule to allow communication between:
10.4.255.10.25 (IT computer) and 10.4.255.101 (Administrative server1)
10.4.255.10.25 (IT computer) and 10.4.255.102 (Administrative server2)
Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, 6th Edition, Sybex, Indianapolis, 2014,
pp. 77, 83, 96, 157