Question: 3 . 1 ) What traffic now flows through the firewall? Add some active attacks and watch if they flow through the firewall. 3 .
What traffic now flows through the firewall?
Add some active attacks and watch if they flow through the firewall.
Would you claim your rule is now sufficient to allow traffic to flow for a typical network? Why
or why not?
Do any of the active attacks now work against machines behind the firewall?
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
