Question: Consider The following info: PLEASE DO NOT COPY AND PASTE FROM OTHER QUESTIONS THEY DO NOT ANSWER THE QUESTION . Consider each rule and their

Consider The following info: PLEASE DO NOT COPY AND PASTE FROM OTHER QUESTIONS THEY DO NOT ANSWER THE QUESTION. Consider each rule and their order, please describe the proper way to implement them.

1.Narrative description of ACL rules.

2. Explanation of how the rules implementing SMTP policies can be validated.

Consider The following info: PLEASE DO NOT COPY AND PASTE FROM OTHERQUESTIONS THEY DO NOT ANSWER THE QUESTION. Consider each rule and their

DMZ=10.0.1.0/24LAN=10.0.2.0/24 Firewalls \& ACLs Chapters 4 and 5 of NIST 800-41-r1 provides useful guidance on firewall configuration and testing. Refer to NIST 800-41-r1 and other resources from your own research to develop the structure of an Access Control List (ACL). Develop firewall rules in a narrative format and the correct sequence that implement the following policies. Rules must include IP addresses and ranges where necessary, but the narrative description the rule is not required to follow any specific syntax. 1. Block all inbound traffic that is not specifically permitted. 2. Allow all outbound traffic that is not specifically prohibited. 3. Allow http/https from any source except 4.53.128.0/17. 4. Allow ssh from any source. 5. Allow TCP 3632 from your local subnet. Assume local subnet to be the private IP range of your GCP instance. 6. Allow ICMP echo replies from any source. 7. Block SMTP outbound, except permit to jaguar.tamu.edu (find the IP address for jaguar.tamu.edu mail server). Develop Test Plan for Outbound SMTP Rule Firewall rules need to be tested. Explain how you can verify your rules related to SMTP can be validated after they are configured. Submission 1. Narrative description of ACL rules. 2. Explanation of how the rules implementing SMTP policies can be validated

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!