Question: Q2: A network administrator has installed remote control software (Similar to a Trojan horse) in a number of external hosts, in order to control them

Q2: A network administrator has installed remote control software (Similar to a Trojan horse) in a number of external hosts, in order to control them remotely from his host. The administrator's host (193.195.1.30) is located in a LAN protected by a Firewall. The server of the software is expected to run on the port 8, and use TCP protocol. Write the appropriate filtering rules to allow the network administrator to control remotely the external hosts running the remote control software. Ansver: Direction S. IP Des. IP Protocol S. Port Des. Port Type SYN ACK Action 1 0Accept Out Exter. 193.195.1.30 TCP 25 Q2: A network administrator has installed remote control software (Similar to a Trojan horse) in a number of external hosts, in order to control them remotely from his host. The administrator's host (193.195.1.30) is located in a LAN protected by a Firewall. The server of the software is expected to run on the port 8, and use TCP protocol. Write the appropriate filtering rules to allow the network administrator to control remotely the external hosts running the remote control software. Ansver: Direction S. IP Des. IP Protocol S. Port Des. Port Type SYN ACK Action 1 0Accept Out Exter. 193.195.1.30 TCP 25
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
