Question: Q2: A network administrator has installed remote control software (Similar to a Trojan horse) in a number of external hosts, in order to control them

 Q2: A network administrator has installed remote control software (Similar to

Q2: A network administrator has installed remote control software (Similar to a Trojan horse) in a number of external hosts, in order to control them remotely from his host. The administrator's host (193.195.1.30) is located in a LAN protected by a Firewall. The server of the software is expected to run on the port 8, and use TCP protocol. Write the appropriate filtering rules to allow the network administrator to control remotely the external hosts running the remote control software. Ansver: Direction S. IP Des. IP Protocol S. Port Des. Port Type SYN ACK Action 1 0Accept Out Exter. 193.195.1.30 TCP 25 Q2: A network administrator has installed remote control software (Similar to a Trojan horse) in a number of external hosts, in order to control them remotely from his host. The administrator's host (193.195.1.30) is located in a LAN protected by a Firewall. The server of the software is expected to run on the port 8, and use TCP protocol. Write the appropriate filtering rules to allow the network administrator to control remotely the external hosts running the remote control software. Ansver: Direction S. IP Des. IP Protocol S. Port Des. Port Type SYN ACK Action 1 0Accept Out Exter. 193.195.1.30 TCP 25

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!