Question: Q2: A network administrator has installed remote control software (Similar to a Trojan horse) in a number of external hosts, in order to control them

Q2: A network administrator has installed remote control software (Similar to a Trojan horse) in a number of external hosts, in order to control them remotely from his host. The administrator's host (193.195.1.30) is located in a LAN protected by a Firewall. The server of the software is expected to run on the port 8, and use TCP protocol. Write the appropriate filtering rules to allow the network administrator to control remotely the external hosts running the remote control software. and use TCP protocol. Write Ansver: Type SYN ACK Q2: A network administrator has installed remote control software (Similar to a Trojan horse) in a number of external hosts, in order to control them remotely from his host. The administrator's host (193.195.1.30) is located in a LAN protected by a Firewall. The server of the software is expected to run on the port 8, and use TCP protocol. Write the appropriate filtering rules to allow the network administrator to control remotely the external hosts running the remote control software. and use TCP protocol. Write Ansver: Type SYN ACK
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
