IT 212 - Project #5 - Firewall Lab: Instructor: Leslie Fife

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

IT 212 - Project #5 – Firewall Lab

Instructor: Leslie Fife

Roberto C. Osornio
INTRODUCTION

Companies currently face the challenge of manage securely data traffic inside and outside
of their networks. In order to preserve data integrity, there are protocols that allow data traffic to
be private but available to the users that are supposed to access to it. For organizations that run
under a Windows environment, there is a method to tunnel and route data traffic more securely.

Firewall rules can allow passing IPSec traffic through any NAT device such as a router (or
a separate firewall in front of the VPN gateway / client).

Then, NAT rewrites IP addresses and manages the connections going through the NAT device
by mapping outgoing connections to a specific port. The IPSec protocols used for data transfer
do not have ports, and this causes problems with traversing NAT firewalls.

IMPLEMENTATION

I implemented a firewall rule that grants access to allow traffic through IPSec

- Open the Group Policy Management Console to Windows Defender Firewall with
Advanced Security. You must edit the GPO that applies settings to servers in the isolated
server zone.
- In the navigation pane, right-click Inbound Rules, and then click New Rule.
- On the Rule Type page, click Custom, and then click Next.
- If you must restrict access to a single network program, then you can select This program
path, and specify the program or service to which to grant access. Otherwise, click All
programs, and then click Next.
- If you must restrict access to only some TCP or UDP port numbers, then enter the port
numbers on the Protocol and Ports page. Otherwise, set Protocol type to Any, and then
click Next.
- On the Scope page, select Any IP address for both local and remote addresses, and then
click Next.
- On the Action page, click Allow the connection if it is secure. If required by your design,
you can also click Customize and select Require the connections to be encrypted. Click
Next.
- On the Users and Computers page, select the check box for the type of accounts
(computer or user) you want to allow, click Add, and then enter the group account that
contains the device and user accounts permitted to access the server.
Adding DigiCert CA for the Connection Rule

FINDINGS

By stablishing Firewall rules with tunnel configuration. Access to data outside of the
network is more secure and only authorized users will have permission to data inside of the
secure network. The use of Digital Certificates is an additional security measurement that
guarantees exclusive manage of the information to the authorized users.

Implementing these protocols is not expensive compared to the service they provide.
Information loss might result in a greater cost to an organization. Some of these procedures are
free and included in the Windows license that is already paid.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy