Assessment Activity 2 Sample
Assessment Activity 2 Sample
Assessment Activity 2 Sample
• Make a detailed narrative research report with pictures, step by step procedure, salient
features,
firewall design principles, etc. on how to setup Network Firewall Security. Use the
following format:
Top, Left, Bottom, Right margins: 1”
Font Style and Size: Arial 12
Paper Size: A4
Minimum number of pages: 18
• Upload your document in the Google classroom and submit a hard copy of your
document.
• Due date 18, January 2023 for 1st batch and 19, January 2023 for 2nd batch.
Salient features of Network Firewall Security
Access control: Controls which systems can access the network and which
Data filtering and packet inspection: Scans data packets that enter and leave the
network.
external users.
access.
3. Utilize Least Privilege: Only the least amount of privileges should be used for
network operations.
6. Utilize a Whitelisting Strategy: Only allow known, safe applications and services.
unauthorized access.
How to setup Network Firewall Security
Windows’ built-in firewall hides the ability to create powerful firewall rules. Block
programs from accessing the Internet, use a whitelist to control network access, restrict
traffic to specific ports and IP addresses, and more – all without installing another
firewall.
The firewall includes three different profiles, so you can apply different rules to private
and public networks. These options are included in the Windows Firewall with Advanced
There are a variety of ways to pull up the Windows Firewall with Advanced Security
window. One of the most obvious is from the Windows Firewall control panel – click the
network.
Public: Used when connected to a public network, such as a public Wi-Fi access
Windows asks whether a network is public or private when you first connect to it.
A computer may use multiple profiles, depending on the situation. For example, a
business laptop may use the domain profile when connected to a domain at work, the
private profile when connected to a home network, and the public profile when
The firewall properties window contains a separate tab for each profile. Windows blocks
inbound connections and allows outbound connections for all profiles by default, but you
can block all outbound connections and create rules that allow specific types of
connections. This setting is profile-specific, so you can use a whitelist only on specific
networks.
If you block outbound connections, you won’t receive a notification when a program is
To create a rule, select the Inbound Rules or Outbound Rules category at the left side of
the window and click the Create Rule link at the right side.
Let’s say we want to block a specific program from communicating with the Internet —
First, select the Program rule type. On the next screen, use the Browse button and
after blocking all applications by default, you’d select “Allow the connection” to whitelist
only want a program blocked when you’re connected to public Wi-Fi and other insecure
networks, leave the “Public” box checked. By default, Windows applies the rule to all
profiles.
On the Name screen, you can name the rule and enter an optional description. This will
If you really want to lock down a program, you can restrict the ports and IP addresses it
connects to. For example, let’s say you have a server application that you only want
From the Inbound Rule list, click New Rule and select the Custom rule type.
On the Program pane, select the program you want to restrict. If the program is running
as a Windows service, use the Customize button to select the service from a list. To
restrict all network traffic on the computer to communicating with a specific IP address
On the Protocol and Ports pane, select a protocol type and specify ports. For example,
if you’re running a web server application, you can restrict the web server application to
TCP connections on ports 80 and 443 by entering these ports in the Local port box.
The Scope tab allows you to restrict IP addresses. For example, if you only want the
server communicating with a specific IP address, enter that IP address in the remote IP
addresses box.
Select the “Allow the connection” option to allow the connection from the IP address and
ports you specified. Be sure to check that no other firewall rules apply to the program –
for example, if you have a firewall rule that allows all inbound traffic to the server
surprising amount of power. If you want more control and ease of use, you may be