Differences between revisions 1 and 9 (spanning 8 versions)
Revision 1 as of 2014-08-14 18:43:57
Size: 368
Editor: scot
Comment:
Revision 9 as of 2021-11-04 19:35:13
Size: 1663
Editor: scot
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
= Lab 07 =  
The principle issue in firewalls is to block everything and allow only what you need.
= Lab 09 =
The principle issue in firewalls is to block everything and allow only what you need. Your job in this lab is to audit the firewall settings and remove access to any port or program not needed. For this you will need your documentation on services.
Line 7: Line 6:
Include the following information: Include the following information in a new page called "security" for each server:
Line 9: Line 8:
 1. A list of ports that you allow inbound access to. Sort them by profile and then port number.
 1. Separately, if the rule does not apply to a port, list the application that the rule applies to.
 1. A list of ports that you allow inbound access to. Sort them by profile and then port number.
 1. Separately, if the rule does not apply to a port, list the application that the rule applies to.
 1. Separately, list those rules that are disabled.
 1. Edit your firewall to allow port forwarding to your website (see the scripts from the first lab and in person lab directions)

You might find the following commands useful:

{{{#!highlight powershell
Get-NetFirewallRule
Get-NetFirewallPortFilter
Get-NetFirewallApplicationFilter
}}}
{{{#!wiki comment
Get-NetFirewallRule |
#? {$_.Name -like "Remote*" } |
? {$_.Enabled -eq "False" -and $_.Direction -eq "Inbound"} | Select-Object -Property Name, Profile, Enabled, Direction,
@{Name='Protocol';Expression={($PSItem | Get-NetFirewallPortFilter).Protocol}},
@{Name='Application';Expression={($PSItem | Get-NetFirewallApplicationFilter).AppPath}},
@{Name='LocalPort';Expression={($PSItem | Get-NetFirewallPortFilter).LocalPort}} | Export-Csv -Path .\disabled.csv
}}}

== Video Grade Guide ==
||'''Topics<<BR>>'''||'''Points<<BR>>'''||
||Talk your way through the documentation.||60||
||Demo going to your website from the lab network (i.e. you should be going to a IP that looks something like: 10.10.4.x) ||40||

Lab 09

The principle issue in firewalls is to block everything and allow only what you need. Your job in this lab is to audit the firewall settings and remove access to any port or program not needed. For this you will need your documentation on services.

Documentation

Include the following information in a new page called "security" for each server:

  1. A list of ports that you allow inbound access to. Sort them by profile and then port number.
  2. Separately, if the rule does not apply to a port, list the application that the rule applies to.
  3. Separately, list those rules that are disabled.
  4. Edit your firewall to allow port forwarding to your website (see the scripts from the first lab and in person lab directions)

You might find the following commands useful:

   1 Get-NetFirewallRule
   2 Get-NetFirewallPortFilter
   3 Get-NetFirewallApplicationFilter

Video Grade Guide

Topics

Points

Talk your way through the documentation.

60

Demo going to your website from the lab network (i.e. you should be going to a IP that looks something like: 10.10.4.x)

40

WindowsAdministration/Lab09Firewall (last edited 2021-11-04 19:35:13 by scot)