Introduction  |  Discussions

Introduction

Today there are many types of firewalls in existence for the simple reason that modern network design must carefully include proper placement of one or more firewalls to protect important resources while at the same time allowing access to the resources to those that need it.


Learning objectives

  • Administer access control lists.
  • Manage network security through firewalls.
  • Implement context-based access control.
  • Implement zone-based policy firewalls.

Target Competencies

  • Implement firewall technlogies.

Learning Activities

  • Read Chapter 4 – Implementing Firewall Technologies and Power Point of Chapter 4
  • Participate in Lecture/Class Discussion on firewall technologies
  • Complete Configuration of Chapter 4 Lab A: Configuring CBAC and Zone-Based Firewalls
  • Complete Packet Tracer Labs.

Assessment Activities

  • Demonstrate and submit Chapter 4 Lab A configurations PAT for evaluation
  • Complete Packet Tracer lab: Configuring CBAC and Zone-Based Firewalls
  • Complete Packet Tracer lab: Configure IP ACLs to Mitigate Attacks
  • Complete Packet Tracer lab: Configuring Context-Based Access Control (CBAC)
  • Complete Quiz on Implementing Firewall Technologies