Laboratory #6 Firewall Installation

Goal: The purpose is to make the student able to configure an Enterprise Firewall based on the previously developed Enterprise Security Policy.

Nature: Hands-on

Duration: 2 Weeks.

Deliverables: 5-10 double spaced page

Your firewall laboratory exercise should use:

(1)Linux-based server { Debian Distribution] to install GuardDog firewall. Note: Already installed on one server [server3 by Ray Cunningham and Mark Heady]. For other groups, install on server2 and server 4. Get GuardDog from:

  1. Download the user’s manual and carefully read it.
  2. After reading the manual start to configure the firewall on your server[ follow the guide]
  3. Set the DMZ [ Wait until we decide where to put it]
  4. Test your firewall. Do a penetration testing.
  5. Go to Gibson Research at: and head to “Shields Up” area to test your firewalls and probe your ports.
  6. Use Nessus’s port scanning
  7. Use nmap port scanning
  8. Any other port scanner.
  9. Put the client for your server in a trusted zone. Show ( screen capture) all computers in the safe zone.
  10. Print a portion of the firewall logs.

(2)For the Windows-based server use the ZoneAlarms firewall. Since there is only one Windows-based machine, you need to use this in turns. The first group will download the firewall. Do this by accessing ZoneAlarms at:

  1. Carefully read the tips and online manual.
  2. After reading the manual start to configure the firewall on your server[ follow the guide]
  3. Set the DMZ [ Wait until we decide where to put it]
  4. Test your firewall. Do a penetration testing.
  5. Go to Gibson Research at: and head to “Shields Up” area to test your firewalls and probe your ports. As you run “Shields Up” take note of the activities of the firewall on the right side of your screen.
  6. Use Nessus’s port scanning
  7. Use nmap port scanning
  8. Any other port scanner.
  9. Put the client for your server in a trusted zone. Show ( screen capture) all computers in the safe zone.
  10. Print a portion of the firewall logs.

(3) Windows XP Firewall- Go in Network Connections - then Local Area Connections - Properties - Advanced  Windows Firewall.

Read more on this firewall in the “ Network Connection Firewall”.

Additional Questions:

(1) Explain the purpose of these fields:

  1. TCP protocol
  2. Direction
  3. Local host: address, port type, and port numbers
  4. Remote host: address, port type, and port numbers

(2)Which port numbers will deny the following applications and which protocols will be denied?

  1. Remote job entry
  2. MPM FLAGS protocol
  3. Host name server
  4. HTTP
  5. XNS Mail
  6. Finger
  7. SNA Gateway Access
  8. Sun Remote Call
  9. ISO-IPO
  10. SambaMS

(3)Create a rule that will deny information from one of the clients ( Choose one). Capture the image( of the rule) and print it.

(4)Block one request and then check the log

(5)Print the log file

(6)Explain (giving reasons) what you see in the log file.

In addition to those logs, also as a scientist, in a three- page report document your activities and observations.