April 20, 2023, 7:28 p.m. | Ahmet Talha Şen

System Weakness - Medium systemweakness.com

Objectives

  • Verify connectivity among devices before firewall configuration.
  • Configure a zone-based policy (ZPF) firewall on R3.
  • Verify ZPF firewall functionality using ping, SSH, and a web browser.

Background/Scenario

Zone-Based Policy Firewalls (ZPFs) are the latest development in the evolution of Cisco firewall technologies. In this activity, you will configure a basic ZPF on an edge router R3 that allows internal hosts access to external resources and blocks external hosts from accessing internal resources. You will then verify firewall functionality from …

cisco cisco-packet-tracer cybersecurity networking network security packet

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Information System Security Engineer 2

@ Wyetech | Annapolis Junction, Maryland

Staff Vulnerability/Configuration Management Security Engineer

@ ServiceNow | Hyderabad, India

Security Engineer

@ AXS | London, England, UK