all InfoSec news
Using Packet Tracer to Configure a ZPF
April 20, 2023, 7:28 p.m. | Ahmet Talha Şen
System Weakness - Medium systemweakness.com
Objectives
- Verify connectivity among devices before firewall configuration.
- Configure a zone-based policy (ZPF) firewall on R3.
- Verify ZPF firewall functionality using ping, SSH, and a web browser.
Background/Scenario
Zone-Based Policy Firewalls (ZPFs) are the latest development in the evolution of Cisco firewall technologies. In this activity, you will configure a basic ZPF on an edge router R3 that allows internal hosts access to external resources and blocks external hosts from accessing internal resources. You will then verify firewall functionality from …
cisco cisco-packet-tracer cybersecurity networking network security packet
More from systemweakness.com / System Weakness - Medium
An easy way to find bugs: Enter wrong data
1 day, 17 hours ago |
systemweakness.com
Amazon Inspector
1 day, 17 hours ago |
systemweakness.com
LLMs in Hacking: Automating OSINT and Web Hacking
1 day, 17 hours ago |
systemweakness.com
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Information System Security Engineer 2
@ Wyetech | Annapolis Junction, Maryland
Staff Vulnerability/Configuration Management Security Engineer
@ ServiceNow | Hyderabad, India
Security Engineer
@ AXS | London, England, UK