Time Required: 15 minutes
As a security professional, you might be asked to edit packet-filtering rule bases or improve rules that leave security holes open. Analyze the following rule base and then answer the questions. This Hands-On 6-2 project can also be found on page 243 of your text.
| Rule | Source IP | Source Port | Destination IP | Destination port | Action |
| 1 | Any | Any | 192.168.120.0 | >1023 | Allow |
| 2 | 192.168.120.1 | Any | Any | Any | Deny |
| 3 | Any | Any | 192.168.120.1 | Any | Deny |
| 4 | 192.168.120.0 | Any | Any | Any | Any |
| 5 | Any | Any | 192.168.120.2 | 25 | Allow |
| 6 | Any | Any | 192.168.120.3 | 80 | Allow |
| 7 | Any | Any | Any | Any | Allow |
- Examine Rule 1 and explain what security risk it poses. Describe how this rule could be improved.
- Describe a problem with the cleanup rule in the rule base.


0 comments