From the course: Wireshark: Malware and Forensics
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Create firewall rules - Wireshark Tutorial
From the course: Wireshark: Malware and Forensics
Create firewall rules
- [Narrator] On a network, the router examines packets as data passes through the network and determines the destination based on network layer addressing information. In addition to routing traffic, a router uses an access control list or ACL to deny or permit traffic on a network. When a router receives a packet, it examines the field values and refers to the access control list. The router drops the packet if deny characteristics match. The router will forward packets if permit characteristics match. If the packet does not match any criteria given, the router drops the packet into the bit bucket, which is the implicit deny or clean-up rule. Each router interface has a separate access control list. There are different access control lists for inbound and outbound traffic. There is a wide range of packet filtering options. Common options include source and destination IP address, source and destination ports, flags set in the TCP header, UDP or certain ICMP packets, and specific…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Exploring cyberattacks and trends5m
-
(Locked)
Understanding malware and cyber threats2m 35s
-
(Locked)
Packet analysis overview2m 59s
-
(Locked)
Outlining the benefits of Wireshark3m 25s
-
(Locked)
Tshark4m 52s
-
(Locked)
Tap into your network4m 40s
-
(Locked)
Create firewall rules3m 53s
-
(Locked)
Challenge: Email forensics3m 37s
-
(Locked)
Response: Email forensics3m 56s
-
-
-
-
-