SEED LAB - Firewall Configuration
Complete the SEED lab found below. Upon successful completion of the lab, you will submit screenshots (pasted into a Microsoft Word document) and then submit to Blackboard as proof of lab completion.
The learning objective of this lab is for students to see how a VPN works in action and how a VPN can help bypass egress firewalls. We will implement a very simple VPN in this lab and use it to bypass firewalls.
A typical VPN depends on two pieces of technologies: IP tunneling and encryption. The tunneling technology is the most essential one to help bypass firewalls; the encryption technology is for protecting the content of the traffic that goes through the VPN tunnel.
For the sake of simplicity, we will only focus on the tunneling part, so the traffic inside our tunnel is not encrypted. We have a separate VPN lab, which covers both tunneling and encryption. If readers are interested, they can work on our VPN lab to learn how to build a complete VPN. In this lab, we only focus on how to use VPN tunnel to bypass firewalls.
This question has not been answered.
Create a free account to get help with this and any other question!
Studypool values your privacy. Only questions posted as Public are visible on our website.
California Institute of Technology
Carnegie Mellon University
Massachusetts Institute of Technology
New York University
Notre Dam University
Pennsylvania State University
University of California