- Home >
- Computer Science >
- SEED LAB - Firewall Configuration
SEED LAB - Firewall Configuration

Question Description
Complete the SEED lab found below. Upon successful completion of the lab, you will submit screenshots (pasted into a Microsoft Word document) and then submit to Blackboard as proof of lab completion.
The learning objective of this lab is for students to see how a VPN works in action and how a VPN can help bypass egress firewalls. We will implement a very simple VPN in this lab and use it to bypass firewalls.
A typical VPN depends on two pieces of technologies: IP tunneling and encryption. The tunneling technology is the most essential one to help bypass firewalls; the encryption technology is for protecting the content of the traffic that goes through the VPN tunnel.
For the sake of simplicity, we will only focus on the tunneling part, so the traffic inside our tunnel is not encrypted. We have a separate VPN lab, which covers both tunneling and encryption. If readers are interested, they can work on our VPN lab to learn how to build a complete VPN. In this lab, we only focus on how to use VPN tunnel to bypass firewalls.


This question has not been answered.
Create a free account to get help with this and any other question!





Similar Content

Studypool values your privacy. Only questions posted as Public are visible on our website.






Brown University
1271 Tutors

California Institute of Technology
2131 Tutors

Carnegie Mellon University
982 Tutors

Columbia University
1256 Tutors

Dartmouth University
2113 Tutors

Emory University
2279 Tutors

Harvard University
599 Tutors

Massachusetts Institute of Technology
2319 Tutors

New York University
1645 Tutors

Notre Dam University
1911 Tutors

Oklahoma University
2122 Tutors

Pennsylvania State University
932 Tutors

Princeton University
1211 Tutors

Stanford University
983 Tutors

University of California
1282 Tutors

Oxford University
123 Tutors

Yale University
2325 Tutors