Discussion questions and mappings to blooms taxonomy - what


Cisco Firewall Rule Case Study

1. Case Learning Objectives

- Explain why it is important to configure firewall effectively
- Create Cisco firewall rules to satisfy organization policies.
- Update firewall rules when network architecture is changed.
- Distinguish the different roles of external firewall and internal firewall.

2. Case Description

You are the network administrator and it is your duty to configure the firewall rules to protect the company's network

3. Discussion Questions and Their Mappings to Bloom's Taxonomy

Table : Mapping of Cisco Firewall Rule case discussion questions to Bloom's Taxonomy.

         Cisco Firewall Rule Case Description Questions

Cognitive Levels

1.      Write the Cisco-like firewall rules to satisfy the following policy:

1)      Allow access to the homepage of your company.

2)      Allow the DNS to be accessed.

3)      Allow anyone to send email to the employee's company account.

4)      Allow employees to access their company email account via POP.

5)      Allow the FTP server to be accessed.

6)      Disallow anyone to access your SNMP data.

7)      Disallow employees to access wasteoftime website

8)      Allow anyone to send an AOL instant message to an employee in the company.

9)      Allow anyone to send an MSN instant message to an employee in the company.

10)  Prohibit Kazaa on all computers.

11)  Allow the CEO of the company to access the private Microsoft file share of the network administrator.

12)  Disallow others in the company to access the private Microsoft file share of the network administrator.

13)  Allow someone at 222.111.000.44 to do a Microsoft remote desktop connection to Jane's computer.

Level 3: Application

2. Suppose your company decides to create a backup DNS using the FTP server. Update your firewall rules.

Level 3: Application

3. What changes would be necessary if the main router did not function as a firewall but the two other routers performed the firewall responsibilities?

Level 4: Analysis

4. How would the firewall capabilities change if the firewall was a separate box that came between the routers and the Internet?

Level 4: Analysis

5. Suppose the network architecture is changed to be as Figure 2. Reconfigure the firewall rules for both firewalls. 

Level 3: Application

Level 4: Analysis

6. Explain why it is important to configure firewall effectively

Level 2: Comprehension

Attachment:- case study.rar

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Discussion questions and mappings to blooms taxonomy - what
Reference No:- TGS02785385

Now Priced at $40 (50% Discount)

Recommended (93%)

Rated (4.5/5)