{"id":225,"date":"2025-04-25T23:44:48","date_gmt":"2025-04-25T23:44:48","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cybereporfolio\/?page_id=225"},"modified":"2025-04-28T17:37:37","modified_gmt":"2025-04-28T17:37:37","slug":"firewall-configuration","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cybereporfolio\/firewall-configuration\/","title":{"rendered":"Firewall Configuration"},"content":{"rendered":"\n<p>In this lab, I used a multitude of different VM&#8217;s to play offense and defense. On the Offensive side, I ran a port scan using nmap and utilized Wireshark on the Kali Linux VM to view traffic patterns on the other machines. As the defender, I configured firewall rules to block and allow traffic, and observed the results of the configurations. The first document is the assignment guidelines, and the second document are the steps I conducted and the written lab report. <\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/cybereporfolio\/wp-content\/uploads\/sites\/39006\/2025\/04\/Assignment-3-Sword-vs.-Shield-1-1.pdf\" class=\"pdfemb-viewer\" style=\"width: 1000px; height: 1200px; \" data-width=\"1000\" data-height=\"1200\"  data-toolbar=\"both\" data-toolbar-fixed=\"off\">Assignment-3-Sword-vs.-Shield-1-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/cybereporfolio\/wp-content\/uploads\/sites\/39006\/2025\/04\/annotated-Assignment20320-20Sword20vs.20Shield-1-1.pdf\" class=\"pdfemb-viewer\" style=\"width: 1000px; height: 1200px; \" data-width=\"1000\" data-height=\"1200\"  data-toolbar=\"both\" data-toolbar-fixed=\"off\">annotated-Assignment20320-20Sword20vs.20Shield-1-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this lab, I used a multitude of different VM&#8217;s to play offense and defense. On the Offensive side, I ran a port scan using nmap and utilized Wireshark on the Kali Linux VM to view traffic patterns on the other machines. As the defender, I configured firewall rules to block and allow traffic, and&hellip;&nbsp;<a href=\"https:\/\/sites.wp.odu.edu\/cybereporfolio\/firewall-configuration\/\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Firewall Configuration<\/span><\/a><\/p>\n","protected":false},"author":25795,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cybereporfolio\/wp-json\/wp\/v2\/pages\/225"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cybereporfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cybereporfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybereporfolio\/wp-json\/wp\/v2\/users\/25795"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybereporfolio\/wp-json\/wp\/v2\/comments?post=225"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/cybereporfolio\/wp-json\/wp\/v2\/pages\/225\/revisions"}],"predecessor-version":[{"id":301,"href":"https:\/\/sites.wp.odu.edu\/cybereporfolio\/wp-json\/wp\/v2\/pages\/225\/revisions\/301"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cybereporfolio\/wp-json\/wp\/v2\/media?parent=225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}