{"id":2138,"date":"2026-02-26T12:00:00","date_gmt":"2026-02-26T12:00:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/locky\/?p=2138"},"modified":"2026-02-24T16:17:35","modified_gmt":"2026-02-24T16:17:35","slug":"sword-vs-shield-network-scanning-and-firewall-security","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/locky\/2026\/02\/26\/sword-vs-shield-network-scanning-and-firewall-security\/","title":{"rendered":"Sword vs. Shield: Network Scanning and Firewall Security"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/02\/Assignment3_Sword_vs_Shield_EC_fd_3_4.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">Assignment3_Sword_vs_Shield_EC_fd_3_4<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-1 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/02\/Assignment3_Sword_vs_Shield_EC_fd_3_4.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen or Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n","protected":false},"excerpt":{"rendered":"<p>This lab assignment covers network scanning techniques using Nmap and firewall configuration with pfSense. It explores the vulnerabilities discovered through the scanning process, such as open ports and potential exploitation, and demonstrates how configuring firewall rules can mitigate these risks. The exercise also evaluates the advantages and disadvantages of blocking ICMP traffic for network defense and operational efficiency.<\/p>\n","protected":false},"author":30379,"featured_media":2140,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"image","meta":{"advanced_seo_description":"This lab assignment covers network scanning techniques using Nmap and firewall configuration with pfSense. It explores the vulnerabilities discovered through the scanning process, such as open ports and potential exploitation, and demonstrates how configuring firewall rules can mitigate these risks. The exercise also evaluates the advantages and disadvantages of blocking ICMP traffic for network defense and operational efficiency.","jetpack_seo_html_title":"Sword vs. Shield: Network Scanning and Firewall Security","jetpack_seo_noindex":false,"footnotes":"","wds_primary_category":170,"jetpack_publicize_message":"Nmap + pfSense = powerful network defense. \ud83d\udd10 Explore the balance between scanning for vulnerabilities and securing your network with firewall rules that block unwanted traffic and enhance visibility.\n#Cybersecurity #NetworkSecurity #Nmap #pfSense","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[170,172,65,205,204,226,211,227,78],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/02\/Corpo_hacker2.jpg?fit=832%2C1248&ssl=1","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/posts\/2138"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/users\/30379"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/comments?post=2138"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/posts\/2138\/revisions"}],"predecessor-version":[{"id":2145,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/posts\/2138\/revisions\/2145"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/media\/2140"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/media?parent=2138"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/categories?post=2138"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/tags?post=2138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}