You are on page 1of 2

Junior ITS Carter Sheehan

Name of Activity: Lab 8.4.2 Configuring Access Policies, DMZ, and Port Forwarding

Description of this activity:
Objectives: Log in to a multi-function device and view security settings
Set up Internet access policies based on IP address and application.
Set up a DMZ for an open access server with a static IP address.
Set up port forwarding to limit port accessibility to only HTTP.
Use the Linksys WRT300N Help features.

Below is the physical topology of the lab exercise.



What we did:

In this lab my partner and I configured security settings for a Linksys WRT300N. This
device provides a software-based firewall to protect internal, local clients from attack from
external hosts. The Linksys can also filter internal traffic out based on the IP address,
destination website, and application while allowing external traffic in to protected areas of the
network using Demilitarized Zone (DMZ) or port forwarding.
First, my partner and I setup the network and configured the hosts. Next, we logged
into the routers interface and viewed the devices firewall settings. Then, we setup internet
access restrictions based on IP address and also based on application. After, we setup a
Junior ITS Carter Sheehan

simple DMZ then single port forwarding to allow access into our network from hosts outside
of our LAN.

Problems:

During the lab my partner and I encountered one problem while confirming
connectivity between the external network and the DMZ server. While trying to ping the DMZ
server, the IP address that was being pinged was the private IP address. What needed to be
pinged was the external address of the multi-function device.

Tests and results:

My partner and I tested the securities of a DMZ, application restriction/access and port
forwarding. We came to the conclusion that port forwarding was the most secure on our
network.

What we learned:

After completing the lab, we had learned many new ways to secure a network from
outside attacks. We learned how to configure access policies to restrict or allow access to the
internet or other applications on the network. My partner and I learned how to configure a
DMZ to add an additional layer of security from outside attacks. Finally, we learned how to
configure port forwarding to replace a DMZ.

You might also like