530a2
Case Project 3-1: Evading Firewalls and the IDPS- 600 WordsYou have been assigned to use Nmap to develop testing procedures for how attackers might try to evade detection at your organization’s firewalls and IDPS. Prepare a report that explains which Nmap options can be used to evade firewalls and IDPSs, and how these options function.Case Project 4-1: Tunneling IPv6- 2 pagesYou have been assigned to report to your network administrators on the use of Teredo. Prepare a two-page memo that outlines why Teredo was developed, how it is implemented in Windows operating systems, for which types of networks it is appropriate, and how long it should be implemented.Case Project 4-2 Creating ACLsYou have been assigned to create access control lists to filter specific traffic on a Cisco router. Provide the commands needed to filter the appropriate traffic in each of the following ACLs.ACL 1Allow Telnet connections to the 192.168.1.0 network from the host 10.3.4.7 .Allow established connections from 172.16.0.0 network to anywhere.Permit all other access.ACL 2Prevent Telnet connections from 192.168.1.0 network to 172.16.0.0 network.Prevent reserved addresses from accessing any network.Deny spoofing from the broadcast address.Permit all other access.