CSS Grade 10 Quarter 2 LAS 5
CSS Grade 10 Quarter 2 LAS 5
CSS Grade 10 Quarter 2 LAS 5
Firewall Configuration
i|Page
Quarter 2, Week 5
Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of such
work for profit. Such agency or office may, among other things, impose as a condition
the payment of royalties.
Layout Artist:
The Computer System Servicing NC II Activity Sheet will help you facilitate
the leaching-learning activities specified in each Most Essential Learning Competency
(MELC) with minimal or no face-to-face encounter between you and learner. This will
be made available to the learners with the references/links to ease the independent
learning.
iii | P a g e
Learning Activity Sheets (LAS)
(For Technology and Livelihood Education)
FIREWALL
A firewall is a security device — computer
hardware or software — that can help protect
your network by filtering traffic and blocking
outsiders from gaining unauthorized access to
the private data on your computer.
Not only does a firewall block unwanted traffic,
it can also help block malicious software from
https://www.hotspotshield.com/imgs/learn/what-is-a-computer-
infecting your computer. firewall/pic.jpg
Firewalls can provide different levels of
protection. They key is determining how much protection you need.
1|Page
FIREWALLS ARE PART OF YOUR NETWORK SECURITY
Firewalls represent a first line of defence in home network security.
Your home network is only as secure as its least protected device. That’s where a network
security system comes in.
A firewall shouldn’t be your only consideration for securing your home network. It’s important
to make sure all of your internet-enabled devices — including mobile devices — have the
latest operating system, web browsers, and security software.
Another consideration? Securing your wireless router. This might include changing the name
of your router from the default ID and password it came with from the manufacturer, reviewing
your security options, and setting up a guest network for visitors to your home.
TYPES OF FIREWALLS
There are software and hardware firewalls. Each format serves a different but important
purpose. A hardware firewall is physical, like a broadband router — stored between your
network and gateway. A software firewall is internal — a program on your computer that works
through port numbers and applications.
There also are cloud-based firewalls, known as Firewall as a Service (FaaS). One benefit of
cloud-based firewalls is that they can grow with your organization and, similar to hardware
firewalls, do well with perimeter security.
There are several different types of firewalls based on their structure and functionality. Here
are the different firewalls you can implement, depending on the size of your network and the
level of security you need.
2|Page
Packet-filtering firewalls
A packet-filtering firewall is a management program that can block network traffic IP
protocol, an IP address, and a port number. This type of firewall is the most basic form of
protection and is meant for smaller networks.
While packet-filtering firewalls can be helpful, they also have limitations. Because all web
traffic is allowed, it doesn’t block web-based attacks. So, you need additional protection to
distinguish between friendly and malicious web traffic.
Open access
Without a firewall, you’re accepting every connection into your network from anyone. You
wouldn’t have any way to detect incoming threats that could leave your devices vulnerable
to malicious users.
Network crashes
Without a firewall, attackers could shut down your network. Getting it running again, and
attempting to recover your stored data, could involve your time and money.
Firewalls are a key part of security technology, especially when the different types of
firewalls work together to provide an umbrella of protection. Firewalls can help keep your
network, computer, and data safe and secure.
4|Page
network connections traveling through the firewall. Packets that are not part of a
known connection are dropped.
Hardware Firewall
A hardware firewall is a physical filtering component that inspects data packets from the
network before they reach computers and other devices on a network. A hardware firewall is
a free-standing unit that does not use the resources of the computers it is protecting, so
there is no impact on processing performance.
Software Firewall
A software firewall is an application on a computer that inspects and filters data packets.
Windows Firewall is an example of a software firewall that is included in the Windows
operating system. A software firewall uses the resources of the computer, resulting in reduced
performance for the user.
Software Firewalls
Software firewalls can be either an independent application or part of the operating system.
There are several third-party software firewalls. There is also a software firewall built into
Windows 10.
5|Page
Windows Defender Firewall
Standard Procedure:
1. Select the Start button > Settings > Update & Security > Windows Security and
then Firewall & network protection. Open Windows Security settings
2. Select a network profile.
3. Under Microsoft Defender Firewall, switch the setting to On. If your device is connected to
a network, network policy settings might prevent you from completing these steps. For
more info, contact your administrator.
4. To turn it off, switch the setting to Off. Turning off Windows Defender Firewall could make
your device (and network, if you have one) more vulnerable to unauthorized access. If
there's an app you need to use that's being blocked, you can allow it through the firewall,
instead of turning the firewall off.
Short Cut:
Windows key + R,
type WF.msc, and
then press ENTER.
6|Page
To allow/block inbound or outbound
connections for a specific profile, click
Advanced Setting, right-click on the root
of Windows Defender Firewall with
Advanced Security > Properties.
7|Page
Use the Browse button
to specify the path to the
executable file that you
want to allow access to
the Internet. We selected
our browser’s executable
file C:\Program
Files\Mozilla
Firefox\firefox.exe
Click OK and
select for
which network
profiles this
rule should be
active.
➢ You can configure Windows Defender Firewall rules more finely from the wf.msc
console. Here you can create separate allowing or blocking rules for a specific
program, protocol (TCP/UDP/ ICMP/IPsec), IP address or port number.
8|Page
Next, follow a simple wizard to help
you to create your own rule in
Windows Defender Firewall.
9|Page
The new rule will
appear in
the Outbound
rules list. You can
disable it via
the Disable
rule option in
context menu. This
does not delete the
rule, but it
becomes inactive.
For more readings about Windows Defender Firewall you may open this link.
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-firewall/best-
practices-configuring
III. Accompanying DepEd Textbook and Educational Sites (With Possible Materials for
experiments/activities)
✓ https://www.kaspersky.com/resource-center/definitions/firewall, Retrieved on November 4,
2020, 8:05 AM
✓ https://us.norton.com/internetsecurity-emerging-threats-what-is-firewall.html, Retrieved on
November 4, 2020, 8:15 AM
✓ https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-firewall/best-
practices-configuring, Retrieved on November 4, 2020, 8:26 AM
✓ CISCO IT Essentials Offline Materials, Retrieved on November 4, 2020, 9:15 AM
✓
10 | P a g e
IV. Activity Proper
2. Exercises / Activities
2.1 Multiple Choice. Encircle the correct answer from the given choices below.
1. These are the common threats when linking your computer to a network or the internet,
except.
a. Hacking c. identity theft
b. cloud storage d. online fraud
2. The most basic form of protection and is meant for smaller networks.
a. Stateful multi-layer inspection (SMLI) firewalls
b. Packet-filtering firewalls
c. Next-generation firewalls (NGFW)
d. Network address translation (NAT) firewalls
4. This involves using data from prior connections and packets from the same connection.
a. Stateful multi-layer inspection (SMLI) firewalls
b. Packet-filtering firewalls
c. Next-generation firewalls (NGFW)
d. Network address translation (NAT) firewalls
5. The risk that attackers could shut down your network if without a firewall.
a. Open access c. Network crashes
b. Lost or compromised data d. None
6. The risk that you’re accepting every connection into your network from anyone if without
a firewall.
a. Open access c. Network crashes
b. Lost or compromised data d. None
7. This is a firewall that keeps track of the state of network connections traveling through
the firewall.
a. Stateful packet inspection c. Packet Filter
b. Proxy Firewall d. None
11 | P a g e
8. This is a set of rules that allows or denies traffic based on criteria such as IP addresses,
protocols, or ports used.
a. Stateful packet inspection c. Packet Filter
b. Proxy Firewall d. None
3. Reflection
Facebook is one of the most popular social media platforms in the world. Although it has
various benefits and is one of the most powerful creations, it also contains many
disadvantages. Some of them are addiction, time-waster, and causes distractions. Person
can lead to spending his precious time on Facebook, rather than doing something
productive. For children to become productive, parents must do something to limit the
usage of these platform at home.
How to limit the usage of social media platform like Facebook? Discuss.
12 | P a g e
3.1 Scoring Rubric
13 | P a g e
14 | P a g e
Multiple Choice
1. B
2. B
3. C
4. A
5. C
6. A
7. A
8. C
9. B
10. D
4. Answer Key