Firewall ACL Analysis

Review the firewall rules below. Determine whether each statement is True or False, then identify any security issues in the configuration. Assume standard enterprise firewall behavior and apply general security best practices.

Rule # Source IP Destination IP Protocol Port Action
1Any10.10.0.10TCP8080Block
210.10.0.40192.168.10.0/24UDP67Allow
3AnyAnyTCP21Block
4Any10.10.0.30TCP443Allow
5192.168.10.0/2410.10.0.20UDP69Allow
6AnyAnyTCP3306Allow
710.10.0.50AnyTCP25Allow

Part 1: True / False

1. An external user can access a secure website hosted at 10.10.0.30.

2. A user can upload files using FTP to any internal system.

3. A database service using MySQL is accessible from any source.

4. Only the organization's mail server can send outbound SMTP traffic.

Part 2: Identify All Security Issues

Select all that apply.