Firewall ACL Analysis
Review the firewall rules below. Determine whether each statement is True or False, then identify any security issues in the configuration. Assume standard enterprise firewall behavior and apply general security best practices.
| Rule # | Source IP | Destination IP | Protocol | Port | Action |
|---|---|---|---|---|---|
| 1 | Any | 10.10.0.10 | TCP | 8080 | Block |
| 2 | 10.10.0.40 | 192.168.10.0/24 | UDP | 67 | Allow |
| 3 | Any | Any | TCP | 21 | Block |
| 4 | Any | 10.10.0.30 | TCP | 443 | Allow |
| 5 | 192.168.10.0/24 | 10.10.0.20 | UDP | 69 | Allow |
| 6 | Any | Any | TCP | 3306 | Allow |
| 7 | 10.10.0.50 | Any | TCP | 25 | Allow |
Part 1: True / False
1. An external user can access a secure website hosted at 10.10.0.30.
2. A user can upload files using FTP to any internal system.
3. A database service using MySQL is accessible from any source.
4. Only the organization's mail server can send outbound SMTP traffic.
Part 2: Identify All Security Issues
Select all that apply.