Video Tutorials – TCP Established ACLs
In part 1, I demonstrate how an access list based firewall functions in a sample network scenario with a private LAN and public DMZ.
In part 2, I demonstrate how a hacker could bypass an access list firewall by masquerading the port number. I also demonstrate how to solve this problem by using a tcp-established access list.
Video Tutorials – Reflexive ACLs
In part 1, I discuss differences between TCP established access lists and reflexive access lists. I outline a sample network topology and how to configure a reflexive access list in that scenario.
In part 2, using remote access to a router through Netlab, I configure and troubleshoot a reflexive access list.