The document contains firewall configuration commands that filter network traffic by dropping or accepting connections based on port numbers, protocols, IP addresses, and other connection properties. Specific ports are configured to be dropped for inbound and outbound traffic. The firewall also allows established and related connections and drops invalid traffic.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
164 views6 pages
Annisa Rezdky Andini Ab Xii TKJ 5
The document contains firewall configuration commands that filter network traffic by dropping or accepting connections based on port numbers, protocols, IP addresses, and other connection properties. Specific ports are configured to be dropped for inbound and outbound traffic. The firewall also allows established and related connections and drops invalid traffic.