Message Protocol
1. Please read this article: ICMP (Internet Control Message Protocol)
There are a few key tools used in network troubleshooting that utilize ICMP, such as Ping, Tracert, and Netstat. For this discussion, address each of these tools and how they are used to identify network issues. When would it be appropriate to block the use of ICMP or one of the key tools, and what problems would blocking it on a network generate?
2. How does your company use ACLs? Do they use ACLs at the network level? System level? Why is important to set ACLs? Why is it important to set network authentication?