1. Assume that the machine you scanned was a simple web server. Write the firewall rules to protect the other ports while still allowing web access. 2. The web server needs to make outbound TCP calls to an external database server. What new rule or rules would you need? 3. Suppose that the content of the web server was maintained by an outside company, using ssh. What would the new ruleset look like? 4. Suppose that that outside company wanted to use NFS instead of ssh to modify files on that web server. Without writing the rules in detail, explain whether or not this is a good idea. 5. What would firewall rules look like so that legitimate outsiders could connect, while preventing this sort of scanning by others?