I’m studying network security fundamentals and need a practical example of how to configure a firewall. Could someone illustrate a generic firewall rule that effectively blocks all **File Transfer Protocol (FTP)** traffic originating from **untrusted networks** or **external sources** (like ...