This visual execution shows how a firewall and DMZ protect SCADA systems. Traffic from external networks first hits the firewall, which filters it based on rules. The DMZ acts as a buffer zone isolating SCADA devices. Commands add source IP ranges and ports to the DMZ zone and remove them from the public zone to avoid overlap. Specific SCADA device IPs are allowed explicitly. Traffic tests show allowed and blocked connections based on these rules. Variables track the state of sources, ports, and allowed IPs in each zone. Key moments clarify why sources must be removed from public when added to DMZ, why only allowed IPs pass, and the DMZ's role in security. Quizzes test understanding of IP allowances, zone changes, and traffic outcomes. This step-by-step trace helps beginners see how firewall and DMZ configurations protect SCADA networks.