logo

Advanced Network Security | Assignment

   

Added on  2020-04-01

15 Pages2051 Words45 Views
Running head: ADVANCED NETWORK SECURITYAdvanced Network SecurityName of the StudentName of the UniversityAuthor’s Note

1ADVANCED NETWORK SECURITY Table of ContentsQuestion 1. Firewalls...........................................................................................................2Question 2. WiFi Security...................................................................................................3Question 3. Access Control.................................................................................................5Question 4. HTTPS and Certificates...................................................................................9Question 5. Internet Privacy..............................................................................................11Bibliography......................................................................................................................13

2ADVANCED NETWORK SECURITY Question 1. Firewalls(a)The diagram is created for the network illustrating the current network of theeducational institution. The device used for the network connection is properlylabelled with the IP address.Figure 1: Illustration of the network(Source: created by author)(b)The rules of the firewalls created as per the business rules and documented in thefollowing table and the rules are explained after the table.Rule No.TransportSource IPSourcePortDestinationPortDestinationIPAction1TCPAny 143143142.66.13.10Deny

3ADVANCED NETWORK SECURITY 2TCPAny14331433142.66.13.30Allow3TCPAny1023Any142.66.13.20Deny4TCP10.4.10.0 –10.4.10.255 143143142.66.13.10Allow5TCP 142.66.13.101023Any142.66.13.30Allow6TCP142.66.13.301023Any 142.66.13.20Allow7TCP10.40.10.21234123410.4.10.4Allow8TCP10.40.20.21234123410.40.10.3Allow9TCP 10.40.10.312341234AnyDeny(c)The default policy of the firewall can be created using the iptables and –L can be usedfor the chain input accept policy and set the forwarding rules in the firewall. The –Acan be used for accepting the policy and application in the specified port dropping oraccepting the data packets in the network.Question 2. WiFi Security(a)WPA or wifi protected access is used in the wireless network for increasing thesecurity of the network solution and restrict the unauthorized users to connect withthe network. There is another version of WPA that is WPA2 and it came into playsince 2003 as a replacement of the WEP. TKIP is used as an encryption algorithm forWPA and a 128 bit key is generated for prevention of the different types of attacks. (b)Antennas, transmit power and AP positioning for controlling the radio rangeThe antennas are used in the wireless networks for generation of wireless signals andit acts as an extension of the radio. There are different factors that can affect the rangeof the antennas and it mainly depends on the amount of energy entering into theantenna. When the radio energy are passed the transmit power is required to be

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
COIT20262 Advance Network Security
|15
|1894
|53

The Advanced Network Security
|17
|2110
|63

Assignment Advanced Network Security
|16
|3113
|132

Firewalls and Network Address Translation
|14
|1609
|73

Advanced Network Security - Doc
|19
|3116
|36

Assignment IT Network Designing
|10
|2046
|84