logo

The Advanced Network Security

   

Added on  2020-03-23

17 Pages2110 Words63 Views
Running head: ADVANCED NETWORK SECURITYAdvanced Network SecurityName of the StudentName of the UniversityAuthor’s Note

1ADVANCED NETWORK SECURITY Table of ContentsAnswer to Question 1: Firewalls.........................................................................................2Answer to Question 2: WiFi Security..................................................................................3a. WPA.............................................................................................................................3b. Antennas, transmit power and AP positioning for controlling range of radio.............4c. RADIUS.......................................................................................................................4d. Manual detection of rogue Aps....................................................................................5Answer to Question 3: Access Control................................................................................6Answer to Question 4: HTTPS and Certificates................................................................11Answer to Question 5: Internet Privacy.............................................................................13Bibliography......................................................................................................................15

2ADVANCED NETWORK SECURITY Answer to Question 1: FirewallsRule No.TransportSource IPSourcePortDestinationPortDestinationIPAction1TCP10.4.10.0 –10.4.10.255 143143142.66.13.10Allow2TCPAny 143143142.66.13.10Deny3TCPAny14331433142.66.13.30Allow4TCPAny1023Any142.66.13.20Deny5TCP 142.66.13.101023Any142.66.13.30Allow6TCP142.66.13.301023Any 142.66.13.20Allow7TCP10.40.10.21234123410.4.10.4Allow8TCP10.40.20.21234123410.40.10.3Allow9TCP 10.40.10.312341234AnyDenyExplanation of the rules:

3ADVANCED NETWORK SECURITY Rule 1 & 2: They are created to block the external access to the network. Rule 3: This rule would prohibit the researchers and the students from accessingthe mail server.Rule 4: This rule would block the other host addresses from accessing the webserver.Rule 5: This rule allows authorization for the request that are outside the network.Rule 6: This rue defines the accessibility of the web server. Rule 7 & 8 & 9: This rule is used to enable the SSH accessibility of the server.c. The two common default policies are intrusion prevention policy and device or applicationcontrol policy in the firewall. The intrusion prevention can be configured by blocking theunauthorized host to connect in the network and the application or device control can be appliedwith the enforcement of routing rules such as blocking UDP connection in the network. Answer to Question 2: WiFi Securitya. WPAWifi protected access is referred to as WPA and it is an encryption technique used forsecuring the wireless access point from unauthorized access. It is the revised version of WEP andit uses the TKIP temporal key integrity protocol for the initialization and checking the integrityof the authentication. WPA can operate with the WEP and increases the security of Access point. There aredifferent version of WPA and the most recent version is the WPA 2 and it uses the CCMPCounter Mode Cipher Block Chaining Message Authentication Code Protocol as the encryptionalgorithm for authentication and verification of the integrity of the wireless network. There are

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Advanced Network Security | Assignment
|15
|2051
|45

COIT20262 Advance Network Security
|15
|1894
|53

Assignment Advanced Network Security
|16
|3113
|132

Firewalls and Network Address Translation
|14
|1609
|73

Assignment IT Network Designing
|10
|2046
|84

Advanced Network Security - Doc
|19
|3116
|36