logo

Firewalls and Network Address Translation

   

Added on  2020-03-28

14 Pages1609 Words73 Views
Question 1. Firewalls [9 marks]

Rule.No Description Transport Source IPSource portDestination IPDestination port Action 1Internet toDMZifdmzAny Any 142.66.13.0/24>1023Allow 2DMZserver forpublic ifdmzAny Any Any Any Deny 3Staffsubnetaccess tothe webserverDMZifin10.4.10.0/24Any 142.66.13.0/24Any Allow 4Studentsubnetaccess tothe emailserver inDMZifin10.4.0.0/24Any 142.66.13.0/24Imap(tcp/993)Allow

5Ssh serveraccess totheexternalinternetuser ifdmz31.13.75.0/2423.63.9.0/24Any 142.66.13.0/24Ssh(tcp/22)(tcp/1234)Allow

In order to communicate with the command line and arrange firewall rules in crispy table,IP tables are used. Default policies are nothing but the policies that are predefined.INPUT,OUTPUT, FORWARD are the three default policies present. INPUT default policy is thedestination point to the host system where the OUTPUT default policy is the origin point to thehost system.The transfer or tradeoff between the policies is carried out using packets likeACCEPT and Drop and also FORWARD default policy that forwards from origin to destination.Question 2. WiFi Security [8 marks]WPA WPA is abbreviated as the Wi-Fi Protected Access. The algorithms used by WPAappears to be more secured.Temporary Key Integrated Protocol is used by WPA.By utilizing theprotocol, it carries the information packets across network.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment IT Network Designing
|10
|2046
|84

COIT20262 Advance Network Security
|15
|1894
|53

The Advanced Network Security
|17
|2110
|63

Assignment Advanced Network Security
|16
|3113
|132

Firewall Rules for Network Security: Accessing, Mitigating Virus Attack, VPN Access, VLAN Access, Blocking RFC 1918
|10
|922
|63

Advanced Network Security - Doc
|19
|3116
|36