Limited-time discount for students! | Solutions starting at $6 each.

[INCS 615: Network Security and Perimeter Protections].

Added on - 18 Sep 2019

  • 2

    Pages

  • 520

    Words

  • 174

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 1 of 2 pages
[INCS 615:Network Security and Perimeter Protections]School of Engineering and Computing Sciences-CybersecurityINCS 615: Network Security and Perimeter ProtectionsAssignment 1Individual Assignment - Due Date: 5thNov., 2016Q1.This homework problem requires you to design a firewall decision diagram for a firewallthat protects a private network. In this private network, there is only one server that serves asboth an email server and a DNS server. The IP address of this server is 192.168.0.1. Thisnetwork currently has 49 computers other than the server. The IP addresses used by these 49computers range from 192.168.0.2 to 192.168.0.50. The firewall has two interfaces: interface 0which connects the firewall to the outside Internet, and interface 1 which connects the firewall tothe private network. The function of this firewall is as follows:A.The 10 computers, whose IP addresses range from 192.168.0.2 to 192.168.0.11, are notallowed to be accessed from the outside Internet.B.The server only accepts TCP packets or UDP packets. The value of the protocol typefield of any TCP packet is 6, and the value of the protocol type field of any UDP packetis 17.C.The server is dedicated only to email services and DNS services. The email protocolsused by the email services include SMTP (which uses TCP port number 25), POP2(which uses TCP port number 109), and POP3 (which uses TCP port number 110). Toefficiently process multiple connection requests, the email server uses TCP portredirection. The port numbers used in port redirection range from 10000 to 30000. TheDNS service uses UDP port number 1949. The traffic to the server that does not belongto any of the above two services is discarded.D.The computers, whose IP addresses range from 192.168.0.12 to 192.168.0.50, are notallowed to run any of the services that are run by the server, but they are allowed to runany other services.Q2.We need to isolate the CS department network from the rest of the campus network. Someof the reasons are to improve the performance of both parts of the network as well as improve thesecurity of within our CS network. We have discussed the possibility of setting up a firewall /proxy server to facilitate this separation of the network.A.Discuss the advantages and disadvantages of setting up a firewall and / or proxy server.B.Are there any alternative solutions.C.Describe the specifications of a firewall / proxy server for the CS Department.
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document