logo

INCS 615: Network Security and Perimeter Protections Assignment 1

2 Pages520 Words179 Views
   

Added on  2019-09-18

About This Document

This assignment covers topics like designing a firewall decision diagram, isolating CS department network, advantages and disadvantages of setting up a firewall and/or proxy server, NAT mechanism, and placement of web server in an organization. It is an individual assignment for INCS 615: Network Security and Perimeter Protections course offered by the School of Engineering and Computing Sciences- Cybersecurity. The due date for the assignment is 5th Nov., 2016.

INCS 615: Network Security and Perimeter Protections Assignment 1

   Added on 2019-09-18

ShareRelated Documents
[INCS 615: Network Security and Perimeter Protections]School of Engineering and Computing Sciences- CybersecurityINCS 615: Network Security and Perimeter ProtectionsAssignment 1 Individual Assignment - Due Date: 5th Nov., 2016Q1. This homework problem requires you to design a firewall decision diagram for a firewallthat protects a private network. In this private network, there is only one server that serves asboth an email server and a DNS server. The IP address of this server is 192.168.0.1. Thisnetwork currently has 49 computers other than the server. The IP addresses used by these 49computers range from 192.168.0.2 to 192.168.0.50. The firewall has two interfaces: interface 0which connects the firewall to the outside Internet, and interface 1 which connects the firewall tothe private network. The function of this firewall is as follows:A.The 10 computers, whose IP addresses range from 192.168.0.2 to 192.168.0.11, are not allowed to be accessed from the outside Internet.B.The server only accepts TCP packets or UDP packets. The value of the protocol type field of any TCP packet is 6, and the value of the protocol type field of any UDP packet is 17.C.The server is dedicated only to email services and DNS services. The email protocolsused by the email services include SMTP (which uses TCP port number 25), POP2(which uses TCP port number 109), and POP3 (which uses TCP port number 110). Toefficiently process multiple connection requests, the email server uses TCP portredirection. The port numbers used in port redirection range from 10000 to 30000. TheDNS service uses UDP port number 1949. The traffic to the server that does not belongto any of the above two services is discarded.D.The computers, whose IP addresses range from 192.168.0.12 to 192.168.0.50, are not allowed to run any of the services that are run by the server, but they are allowed to run any other services.Q2. We need to isolate the CS department network from the rest of the campus network. Some of the reasons are to improve the performance of both parts of the network as well as improve thesecurity of within our CS network. We have discussed the possibility of setting up a firewall / proxy server to facilitate this separation of the network. A.Discuss the advantages and disadvantages of setting up a firewall and / or proxy server. B.Are there any alternative solutions. C.Describe the specifications of a firewall / proxy server for the CS Department.
INCS 615: Network Security and Perimeter Protections Assignment 1_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security Assignment: Firewall Design, NAT, Proxy Server and VPN
|4
|941
|58

Firewall Rules for Network Security: Accessing, Mitigating Virus Attack, VPN Access, VLAN Access, Blocking RFC 1918
|10
|922
|63

IT Network Security
|68
|3007
|50

Assignment on Internetworking with TCP and IP
|17
|853
|34

COIT12202 – Network Security Concepts
|13
|1721
|98

COMP247 Data Communications
|5
|794
|437