Ask a question to Desklib · AI bot

Ask NowBETA

INCS 615: Network Security and Perimeter Protections Assignment 1

Added on -2019-09-18

This assignment covers topics like designing a firewall decision diagram, isolating CS department network, advantages and disadvantages of setting up a firewall and/or proxy server, NAT mechanism, and placement of web server in an organization. It is an individual assignment for INCS 615: Network Security and Perimeter Protections course offered by the School of Engineering and Computing Sciences- Cybersecurity. The due date for the assignment is 5th Nov., 2016.
| 2 pages
| 520 words
| 179 views

Trusted by 2+ million users,
1000+ happy students everyday

[INCS 615: Network Security and Perimeter Protections]School of Engineering and Computing Sciences- CybersecurityINCS 615: Network Security and Perimeter ProtectionsAssignment 1 Individual Assignment - Due Date: 5th Nov., 2016Q1. This homework problem requires you to design a firewall decision diagram for a firewallthat protects a private network. In this private network, there is only one server that serves asboth an email server and a DNS server. The IP address of this server is 192.168.0.1. Thisnetwork currently has 49 computers other than the server. The IP addresses used by these 49computers range from 192.168.0.2 to 192.168.0.50. The firewall has two interfaces: interface 0which connects the firewall to the outside Internet, and interface 1 which connects the firewall tothe private network. The function of this firewall is as follows:A.The 10 computers, whose IP addresses range from 192.168.0.2 to 192.168.0.11, are not allowed to be accessed from the outside Internet.B.The server only accepts TCP packets or UDP packets. The value of the protocol type field of any TCP packet is 6, and the value of the protocol type field of any UDP packet is 17.C.The server is dedicated only to email services and DNS services. The email protocolsused by the email services include SMTP (which uses TCP port number 25), POP2(which uses TCP port number 109), and POP3 (which uses TCP port number 110). Toefficiently process multiple connection requests, the email server uses TCP portredirection. The port numbers used in port redirection range from 10000 to 30000. TheDNS service uses UDP port number 1949. The traffic to the server that does not belongto any of the above two services is discarded.D.The computers, whose IP addresses range from 192.168.0.12 to 192.168.0.50, are not allowed to run any of the services that are run by the server, but they are allowed to run any other services.Q2. We need to isolate the CS department network from the rest of the campus network. Some of the reasons are to improve the performance of both parts of the network as well as improve thesecurity of within our CS network. We have discussed the possibility of setting up a firewall / proxy server to facilitate this separation of the network. A.Discuss the advantages and disadvantages of setting up a firewall and / or proxy server. B.Are there any alternative solutions. C.Describe the specifications of a firewall / proxy server for the CS Department.

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Students who viewed this