[INCS 615: Network Security and Perimeter Protections].

Added on - 18 Sep 2019

  • 2


  • 520


  • 110


  • 0


Trusted by +2 million users,
assist thousands of students everyday
Showing pages 1 to 1 of 2 pages
[INCS 615:Network Security and Perimeter Protections]School of Engineering and Computing Sciences-CybersecurityINCS 615: Network Security and Perimeter ProtectionsAssignment 1Individual Assignment - Due Date: 5thNov., 2016Q1.This homework problem requires you to design a firewall decision diagram for a firewallthat protects a private network. In this private network, there is only one server that serves asboth an email server and a DNS server. The IP address of this server is Thisnetwork currently has 49 computers other than the server. The IP addresses used by these 49computers range from to The firewall has two interfaces: interface 0which connects the firewall to the outside Internet, and interface 1 which connects the firewall tothe private network. The function of this firewall is as follows:A.The 10 computers, whose IP addresses range from to, are notallowed to be accessed from the outside Internet.B.The server only accepts TCP packets or UDP packets. The value of the protocol typefield of any TCP packet is 6, and the value of the protocol type field of any UDP packetis 17.C.The server is dedicated only to email services and DNS services. The email protocolsused by the email services include SMTP (which uses TCP port number 25), POP2(which uses TCP port number 109), and POP3 (which uses TCP port number 110). Toefficiently process multiple connection requests, the email server uses TCP portredirection. The port numbers used in port redirection range from 10000 to 30000. TheDNS service uses UDP port number 1949. The traffic to the server that does not belongto any of the above two services is discarded.D.The computers, whose IP addresses range from to, are notallowed to run any of the services that are run by the server, but they are allowed to runany other services.Q2.We need to isolate the CS department network from the rest of the campus network. Someof the reasons are to improve the performance of both parts of the network as well as improve thesecurity of within our CS network. We have discussed the possibility of setting up a firewall /proxy server to facilitate this separation of the network.A.Discuss the advantages and disadvantages of setting up a firewall and / or proxy server.B.Are there any alternative solutions.C.Describe the specifications of a firewall / proxy server for the CS Department.
You’re reading a preview
Preview Documents

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document