logo

COIT20262 Advance Network Security

   

Added on  2020-05-08

15 Pages1894 Words53 Views
Ruining head: ADVANCED NETWORK SECURITYAdvanced network SecurityName of the StudentName of the UniversityAuthor’s Note

1ADVANCED NETWORK SECURITY Table of Contents1. Firewalls..........................................................................................................................22. WiFi Security...................................................................................................................33. Access Control.................................................................................................................54. HTTPS and Certificates...................................................................................................85. Internet Privacy..............................................................................................................11Bibliography......................................................................................................................13

2ADVANCED NETWORK SECURITY 1. Firewalls(a)The network diagram is created for the deployment of the network infrastructure for theinstitution and the diagram is created in cisco packet tracer and labelled with the properaddressing plan. The interface of the network are labelled with the given name and a dmzzone is created for connecting the different subnets in the network. (b)The access control list are created as per the business rules and developed according tothe rules and tables Rule No.TransportSource IPSourcePortDestinationPortDestinationIPAction1TCPAny14331433142.66.13.30Allow2TCPAny 143143142.66.13.10Deny5TCP 142.66.13.101023Any142.66.13.30Allow3TCPAny1023Any142.66.13.20Deny

3ADVANCED NETWORK SECURITY 4TCP10.4.10.0 –10.4.10.255 143143142.66.13.10Allow6TCP142.66.13.301023Any 142.66.13.20Allow7TCP10.40.10.21234123410.4.10.4Allow9TCP 10.40.10.312341234AnyDeny8TCP10.40.20.21234123410.40.10.3Allow(c)Firewall policy is developed using the iptables from the routers and the default routingpolicy can be changed using different commands such as –P, –L or –A. The twoexamples of the common default policies used for the configuration of the access controllist are as follow:Dropping of the data packets from unknown hosts outside the dmz zone and allowingaccess of the web server for the student subnet with IP address 10.4.20.0/24. 2. WiFi Security(a)The WPA also known as the Wifi protected Passwords are used in the in the wireless networks so that the security of the network can be enhanced to a great level. This would help in restricting the unauthorized access to the network. The other version of the WPA are also available such as the WPA2. The WPA2 was introduced in the year 2003 and it was thought to be a suitable replacement for the WEP at that point of time. The encryption algorithm used for WPA is TKIP. It is basically a 128-bit key generated for the prevention of different type of attack on the network.(b)Antennas, transmit power and AP positioning for controlling the radio rangeAntennas are very useful in the wireless networks. They are used for the generation ofwireless signals across the whole network. They perform the basic task of extending the networkto a greater range this helps in the extensions of the radios used in the wireless networks. The

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Advanced Network Security | Assignment
|15
|2051
|45

The Advanced Network Security
|17
|2110
|63

Firewalls and Network Address Translation
|14
|1609
|73

Assignment Advanced Network Security
|16
|3113
|132

Assignment IT Network Designing
|10
|2046
|84

Advanced Network Security - Doc
|19
|3116
|36