Identify the ip address of both the client and the server

Assignment Help Computer Network Security
Reference no: EM131317773

Your assignment must be in Microsoft Word format

Note: Your assignment must be in Microsoft Word format, and must be submitted electronically by the due date via the Moodle website

Question 1: Firewall Rule Design

The following diagram shows the topology of the network of a small company. There are three servers located in a DMZ (Demilitarised Zone).

The web server can directly accept requests (HTTP or HTTPS) from the Internet or from the internal network.

The DNS server can directly accept requests from the Internet. The DNS server can also directly accept requests from the internal network. However, if the DNS server can not resolve a domain name requested by the internal network, it will contact the DNS servers on the Internet directly for the name resolution.

On behalf of the users on the internal network, the email server sends emails to and receives emails from the Internet. The users on the internal network use IMAP (Internet E-mail Access Protocol) to read and organize their emails on the email server.

The users on the internal network are allowed to access the Internet only for HTTP, HTTPS and FTP services. However, the users of the internal network are never allowed to connect the Internet directly.

Based on the above network configuration and application scenarios, answer the following three questions.

The firewall services are installed on the router. Create the firewall rules to implement the packet filtering and only allow the specified traffic. The firewall rules are to be created in the following format.

Briefly explain each rule in the rule base that you have created.

The proxy services are also installed on the router to conceal the users of the internal network (192.168.1.0/25) from the Internet. Suppose that users on the internal computers send the following requests to the Internet. The proxy services perform the Port Address Translation (PAT). Complete the following connection table to show how PAT is working for requests from the users on the internal network.

Packet Addressing on internal network

Packet Addressing on external network

Source IP

SourcePort

Destination IP

DestinationPort

Source IP

SourcePort

Destination IP

DestinationPort

192.168.1.2

1033

203.206.209.77

80

 

 

 

 

192.168.1.2

1035

210.10.102.196

443

 

 

 

 

192.168.1.5

2301

203.206.209.55

21

 

 

 

 

192.168.1.5

2302

202.2.59.40

443

 

 

 

 

192.168.1.5

4123

72.5.124.55

80

 

 

 

 

192.168.1.8

4128

72.5.124.35

21

 

 

 

 

192.168.1.8

1033

150.101.16.250

80

 

 

 

 

192.168.1.9

1035

150.101.16.250

443

 

 

 

 

Question 2: PCAP Analysis

For this question, you are to use the extracts from a PCAP file given below.

Your task is to annotate each packet commenting on the following characteristics.

Comment on any significant TCP flags and what they mean in the context of the packet capture. Significant flags include SYN, FIN, RST, and URG. You must explain why the flag has been set and what it means for this TCP connection.

Comment on the direction of each packet (ie. client -> server or server -> client). Be clear to explain in which direction the interaction is occurring

No.

Time

Source

Destination

Protocol

Info

1

2006-10-03 14:50:19.628169

138.77.36.105

138.77.36.46

TCP

41640 > smtp [SYN] Seq=0 Ack=0 Win=5840 Len=0 MSS=1460 TSV=34790 TSER=0 WS=2

Explanation:

2

2006-10-03 14:50:19.632551

138.77.36.46

138.77.36.105

TCP

smtp > 41640 [SYN, ACK] Seq=0 Ack=1 Win=5792 Len=0 MSS=1460 TSV=285859166 TSER=34790 WS=5

Explanation:

3

2006-10-03 14:50:19.633273

138.77.36.105

138.77.36.46

TCP

41640 > smtp [ACK] Seq=1 Ack=1 Win=5840 Len=0 TSV=34792 TSER=285859166

Explanation:

4

2006-10-03 14:50:19.641368

138.77.36.46

138.77.36.105

SMTP

Response: 220 basil.cqu.edu.au ESMTP Sendmail 8.13.7/8.13.7; Tue, 3 Oct 2006 14:50:19 +1000

Identify the IP address of both the client and the server?

What port numbers have been used by each and what is their type?

Question 3: Attack and Defence Research

DNS and ARP poisoning attacks are similar; however there are fundamental differences between the two. You are to research these specific differences contrasting the way the attacks are conducted and some of the countermeasures available. Ensure you use at least three in-text academic references to contrast these attacks

Remember that you are not to repeat in your research what DNS and ARP poisoning attacks are. We already know that from our discussions in class. In writing about the differences between the two types of attacks, contrast for example the complexity of the attacks (which one is easy to conduct and why), the impact (consequences) of the attacks, which one is more common and the different mechanisms available to counter the attacks. Write no more than 300 words (about a page including in-text references)

Reference no: EM131317773

Questions Cloud

What is the yield to maturity : Bluff Enterprises has $1,000 face value bonds outstanding. These bonds pay interest semiannually, mature in 6 years, and have a 7percent coupon. The current price is quoted at 101.36. What is the yield to maturity?
What is aluminium thickness : Resistance of 200µm long copper lines was measured to be 40 ohm. From copper deposition process we know that thickness is 300 nm. What is the linewidth?
Are inventory ratios meaningful for utilities : Are inventory ratios meaningful for utilities? Why?- What does the funded debt to operating property ratio measure for a utility?
Construct a payoff and profit-loss table : Construct a payoff and profit/loss table. Draw a diagram illustrating how the investor's payoff and profit or loss at expiation.
Identify the ip address of both the client and the server : Identify the IP address of both the client and the server? What port numbers have been used by each and what is their type? Briefly explain each rule in the rule base that you have created.
Can rbs be used to measure dopant profiles : If electron beam is focussed to a 15 nm spot, and at least 100 Auger events (electrons) must be collected to get a signal, what is the detection limit of Auger microprobe?
How demand for utilities differ from demand for product : Utilities are usually very highly leveraged. How is it that they are able to carry such high levels of debt?- How does demand for utilities differ from demand for other products or services?
Identify which agency or regulatory body is responsible : Explain how the rule making process relates to health care organizations.Explain how that rule is implemented.Identify which agency or regulatory body is responsible for overseeing it.Explain how healthcare organizations or healthcare industries are ..
Research in the laboratory to test the side effects : The director of Pele's R&D division strongly recommends further research in the laboratory to test the side effects of this chemical on other insects, birds, animals, plants, and even humans. He cautions the president, "We could be sued from all s..

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Describe what hacking of memory or hacking of ram means

Describe what hacking of memory or hacking of RAM means. Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action

  Understanding on network-related issues

CISC650 Computer Networks - In order to show understanding on network-related issues, each student is expected to complete a paper on a relevant network topic of the students choosing and interest.

  What is the plain text m

We assume that Oscar is able to observe all messages sent from Alice to Bob and vice versa. Oscar has no knowledge of any keys but the public one in case of DS - Will Bob detect this

  What are some of the considerations and issues

Discuss key management techniques. What are some of the considerations and issues? Give at least two examples of key management techniques.

  Objects-attributes and methods of the o-o model

Briefly explain what are objects, attributes, and methods of the O-O model. Draw an object model(s) and list a minimum of five attributes and five methods for the class and subclass for the XYZ Car Manufacturer (cars, minivans, trucks, SUVs, and hy..

  Department of homeland securitys mission

Interpret the Department of Homeland Security's mission, operations and responsibilities. Detail the Critical Infrastructure Protection (CIP) initiatives, what they protect, and the methods we use to protect our assets

  Largest threats against network security

Research and discuss what you believe are the largest threats against network security, and what measures should be taken to protect against such intrusions.

  The designers of s-aes got the ciphertext

Use the key 1010 0111 0011 1011 to encrypt the plaintext "ok" as expressed in ASCIIas 0110 1111 0110 1011. The designers of S-AES got the ciphertext 0000 0111 00111000. Do you?

  Research the possible ways of creating such a cctv system

MN603 Wireless Networks and Security Assignment. Research the possible ways of creating such a CCTV system for the above Case study to help Raju out. Which way would be the best possible approach. Justify your answer

  Discussion on computer crime

The state crime lab training coordinator is concerned with level of expertise at its Blacksburg, VA location and would like to contract DC Investigative to conduct four training sessions.

  How many keys are there in this compound cipher

An affine cipher can be combined with a Vigenère cipher by fixing a but using k different values of b and cycling through these b values, letter by letter. How many keys are there in this compound cipher?

  Expected time to find user passwords by dictionary attack

Suppose that eight more characters were added to the password and that the DES algorithm was changed so as to use all 16 password characters. What would be the expected time to find all users' passwords using a dictionary attack?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd