Write rule sets for two firewalls to permit traffic to flow

Assignment Help Computer Networking
Reference no: EM1386806

You are tasked with writing rule sets for two firewalls which protect network and form a DMZ. All traffic from internal network to Internet passes through DMZ. All servers which are accessible from Internet reside inside DMZ. All computers inside network (internal network and DMZ) have private IP addresses. All traffic to and from Internet passes through NAT device which is situated just inside perimeter firewall. All computers on this network are Windows computers

Servers in the DMZ
Service Public IP Address Private IP Address Comments
HTTP/HTTPS 200.100.100.10 192.168.20.10
FTP 200.100.100.11 192.168.20.11
DNS 200.100.100.12 192.168.20.12 utilizes TCP for zone transfers, services DNS lookup requests from all computers in internal network and DMZ
Email 200.100.100.13 192.168.20.13 SMTP
Proxy 200.100.100.14 192.168.20.14 Not accessible from Internet. Client computers connect to proxy service on port 8080

Clients on internal network: All user workstations access web sites via Proxy server. There are three different internal subnets: 10.10.10.0/24, 10.20.20.0/24 and 10.30.30.0/24. Computers on 10.10.10.0/24 subnet may access FTP servers on Internet. Computers on 10.20.20.0/24 network may access SSH server on Internet with the IP address 220.20.30.110. All computers on internal network may access company's Email, DNS, FTP and web servers which reside in DMZ.

Computers on three internal subnets use dynamic NAT pools as follows when making connections to internet.
Private IP address range NAT Pool
10.10.10.0/24 200.200.200.50 through 200.200.200.100
10.20.20.0/24 200.200.200.101 through 200.200.200.150
10.30.30.0/24 200.200.200.151 through 200.200.200.200

Reply the following:
Write down two rule sets for two firewalls which will permit only traffic described to flow.

Reference no: EM1386806

Questions Cloud

Percentage of persons enrolled in college : In a certain city, there are 100,000 persons age 18 to 24. A simple random sample of 500 such persons is drawn, of whom 198 turn out to be currently enrolled in college.
What is the total work completed on mass : A boy throws a 1.5 kg rock upward. To do so the boy applies a constant 38.5 N force upwards on the rock from point a to point b. after that the rock continues upward to its highest height at point c.
Individualistic american society created numerous problem : individualistic American society which created numerous problems for its managers while operating in Japan. Which of the subsequent can these problems be attributed to?
Find genotypes of the two parents of the litter : Long ears in some dogs are an autosomal dominant trait. Two dogs mate and produce a litter in which 75 percent of the puppies have long ears. Of the dogs with long ears in this litter,
Write rule sets for two firewalls to permit traffic to flow : Computers on three internal subnets use dynamic NAT pools as follows when making connections to internet. Write down two rule sets for two firewalls which will permit only traffic described to flow.
Average amount of purchase per weekend : The probability that average amount of purchase per weekend from Sam's sample is greater than average amount of purchase per weekend from Katie's sample =
Examine and explain how the macro level factors could change : Examine and explain how the macro level factors could change the specific aspects of Porter's 5 forces of competition.
Determine the final temperature of the system : A 790-N cliff diver in Alcapulco drops from a cliff 20.60 m above the water's surface. If friction is disregarded, what is the cliff diver's speed just before striking the water.
Probability of being deceptive : A federal report find that a lie detector test given to truthful persons have a probability of 0.2 of suggesting that the person is deceptive. A company asks 12 job applicants to take a lie detect test. Suppose that all 12 applicants answer truthf..

Reviews

Write a Review

Computer Networking Questions & Answers

  What were most important things cisco managers did right

What were the most important things Cisco managers did right, i.e., where had the ERP team been "smart'? How did Cisco manage unanticipated problems?

  Maintaining current employers connection to internet

Assume you are responsible for selecting and maintaining your current employers connection to the Internet. Take some time to research routing protocols

  Explain why it is recommended to secure windows

You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO has asked you to explain why you recommend it is so important to secure your Windows.

  Multiplexing signals directly onto sonet sts-1 channel

Suppose you could multiplex these signals directly onto SONET STS-1 channel how many MP3 songs could be trasmitted simultaneously?

  Explain nefarious computer activities

Write a short description of what they are and include your assessment of whether this activity is something to worry about or not.

  Advantages and disadvantages of simultaneous tcp connections

Can you configure the browser to open multiple simultaneous connections to the Web site? Write down the advantages and disadvantages of having large number of simultaneous TCP connections?

  Computing successive values of congestion window

Determine successive values of congestion window in bytes?

  Thesis statement pertaining to social networking

Develop a thesis statement pertaining to social networking. Identify writing strategies (mind mapping, brainstorming, and free writing)for developing the thesis and summarize experiences.

  Configure computers except sus server to connect to server

You wish to configure all the computers except SUS server to automatically connect to SUS server each morning at 7 A.M. to download and install new updates. Which of the given steps must you take to accomplish this goal?

  Research and recommend writing guide-forensics organization

Your manager has asked you to research and recommend a writing guide that examiners in your computer forensics organization will use for all official written reports.

  Computing propagation delay of the link

Suppose there is a 10 Mbps microwave link between a geostationary satellite and its base station on earth. What is the propagation delay of the link?

  What types of cable work to make connection in front office

Although loading dock is nowhere near shop floor, dock is 1100 feet from front office. What types of cable will work to make this connection? What type would you select and why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd