Securing the network using a packet filter firewall, Computer Network Security

1. Network Design

Design your network giving appropriate IP addresses for your hosts. Provide a topology and table showing your addressing scheme.

2. Firewall policy

Write the ACL's required to implement the above firewall requirements.

3. Implementation

Implement a packet filter firewall in the router (not CBAC or zone based). Demonstrate your implementation using the hardware in the lab.

Posted Date: 2/16/2013 12:09:15 AM | Location : United States







Related Discussions:- Securing the network using a packet filter firewall, Assignment Help, Ask Question on Securing the network using a packet filter firewall, Get Answer, Expert's Help, Securing the network using a packet filter firewall Discussions

Write discussion on Securing the network using a packet filter firewall
Your posts are moderated
Related Questions
Public Key Infrastructure (PKI) It is integrated system of software, encryption methodologies, protocols, legal agreements, and 3rd-party services enabling users to communicate

CRC can detect the following errors better than check sums. a) Vertical errors b) Burst errors a) VERTICAL ERRORS:  This kind of error happens due to a hardware fai

Cipher Methods There are 2 methods of encrypting plaintext: • Bit stream method – every bit in the plaintext bit is transformed into a cipher bit one bit at a time. • Block cip

Question: a) Explain what you understand by the term brute force attack, giving an example of such an attack b) Briefly outline the concept of Caesar cipher and identify a

Ask question #Minimum.. 100 words accepted#

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption tec

Write down short notes on the architecture of WWW which is World Wide Web. WWW which means The World Wide web or the web is a repository of information spread worldwide and rel

DIRECT INDEXING It is less usually known method. It is possible only is cases where protocols address are given from a compact range. In the diagram below an example of direct

how to access tomcat by internet

(a) What are the different architectures for wireless networks? (b) Explain how WEP authentication and encryption works, describe the vulnerability. (c) In what ways are secu