Securing the network using a packet filter firewall, Computer Network Security

1. Network Design

Design your network giving appropriate IP addresses for your hosts. Provide a topology and table showing your addressing scheme.

2. Firewall policy

Write the ACL's required to implement the above firewall requirements.

3. Implementation

Implement a packet filter firewall in the router (not CBAC or zone based). Demonstrate your implementation using the hardware in the lab.

Posted Date: 2/16/2013 12:09:15 AM | Location : United States







Related Discussions:- Securing the network using a packet filter firewall, Assignment Help, Ask Question on Securing the network using a packet filter firewall, Get Answer, Expert's Help, Securing the network using a packet filter firewall Discussions

Write discussion on Securing the network using a packet filter firewall
Your posts are moderated
Related Questions
QUESTION: (a) Ethernet has grown in popularity in the recent years and is now used in LANs. Give three reasons for the success behind Ethernet. (b) Ethernet uses the CSMA/CD

Problem 1: a) One of the limitations of file processing systems is data inconsistency. Briefly explain with the help of an example what do you understand by this phrase. b)

What is the function of key secrecy and algorithm secrecy in security?  Algorithm Secrecy is explained as follows: ‘Algorithm secrecy’ is a method of keeping an algorithm

Mapping between a hardware address and a protocol address is known Address Resolution. A router or host uses address resolution when it requires to transmit a packet to another dev

(a) Explain the two possible configuration for 3DES. (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d) Describe

Information System Security 1. Write about: a. Potential Risks to Information Systems b. Factors to be addressed for making information systems more secure 2. Write about t

Question 1: (a) Differentiate between symmetric and asymmetric encryption system. (b) Describe how a digital signature is created. (c) Explain briefly what SSL (secure so

ENCAPSULATION Network interface layer adds IP datagram as data area in hardware frame. Hardware ignores IP datagram message format. Standards for encapsulation defines details

Write down short notes on the architecture of WWW which is World Wide Web. WWW which means The World Wide web or the web is a repository of information spread worldwide and rel

To master the complexity one must apply the given points. CONCENTRATE IN UNDERSTANDING THE CONCEPTS: Instead of details of wires used to connect computers to a specif