Securing the network using a packet filter firewall, Computer Network Security

1. Network Design

Design your network giving appropriate IP addresses for your hosts. Provide a topology and table showing your addressing scheme.

2. Firewall policy

Write the ACL's required to implement the above firewall requirements.

3. Implementation

Implement a packet filter firewall in the router (not CBAC or zone based). Demonstrate your implementation using the hardware in the lab.

Posted Date: 2/16/2013 12:09:15 AM | Location : United States







Related Discussions:- Securing the network using a packet filter firewall, Assignment Help, Ask Question on Securing the network using a packet filter firewall, Get Answer, Expert's Help, Securing the network using a packet filter firewall Discussions

Write discussion on Securing the network using a packet filter firewall
Your posts are moderated
Related Questions
For simplicity, each character is regarded as one data packet, which means that the data in each packet should have the max length of only 1 byte. Your own packet header (not th

DIRECT INDEXING It is less usually known method. It is possible only is cases where protocols address are given from a compact range. In the diagram below an example of direct

Question: a) You are using Active Directory Users under Windows Server 2003 and Computers to configure user objects in your domain, and you are able to change the address and

Ask question #Minimum.. 100 words accepted#

Social Network development in Java: Project Title: SUGGESTLOCAL (Nov 2006-April 2007) Role             : Developer Domain        : Social Network Client          :

QUESTION (a) (i) Describe Phishing attacks. (ii) Distinguish between Phishing and Spear Phishing attacks. (b) Describe two instances where an attacker sniffing on a netwo

IPV6 DATAGRAM FORMAT It is given in the figure below:

Question: a) Explain what the following intermediate systems are and how they work? i. Repeater ii. Bridge b) A service is formally specified by a set of primitives (op

implementing password policy in organisation

Explain in DES Data Encryption Standard : DES stands for Data Encryption Standard and is explained as follows: DES is at present the most widely used key cryptographic systems