Securing the network using a packet filter firewall, Computer Network Security

1. Network Design

Design your network giving appropriate IP addresses for your hosts. Provide a topology and table showing your addressing scheme.

2. Firewall policy

Write the ACL's required to implement the above firewall requirements.

3. Implementation

Implement a packet filter firewall in the router (not CBAC or zone based). Demonstrate your implementation using the hardware in the lab.

Posted Date: 2/16/2013 12:09:15 AM | Location : United States







Related Discussions:- Securing the network using a packet filter firewall, Assignment Help, Ask Question on Securing the network using a packet filter firewall, Get Answer, Expert's Help, Securing the network using a packet filter firewall Discussions

Write discussion on Securing the network using a packet filter firewall
Your posts are moderated
Related Questions
Limitations of firewall Firewalls cannot protect a network if security rules are not followed properly by an organization or if the rules are not defined properly. Firewalls ar

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •    Apply safeguards wh

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

Risk Identification Risk management comprises of identifying, classifying and prioritizing organization’s information assets, threats and vulnerabilities also. Risk Identificati


TOKEN RING Many LAN methods that are ring topology need token passing for synchronized access to the ring. The ring itself is acts as a single shared communication phase. Both

An injunction to 'think ethically' about a situation is not helpful. Perhaps if one has a background in moral philosophy this would work, but usually both students and IT professio

Question: Suppose the following brief history of WLAN security standards: When the security of WEP was broken, the industry turned to the IEEE to fix it. The IEEE said it could

You have been asked to design a Banking Network with two primary types of locations.  Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 s

Ask quIf you are pinging a web server from a user’s client PC, how might the statistical information provided by ping be useful to you?estion #Minimum 100 words accepted#