Securing the network using a packet filter firewall, Computer Network Security

Assignment Help:

1. Network Design

Design your network giving appropriate IP addresses for your hosts. Provide a topology and table showing your addressing scheme.

2. Firewall policy

Write the ACL's required to implement the above firewall requirements.

3. Implementation

Implement a packet filter firewall in the router (not CBAC or zone based). Demonstrate your implementation using the hardware in the lab.


Related Discussions:- Securing the network using a packet filter firewall

Understanding a business model of a spammer, The first and foremost need of...

The first and foremost need of  any business is a role to perform for its client base, and for the spammer this will typically be the role of advertising products which, due to the

Elliptic Curves, #questioAn elliptic curve y^2=x^3+ax+b(mod29) includes poi...

#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

Explain any two types of security policies, Question 1 Explain any two typ...

Question 1 Explain any two types of security policies Question 2 What is security attack? Explain with examples Question 3 Explain different characteristics that i

Backup, types of firewall and backup

types of firewall and backup

Basic types of agent in order of increasing generality, Question 1: (a)...

Question 1: (a) Define Artificial Intelligence. (b) Briefly describe the categories for the definition of Artificial Intelligence. (c) Identify the four basic types of

Security and basics steps in writing thesis, how can i start thesis? Please...

how can i start thesis? Please mention so of examples?

Securing the components-information security, SECURING THE COMPONENTS Co...

SECURING THE COMPONENTS Computer can be subject of an attack or the object of an attack. When subject of an attack, computer is used as lively tool to conduct attack. The figure

Mobile wireless networks , Is standard TCP effective in mobile wireless net...

Is standard TCP effective in mobile wireless networks that operate with the IEEE 802.11 wireless local area network protocol?Discuss the issue

Host-based ids, Host-Based IDS A host-based IDS (HIDS) resides on a part...

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

Explain what is a broadcast storm, QUESTION: (a) Ethernet has grown in ...

QUESTION: (a) Ethernet has grown in popularity in the recent years and is now used in LANs. Give three reasons for the success behind Ethernet. (b) Ethernet uses the CSMA/CD

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd