Securing the network using a packet filter firewall, Computer Network Security

1. Network Design

Design your network giving appropriate IP addresses for your hosts. Provide a topology and table showing your addressing scheme.

2. Firewall policy

Write the ACL's required to implement the above firewall requirements.

3. Implementation

Implement a packet filter firewall in the router (not CBAC or zone based). Demonstrate your implementation using the hardware in the lab.

Posted Date: 2/16/2013 12:09:15 AM | Location : United States







Related Discussions:- Securing the network using a packet filter firewall, Assignment Help, Ask Question on Securing the network using a packet filter firewall, Get Answer, Expert's Help, Securing the network using a packet filter firewall Discussions

Write discussion on Securing the network using a packet filter firewall
Your posts are moderated
Related Questions
Address resolution algorithms may be grouped into three basic types: Table lookup Closed-form computation Message Exchange 1. TABLE LOOKUP: In Table Loo

Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.   In general to

Question: (a) Describe how IPSec provides data source authentication. (b) Which protocol can be used to provide limited traffic analysis confidentiality? Why is it "limite

what is relation ship between computer security goals?

(a) Consider the subsequent authentication options: A. Using password. B. Using pin and fingerprint Which option A or B provides stronger security and why? (b) Give

BUSINESS NEEDS Information security performs four main functions for an organization. 1. Protects the ability of organization to function. 2. Enables safe operation of applicat

ROUTING TABLES AND ADDRESS MASKS Additional information is saved in routing table. Destination is kept as network address. Next hop is saved as IP address of router. Address m

(a) An opponent is using RSA with the public key {e=53, n=77}. You intercept the ciphertext C=10. (All values on this problem, including the ciphertext and the cleartext, are nume

This project involves the design and development of a simulation environment of many sensors tagging material/ machinery/equipment/etc in a warehouse site to help monitor and manag

According to the case, The EZ Company introduced a new technology, focusing on the principles of informationintegration and visualization. The company started negotiatinga saleto a