Summarises the firewall protocols, Computer Network Security

Your rules should ensure that Internet access will be restricted to the following:

Only the following services will be permitted as OUTBOUND traffic (to the Internet from the DMZ or intranet):

  • HTTPS and HTTP (from the intranet). Note: it is assumed that external Web access provides the ability to connect to the local Secure Web Server - no additional firewall rules are required.
  • SMTP (from the Mail Server)

Only the following services will be permitted as INBOUND traffic (to the DMZfrom the Internet):

  • HTTPS (to the Secure Web Server)
  • SMTP (to the Mail Server)

Access between the Intranet and the DMZ will be restricted to the following.
Only the following services will be permitted as OUTBOUND traffic (to the DMZ from the intranet):

  • POP3 (from the intranet to the Mail Server)
  • SSH (from the system administrators' subnet ( to all DMZ servers)

Only the following services will be permitted as INBOUND traffic (from the DMZ to the intranet) traffic:

  • Oracle (from the Secure Web Server)

The firewall is not to be accessible remotely on any interface - i.e. it should not accept connections on any of its IP addresses EXCEPT on its VPN port on the external interface.

Submission Requirements:

You are required to develop two sets of rules for the firewall.  One will process traffic travelling between the Internet to the DMZ and Intranet. The other will process traffic travelling between the Intranet and the DMZ.  You need to also explain what each rule does.The Following summarises the protocols and port numbers you may need to use:

Summary of the relevant Port Numbers:

Port Number



Oracle (SQLNet)














VPN Tunnel

Posted Date: 3/1/2013 12:08:05 AM | Location : United States

Related Discussions:- Summarises the firewall protocols, Assignment Help, Ask Question on Summarises the firewall protocols, Get Answer, Expert's Help, Summarises the firewall protocols Discussions

Write discussion on Summarises the firewall protocols
Your posts are moderated
Related Questions
Threat Identification After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats

QUESTION 1: a) Differentiate between a routing protocol and a routed protocol. b) Describe any three design goals of Routing protocols. c) Lists some of the features shared

Problem (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. The second screen capture is from the data portion of the frame.

CYCLIC REDUNDANCY CHECK (CRC) To activate a network system to check move error without increasing the amount of information in every packet another most successful method is m

Bridges perform both in the data link layers and physical of LANs of same kind. They split a bigger network in to smaller segments. They have logic that accept them to store the

Encryption Key Size When using ciphers, the size of crypto variable or key is quite important as the strength of many encryption applications and cryptosystems were measured by

LOCAL TALK Apple discovered the LAN technology that uses bus topology. Its interface is added with all Macintosh computers. It has very low speed i.e. 230.4Kbps. Also it is ch

Question a) From the capture below: Give the datagram source IP address, upper layer protocol, Total length in decimal and header checksum in hexadecimal; the segment source po

Question: (a) Besides privacy, what other security functions does Pretty Good Privacy (PGP) provides? (b) What is the Post Office Protocol (POP) used for? Why is it impo