Summarises the firewall protocols, Computer Network Security

Your rules should ensure that Internet access will be restricted to the following:

Only the following services will be permitted as OUTBOUND traffic (to the Internet from the DMZ or intranet):

  • HTTPS and HTTP (from the intranet). Note: it is assumed that external Web access provides the ability to connect to the local Secure Web Server - no additional firewall rules are required.
  • SMTP (from the Mail Server)

Only the following services will be permitted as INBOUND traffic (to the DMZfrom the Internet):

  • HTTPS (to the Secure Web Server)
  • SMTP (to the Mail Server)

Access between the Intranet and the DMZ will be restricted to the following.
Only the following services will be permitted as OUTBOUND traffic (to the DMZ from the intranet):

  • POP3 (from the intranet to the Mail Server)
  • SSH (from the system administrators' subnet (10.2.5.0) to all DMZ servers)

Only the following services will be permitted as INBOUND traffic (from the DMZ to the intranet) traffic:

  • Oracle (from the Secure Web Server)

The firewall is not to be accessible remotely on any interface - i.e. it should not accept connections on any of its IP addresses EXCEPT on its VPN port on the external interface.

Submission Requirements:

You are required to develop two sets of rules for the firewall.  One will process traffic travelling between the Internet to the DMZ and Intranet. The other will process traffic travelling between the Intranet and the DMZ.  You need to also explain what each rule does.The Following summarises the protocols and port numbers you may need to use:

Summary of the relevant Port Numbers:

Port Number

Protocol

1521

Oracle (SQLNet)

22

SSH

25

SMTP

443

HTTPS

80

HTTP

110

POP3

445

SMB

4500

VPN Tunnel

Posted Date: 3/1/2013 12:08:05 AM | Location : United States







Related Discussions:- Summarises the firewall protocols, Assignment Help, Ask Question on Summarises the firewall protocols, Get Answer, Expert's Help, Summarises the firewall protocols Discussions

Write discussion on Summarises the firewall protocols
Your posts are moderated
Related Questions
With explain the encryption model the help of diagram. Symmetric cipher model uses the secret-key or a single-key for encryption/decryption purposes. It employs a symmetric encr

QUESTION (a) Mention two attitudes of a carer towards an inspector that could lead to negative outcomes (b) Give two performance indicators of Early Childhood Education that

RISK ASSESSMENT Risk assessment is a step in a risk management technique. Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete

DEPLOYMENT AND IMPLEMENTING OF AN IDS The strategy for deploying IDS should consider various factors. These factors will determine the number of administrators required to insta

Question (a) Name 3 popular electronic mail access protocols? (b) i. What is DNS? ii. Briefly, describe what it does and how it works? iii. Why does DNS use a dist

Question: (a) Describe how IPSec provides data source authentication. (b) Which protocol can be used to provide limited traffic analysis confidentiality? Why is it "limite

implementing password policy in organisation

Question: (a) What do you meant by the term diffusion and confusion? Explain how diffusion and confusion can be implemented. (b) Distinguish between authorisation and auth

Documenting the Results of Risk Assessment The goal of this process is to recognize the information assets, list them, and rank according to those most required protection. The

The following message was enciphered with a Vigenère cipher. aikiaawgfspxeppvjabjnivulfznzvkrlidamsmyamlvskniyffdpbwtnxsvvbtnamvltsefoeycztkomylmerkwrs deusjgecmzkwvnreeyp