Explain what a stateful operation means for firewalls

Assignment Help Computer Networking
Reference no: EM132276366

Questions: 1. Consider the security policy shown below. Describe how the firewall processes each of the following packets traversing the firewall (clearly justify the action taken by the firewall). Assume also that there are two additional default rules at the end (Rule 5: intrazone default and Rule 6: interzone default) of the security policy.

a) A packet from IP 192.168.1.20 (in Trusted-L3) to IP 98.0.25.78 (in Untrusted-L3), HTTP application.

b) A packet from IP 192.168.1.3 (in Trusted-L3) to IP 98.0.25.78 (in Untrusted-L3), FTP application.

c) A packet from IP 192.168.1.3 (in Trusted-L3) to IP 98.0.25.78 (in Untrusted-L3), HTTP application.

d) A packet from IP 76.24.1.2 (in Untrusted-L3) to IP 192.168.1.88 (in Trusted-L3), HTTP.

2. Consider again the security policy of problem 1. Assume that the security officer must modify the policy, according to the following requirements.

a) Allow selective traffic from 192.168.1.3 (in Trusted-L3) to any IP address in Untrusted- L3. Only DNS, FTP, web-browsing must be allow from IP address 192.168.1.3 to Untrusted-L3.

b) Other devices in Trusted-L3 must be able to access any device in Untrusted-L3, any application.

c) Traffic generated in Untrusted-L3 must not be allowed to any zone.

3. Most firewalls are stateful devices. Explain what a stateful operation means for firewalls.

4. Firewalls and Next-generation Firewalls (NGFW) differ on the mechanisms / criteria used to filter packets. Describe how they differ, including filtering mechanisms.

Information related to above question is enclosed below:

Attachment:- homeworkModule7.rar

Reference no: EM132276366

Questions Cloud

Summarize the article - us economy : Summarize the article. support your observations with evidence from research and the readings - You can also use any financial websites along with any sources
Describe a hypothetical situation to promote service : Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive.
Research about group policy controls in microsoft windows : State the implications of your conclusions. State what might be the possible consequences of your conclusions.
Explain the technology evolution in systems development : What are FIVE (5) key trends for current IS development projects, considering the current technology evolution and best practices in systems development?
Explain what a stateful operation means for firewalls : ITEC 493 Most firewalls are stateful devices. Explain what a stateful operation means for firewalls. Firewalls and Next-generation Firewalls (NGFW) differ.
Modern methods of construction : SRR721 - Construction Research Project - Deakin University - Identify an issue of current relevance to the discipline of construction management
Develop in accordance with the system development life cycle : Outline the planning, analysis, design, and implementation phases. Develop in accordance with the systems development life cycle.
Summarize the advantages of modular data centers : Do some Internet research on modular (pod) data centers. Summarize the advantages of disadvantages of modular data centers.
Develop a genogram covering three generations : Due to HIPPA, you are to develop a genogram covering three generations based on information from Case study to reveal illustration of a family medical diagnosis

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd