Write rule sets for two firewalls to permit traffic to flow

Assignment Help Computer Networking
Reference no: EM1386806

You are tasked with writing rule sets for two firewalls which protect network and form a DMZ. All traffic from internal network to Internet passes through DMZ. All servers which are accessible from Internet reside inside DMZ. All computers inside network (internal network and DMZ) have private IP addresses. All traffic to and from Internet passes through NAT device which is situated just inside perimeter firewall. All computers on this network are Windows computers

Servers in the DMZ
Service Public IP Address Private IP Address Comments
HTTP/HTTPS 200.100.100.10 192.168.20.10
FTP 200.100.100.11 192.168.20.11
DNS 200.100.100.12 192.168.20.12 utilizes TCP for zone transfers, services DNS lookup requests from all computers in internal network and DMZ
Email 200.100.100.13 192.168.20.13 SMTP
Proxy 200.100.100.14 192.168.20.14 Not accessible from Internet. Client computers connect to proxy service on port 8080

Clients on internal network: All user workstations access web sites via Proxy server. There are three different internal subnets: 10.10.10.0/24, 10.20.20.0/24 and 10.30.30.0/24. Computers on 10.10.10.0/24 subnet may access FTP servers on Internet. Computers on 10.20.20.0/24 network may access SSH server on Internet with the IP address 220.20.30.110. All computers on internal network may access company's Email, DNS, FTP and web servers which reside in DMZ.

Computers on three internal subnets use dynamic NAT pools as follows when making connections to internet.
Private IP address range NAT Pool
10.10.10.0/24 200.200.200.50 through 200.200.200.100
10.20.20.0/24 200.200.200.101 through 200.200.200.150
10.30.30.0/24 200.200.200.151 through 200.200.200.200

Reply the following:
Write down two rule sets for two firewalls which will permit only traffic described to flow.

Reference no: EM1386806

Questions Cloud

Percentage of persons enrolled in college : In a certain city, there are 100,000 persons age 18 to 24. A simple random sample of 500 such persons is drawn, of whom 198 turn out to be currently enrolled in college.
What is the total work completed on mass : A boy throws a 1.5 kg rock upward. To do so the boy applies a constant 38.5 N force upwards on the rock from point a to point b. after that the rock continues upward to its highest height at point c.
Individualistic american society created numerous problem : individualistic American society which created numerous problems for its managers while operating in Japan. Which of the subsequent can these problems be attributed to?
Find genotypes of the two parents of the litter : Long ears in some dogs are an autosomal dominant trait. Two dogs mate and produce a litter in which 75 percent of the puppies have long ears. Of the dogs with long ears in this litter,
Write rule sets for two firewalls to permit traffic to flow : Computers on three internal subnets use dynamic NAT pools as follows when making connections to internet. Write down two rule sets for two firewalls which will permit only traffic described to flow.
Average amount of purchase per weekend : The probability that average amount of purchase per weekend from Sam's sample is greater than average amount of purchase per weekend from Katie's sample =
Examine and explain how the macro level factors could change : Examine and explain how the macro level factors could change the specific aspects of Porter's 5 forces of competition.
Determine the final temperature of the system : A 790-N cliff diver in Alcapulco drops from a cliff 20.60 m above the water's surface. If friction is disregarded, what is the cliff diver's speed just before striking the water.
Probability of being deceptive : A federal report find that a lie detector test given to truthful persons have a probability of 0.2 of suggesting that the person is deceptive. A company asks 12 job applicants to take a lie detect test. Suppose that all 12 applicants answer truthf..

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain ethics of developing type of system

Number of citizens and their actions. Clearly this has privacy, implications. Explain the ethics of developing this type of system.

  Explain relationship between privacy and it

Explain the relationship between privacy and IT. Describe some of the threats to information security and some of the measures you can take to protect information resources.

  Explain subnet mask information for departments and routers

Write a 1-2 page paper listing configuration changes to present to the manager, who has technical background, which details the plan and your timeline for implementation.

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

  How company ensure adequate destruction of materials

How will your company ensure adequate destruction of the materials thus ensuring an individual's privacy? Will any state-wide, national, or industry standards be met? If so, which ones and how?

  Explaining configuration of http and nntp in organization

Users are familiar with some network services like HTTP (Hypertext Transport Protocol) - Web, NNTP (Network News Transport Protocol). How do they figure into organizational security?

  Explain the three instruction formats used in mips

Explain the three instruction formats which are used in MIPS. What limitations do they put on form and kind of instruction which are used in te ISA?

  How long does it take to send file over circuit-switched

How long does it take to send a file of 640,000 bits from host A to host B over a circuit-switched network? All links are 1.536 Mbps Each link uses FDM.

  Difference between symmetric and public key system

What is the most important difference between a symmetric key system and a public key system and in what way does a hash function provide a better message integrity check than a checksum

  Company-s interpretation of requirement of system

You have taken job with a software user who has contracted previous employer to develop a system for them. You discover that your company's interpretation of requirements is different from interpretation.

  Determine internet address for domain name

Determine an Internet address for this domain name. Under what situations is each of the following statements true of the name resolution process?

  Determine about the crash if rip is used

The node in Denver crashes completely. How do the other nodes in the country find out about the crash if RIP is used? If OSPF is used?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd