Summarises the firewall protocols, Computer Network Security

Assignment Help:

Your rules should ensure that Internet access will be restricted to the following:

Only the following services will be permitted as OUTBOUND traffic (to the Internet from the DMZ or intranet):

  • HTTPS and HTTP (from the intranet). Note: it is assumed that external Web access provides the ability to connect to the local Secure Web Server - no additional firewall rules are required.
  • SMTP (from the Mail Server)

Only the following services will be permitted as INBOUND traffic (to the DMZfrom the Internet):

  • HTTPS (to the Secure Web Server)
  • SMTP (to the Mail Server)

Access between the Intranet and the DMZ will be restricted to the following.
Only the following services will be permitted as OUTBOUND traffic (to the DMZ from the intranet):

  • POP3 (from the intranet to the Mail Server)
  • SSH (from the system administrators' subnet (10.2.5.0) to all DMZ servers)

Only the following services will be permitted as INBOUND traffic (from the DMZ to the intranet) traffic:

  • Oracle (from the Secure Web Server)

The firewall is not to be accessible remotely on any interface - i.e. it should not accept connections on any of its IP addresses EXCEPT on its VPN port on the external interface.

Submission Requirements:

You are required to develop two sets of rules for the firewall.  One will process traffic travelling between the Internet to the DMZ and Intranet. The other will process traffic travelling between the Intranet and the DMZ.  You need to also explain what each rule does.The Following summarises the protocols and port numbers you may need to use:

Summary of the relevant Port Numbers:

Port Number

Protocol

1521

Oracle (SQLNet)

22

SSH

25

SMTP

443

HTTPS

80

HTTP

110

POP3

445

SMB

4500

VPN Tunnel


Related Discussions:- Summarises the firewall protocols

Compare and contrast the trust models-pgp, a. PKI and PGP are two methods f...

a. PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI

Cyber security, How to pretect my computer from attacking

How to pretect my computer from attacking

Define protocol, For simplicity, each character is regarded as one data pac...

For simplicity, each character is regarded as one data packet, which means that the data in each packet should have the max length of only 1 byte. Your own packet header (not th

Udp datagram format, UDP DATAGRAM FORMAT: It is given in the figure be...

UDP DATAGRAM FORMAT: It is given in the figure below:

Backup, types of firewall and backup

types of firewall and backup

Does ssl protect against eavesdropping, QUESTION (a) Consider the follo...

QUESTION (a) Consider the following authentication options A. Using password B. Using pin and fingerprint Which option A or B provides stronger security and why? (b

Explain the schemes for distribution of public keys, (a) What is a pseudora...

(a) What is a pseudorandom generator? Give an example describing how it works. (b) Explain the key components of a wireless network and their purpose. (c) Describe the authen

Describe what the term session hijacking means, An overall rise in mobility...

An overall rise in mobility, coupled with the falling cost of Wi-Fi equipment, has led to a proliferation of Wi-Fi hot spots in public areas to provide Internet accessibility. Thus

Project, Network diagram for a mediacal care

Network diagram for a mediacal care

Secure routing protocols for wireless sensor networks, Q. Secure routing Pr...

Q. Secure routing Protocols for Wireless Sensor Networks? A secure routing information protocol enables effective implementation of authentication and integrity checking defens

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd