Summarises the firewall protocols, Computer Network Security

Assignment Help:

Your rules should ensure that Internet access will be restricted to the following:

Only the following services will be permitted as OUTBOUND traffic (to the Internet from the DMZ or intranet):

  • HTTPS and HTTP (from the intranet). Note: it is assumed that external Web access provides the ability to connect to the local Secure Web Server - no additional firewall rules are required.
  • SMTP (from the Mail Server)

Only the following services will be permitted as INBOUND traffic (to the DMZfrom the Internet):

  • HTTPS (to the Secure Web Server)
  • SMTP (to the Mail Server)

Access between the Intranet and the DMZ will be restricted to the following.
Only the following services will be permitted as OUTBOUND traffic (to the DMZ from the intranet):

  • POP3 (from the intranet to the Mail Server)
  • SSH (from the system administrators' subnet (10.2.5.0) to all DMZ servers)

Only the following services will be permitted as INBOUND traffic (from the DMZ to the intranet) traffic:

  • Oracle (from the Secure Web Server)

The firewall is not to be accessible remotely on any interface - i.e. it should not accept connections on any of its IP addresses EXCEPT on its VPN port on the external interface.

Submission Requirements:

You are required to develop two sets of rules for the firewall.  One will process traffic travelling between the Internet to the DMZ and Intranet. The other will process traffic travelling between the Intranet and the DMZ.  You need to also explain what each rule does.The Following summarises the protocols and port numbers you may need to use:

Summary of the relevant Port Numbers:

Port Number

Protocol

1521

Oracle (SQLNet)

22

SSH

25

SMTP

443

HTTPS

80

HTTP

110

POP3

445

SMB

4500

VPN Tunnel


Related Discussions:- Summarises the firewall protocols

Corresponding access control matrix, Consider a computer system with three ...

Consider a computer system with three users: Alice, Bob and Cindy. Alice owns the file alicerc, and Bob and Cindy can read it. Cindy can read and write the file bobrc, which Bob ow

Ring topology, RING topology all computers are connected in loop. A ring ...

RING topology all computers are connected in loop. A ring topology is a network topology in which every node connects to exactly two other devices, forming a single continuous pa

Define byte stuffing, Sometimes the special character may see in data and a...

Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.   In general to

Point to point transmission(ppp), Normal 0 false false fals...

Normal 0 false false false EN-US X-NONE X-NONE

History, how did slavery influence life in the colonies

how did slavery influence life in the colonies

Biology, Ask question #Minimum 100 words are there non parasitic v...

Ask question #Minimum 100 words are there non parasitic viruses

What is b-router, B-Router Hybrid devices that has the features of bot...

B-Router Hybrid devices that has the features of both routers and bridges . A bridge router or brouter is a network machine that acts as a router and as a bridge. The brout

Vulnerability identification-risk management, Vulnerability Identification ...

Vulnerability Identification Specific avenues threat agents can exploit to attack an information asset are known as vulnerabilities. Examine how each threat can be generated and

Describe how lower bounds on arc flows, QUESTION: (a) Suppose the graph ...

QUESTION: (a) Suppose the graph below, use the Flow Decomposition method to list the cycles and paths produced. (b) Describe how Lower Bounds on Arc Flows are eliminated

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd