Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Your assignment must be in Microsoft Word format

Note: Your assignment must be in Microsoft Word format, and must be submitted electronically by the due date via the Moodle website

Question 1: Firewall Rule Design

The following diagram shows the topology of the network of a small company. There are three servers located in a DMZ (Demilitarised Zone).

The web server can directly accept requests (HTTP or HTTPS) from the Internet or from the internal network.

The DNS server can directly accept requests from the Internet. The DNS server can also directly accept requests from the internal network. However, if the DNS server can not resolve a domain name requested by the internal network, it will contact the DNS servers on the Internet directly for the name resolution.

On behalf of the users on the internal network, the email server sends emails to and receives emails from the Internet. The users on the internal network use IMAP (Internet E-mail Access Protocol) to read and organize their emails on the email server.

The users on the internal network are allowed to access the Internet only for HTTP, HTTPS and FTP services. However, the users of the internal network are never allowed to connect the Internet directly.

Based on the above network configuration and application scenarios, answer the following three questions.

The firewall services are installed on the router. Create the firewall rules to implement the packet filtering and only allow the specified traffic. The firewall rules are to be created in the following format.

Briefly explain each rule in the rule base that you have created.

The proxy services are also installed on the router to conceal the users of the internal network (192.168.1.0/25) from the Internet. Suppose that users on the internal computers send the following requests to the Internet. The proxy services perform the Port Address Translation (PAT). Complete the following connection table to show how PAT is working for requests from the users on the internal network.

Packet Addressing on internal network

Packet Addressing on external network

Source IP

SourcePort

Destination IP

DestinationPort

Source IP

SourcePort

Destination IP

DestinationPort

192.168.1.2

1033

203.206.209.77

80

 

 

 

 

192.168.1.2

1035

210.10.102.196

443

 

 

 

 

192.168.1.5

2301

203.206.209.55

21

 

 

 

 

192.168.1.5

2302

202.2.59.40

443

 

 

 

 

192.168.1.5

4123

72.5.124.55

80

 

 

 

 

192.168.1.8

4128

72.5.124.35

21

 

 

 

 

192.168.1.8

1033

150.101.16.250

80

 

 

 

 

192.168.1.9

1035

150.101.16.250

443

 

 

 

 

Question 2: PCAP Analysis

For this question, you are to use the extracts from a PCAP file given below.

Your task is to annotate each packet commenting on the following characteristics.

Comment on any significant TCP flags and what they mean in the context of the packet capture. Significant flags include SYN, FIN, RST, and URG. You must explain why the flag has been set and what it means for this TCP connection.

Comment on the direction of each packet (ie. client -> server or server -> client). Be clear to explain in which direction the interaction is occurring

No.

Time

Source

Destination

Protocol

Info

1

2006-10-03 14:50:19.628169

138.77.36.105

138.77.36.46

TCP

41640 > smtp [SYN] Seq=0 Ack=0 Win=5840 Len=0 MSS=1460 TSV=34790 TSER=0 WS=2

Explanation:

2

2006-10-03 14:50:19.632551

138.77.36.46

138.77.36.105

TCP

smtp > 41640 [SYN, ACK] Seq=0 Ack=1 Win=5792 Len=0 MSS=1460 TSV=285859166 TSER=34790 WS=5

Explanation:

3

2006-10-03 14:50:19.633273

138.77.36.105

138.77.36.46

TCP

41640 > smtp [ACK] Seq=1 Ack=1 Win=5840 Len=0 TSV=34792 TSER=285859166

Explanation:

4

2006-10-03 14:50:19.641368

138.77.36.46

138.77.36.105

SMTP

Response: 220 basil.cqu.edu.au ESMTP Sendmail 8.13.7/8.13.7; Tue, 3 Oct 2006 14:50:19 +1000

Identify the IP address of both the client and the server?

What port numbers have been used by each and what is their type?

Question 3: Attack and Defence Research

DNS and ARP poisoning attacks are similar; however there are fundamental differences between the two. You are to research these specific differences contrasting the way the attacks are conducted and some of the countermeasures available. Ensure you use at least three in-text academic references to contrast these attacks

Remember that you are not to repeat in your research what DNS and ARP poisoning attacks are. We already know that from our discussions in class. In writing about the differences between the two types of attacks, contrast for example the complexity of the attacks (which one is easy to conduct and why), the impact (consequences) of the attacks, which one is more common and the different mechanisms available to counter the attacks. Write no more than 300 words (about a page including in-text references)

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92072378
  • Price:- $45

Priced at Now at $45, Verified Solution

Have any Question? 


Related Questions in Computer Network & Security

Assignment descriptionproject scope a typical

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment -need project made by packet truce follow the

Assignment - Need project made by packet Truce. Follow the given report and please don't make the project big and video will describe full project in details and with configuration. Project - Design and Implementation of ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

You need to prepare packet tracer fileattached pdf contains

You need to prepare packet tracer file attached pdf contains topology and required configurations and assigned ip address. In packet tacer file you need to include banner, router and switches. 1. VLSM Design a) As first ...

A run in a setting is a substring of length at least two as

A run in a setting is a substring of length at least two, as long as possible, and consisting entirely of the same symbol. For instance, the string abbbaab contains a run of b's of length three and a run of a's of length ...

A develop a caesar cipher-type encryption algorithm with a

a. Develop a Caesar cipher-type encryption algorithm with a little more complexity in it. For example, the algorithm could alternatively shift the cleartext letters positive and negative by the amount of the key value. V ...

What is the difference between a positive economic

What is the difference between a positive economic statement and a normative one.

1 a firms marginal rate of technical substitution at m p lm

1) A firm's marginal rate of technical substitution at M P L/M P = 3, and the ratio of prices of labor and capital ,w/r, is 4. a) Is the firm minimizing its cost? Why or Why not? b) What can it do to improve its situatio ...

Suppose alice wants to communicate with bob using symmetric

Suppose Alice wants to communicate with Bob using symmetric key cryptography with a session key KS. They have no public key cryptography and they intend to use a key distribution center (KDC). The KDC is a server that sh ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As