Cisco firewall rule case study

Assignment Help Computer Network Security
Reference no: EM131990918

Cisco Firewall Rule Case Study

1. Case Learning Objectives

- Explain why it is important to configure firewall effectively
- Create Cisco firewall rules to satisfy organization policies.
- Update firewall rules when network architecture is changed.
- Distinguish the different roles of external firewall and internal firewall.

2. Case Description

You are the network administrator and it is your duty to configure the firewall rules to protect the company's network

3. Discussion Questions and Their Mappings to Bloom's Taxonomy

Table : Mapping of Cisco Firewall Rule case discussion questions to Bloom's Taxonomy.

         Cisco Firewall Rule Case Description Questions

Cognitive Levels

1.      Write the Cisco-like firewall rules to satisfy the following policy:

1)      Allow access to the homepage of your company.

2)      Allow the DNS to be accessed.

3)      Allow anyone to send email to the employee's company account.

4)      Allow employees to access their company email account via POP.

5)      Allow the FTP server to be accessed.

6)      Disallow anyone to access your SNMP data.

7)      Disallow employees to access wasteoftime website

8)      Allow anyone to send an AOL instant message to an employee in the company.

9)      Allow anyone to send an MSN instant message to an employee in the company.

10)  Prohibit Kazaa on all computers.

11)  Allow the CEO of the company to access the private Microsoft file share of the network administrator.

12)  Disallow others in the company to access the private Microsoft file share of the network administrator.

13)  Allow someone at 222.111.000.44 to do a Microsoft remote desktop connection to Jane's computer.

Level 3: Application

2. Suppose your company decides to create a backup DNS using the FTP server. Update your firewall rules.

Level 3: Application

3. What changes would be necessary if the main router did not function as a firewall but the two other routers performed the firewall responsibilities?

Level 4: Analysis

4. How would the firewall capabilities change if the firewall was a separate box that came between the routers and the Internet?

Level 4: Analysis

5. Suppose the network architecture is changed to be as Figure 2. Reconfigure the firewall rules for both firewalls. 

Level 3: Application

Level 4: Analysis

6. Explain why it is important to configure firewall effectively

Level 2: Comprehension

Attachment:- case study.rar

Verified Expert

This is a complete report consisting the different firewall scenario. Discussing about all the firewalls. how the rules of firewall are used.

Reference no: EM131990918

Questions Cloud

How do you recommend the company respond : How do you recommend the company respond? What national laws are being violated and what are the minimal actions required by law?
Discuss drafts of your business model and strategic plan : Discuss drafts of your Business Model and Strategic Plan, Part I Individual assignment from Week 2 with all team members.
Discuss the relevance of your key topic to gods law : Discuss the relevance of your key topic to God's law and how it can be applied in a Christian context. This section must be at least 100 words.
Research the different managed care insurance plans : Research the different managed care insurance plans listed below by reviewing various healthcare organizations or resources (e.g., Kaiser as an HMO).
Cisco firewall rule case study : Discussion Questions and Mappings to Blooms Taxonomy - What changes would be necessary if the main router did not function as a firewall
How can an organization maximize the extent : How can an organization maximize the extent to which its managers take an outside view in their decisions?
Whats required to make sure your clients agreement : What's required to make sure your client's independent contractor agreement is viewed as a legally enforceable independent contractor agreement.
What is the overall message of the brand explain in depth : Describe the three ads or commercials and include the link if applicable. What is the overall message of the brand? Explain in depth.
What is the expected real interest rate : What is the expected real interest rate? The one-year spot interest rate is r1 = 5.6%,and the two-year rate is r2 = 6.6%.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd