Discuss the required changes in the network infrastructure

Assignment Help Basic Computer Science
Reference no: EM131310070

Suppose the Drib wished to allow employes to telecommute. In order to protect the network, they require all remote connections (other than those for the Web and mail servers) to use SSH.

a. Discuss the required changes in the network infrastructure. In particular, should the outer firewall provide an SSH proxy or a packet filter to incoming SSH connections? Why?

b. The destination of an SSH connection from the Internet might be the address of any host on the internal network. Such addresses, however, are not broadcast to the Internet and in fact may be addresses that routers on the Internet should not pass (such as 10.x.x.x). Devise a method or protocol that will continue to conceal the addresses of the hosts on the internal network but still allow SSH connections from the Internet to arrive at the proper destinations. What supporting infrastructure must the Drib add to its network?

c. The inner firewall will pass SSH connections, provided that one endpoint is the trusted administration server on the internal network. With the above-mentioned change, the destination of the incoming SSH connection may be any host on the internal network. For this question, assume that the addresses of the hosts on the internal network are kept within the internal network-in other words, that the method or protocol in part (b) is implemented. What are the security implications of allowing SSH connections to any internal host through the inner firewall? Should such connections be restricted (for example, by requiring users to register the hosts from which they will be connecting)?

d. An alternative to allowing the SSH connections through the firewall is to provide a specific host (the "SSH host") on the internal network that is also connected to the Internet. Telecommuters could use SSH to log into this system, and from it reach systems on the internal network. (The difference between this method and allowing connections through the firewall is that the user must log into the intermediate host, and from there move to the internal system. The firewall approach makes the intermediate system transparent.) Identify the minimum number of services that this system should run in order to fulfill its function. Why must these services be run? As part of your answer, identify any other systems (such as DNS servers, mail servers, and so on) that this SSH host would have to trust.

e. From the point of view of Saltzer and Schroeder's design principles [865] (see Chapter 13), is the solution suggested in part (d) better than, worse than, or the same as the solutions involving access through the firewall? Justify your answer.

Reference no: EM131310070

Questions Cloud

Best interests of our stockholders : As a board member and officer, Mr. Zuckerberg owes a fiduciary duty to our stockholders and must act in good faith in a manner he reasonably believes to be in the best interests of our stockholders. As a stockholder, even a controlling stockholder..
What will you do to keep an open mind : If you take your role seriously, what will you do to keep an open mind and try to consider different points of view? Explain. Provide a one-page document on above topic. (2 paragraphs)
Why is the file kept inaccessible to the web server : Consider the scheme used to allow customers to submit their credit card and order information. Section 26.3.3.2 states that the enciphered version of the data is stored in a spooling area that the Web server cannot access.
Research paper - the holy spirit in the book of acts : For this course, you are required to write a 5-8-page research paper addressing 1of the topics from the list below. Choose 1of the following topics for your research paper: Acts 1:8, The Holy Spirit in the Book of Acts and The "calling" of Saul of Ta..
Discuss the required changes in the network infrastructure : Discuss the required changes in the network infrastructure. In particular, should the outer firewall provide an SSH proxy or a packet filter to incoming SSH connections? Why?
Explain importance of critical path in project management : Explain the importance of the critical path in project management. Examine the advantages of using a Gantt chart over a PERT chart and vice versa. Determine when it is appropriate to use one over the other.
Display sentinel value so that user may ultimately be able : Loop through all of the above steps until the user types the sentinel value when prompted. Display the sentinel value so that the user may ultimately be able to demonstrate an understanding of the way in which to end the program.
What would be the firms expected dividend per share : Coca-Cola stock has an expected ROE of 14% per year, expected earnings per share of $4, and expected dividends of $2.50 per share. Its market capitalization rate is 15% per year. a) what are its expected growth rate, its price and its P/E ratio? b) I..
What is the list price of the bond on the settlement date : Calculate the price of the bond for a market interest rate of 3% per half year. Compare the capital gains for the interest rate decline to the losses incurred when the rate increases to 5%. A bond with a settlement date of April 30, 2013 and a maturi..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find a tight lower bound for sorting an array

Prove that any comparison-based algorithm for finding the largest element of an n-element set of real numbers must make n - 1 comparisons in the worst case.

  Will nearest neighbor method still wouldn''t be a good choice

What is the problem with using Brute Force method? Can Brute Force Method be efficient if you need to go through 10 cities(vertices)? How many different calculations do you have to do if you use Brute Force Method compare to Nearest Neighbor Metho..

  How has configuration for connecting input-output changed

How has the configuration for connecting input/output (I/O) devices to computers on the motherboard changed since the late 1980s?

  Manipulate the dom on a web page.

In your own words, give a practical example of why you might want to traverse or manipulate the DOM on a Web page. What task would you want accomplish?

  Identifying and documenting it acquisition requirements

What are the one or two most challenging issues in identifying and documenting IT acquisition requirements (i.e., the requirements for solving the problem that was defined)? Explain your reason(s) and how the issue(s) can be successfully addressed..

  Explain cause and effect transition happen

One process could cause another process to make a transition. Under what circumstance, if any, would the following. Cause and effect transition happen ?

  Explain what is internet storage.

Write down all the reasons why you would or would not use Internet storage. List at least one advantage and one disadvantage of using Internet storage.

  Highest and lowest temperatures

Write a program that uses a two-dimensional array to store the highest and lowest temperatures for each month of the year. The program should output the average high, average low, and highest and lowest temperatures of the year. Your program must ..

  Consider the following hypothesis test

Consider the following hypothesis test. H0: μ ≤40 H1: μ >40

  Write files which do not reside at root or master directory

Provide the example of names of three files from own computer that do not reside at the root or master directory. For each file, list both therelative filename and its complete filename.

  Callaway''sability to pay its interest expense

What does this tell you about Callaway'sability to pay its interest expense? (Fill in the blank with the times interestearned ratio from above and select the best choice.)

  Recursive method written by you or taken from web

What elements should be considered to be included in any recursive method? Discuss these elements using an example (code required) of a recursive method written by you or taken from Web. Try choosing one different from that of any posted thus far.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd