Reference no: EM132276366
Questions: 1. Consider the security policy shown below. Describe how the firewall processes each of the following packets traversing the firewall (clearly justify the action taken by the firewall). Assume also that there are two additional default rules at the end (Rule 5: intrazone default and Rule 6: interzone default) of the security policy.
a) A packet from IP 192.168.1.20 (in Trusted-L3) to IP 98.0.25.78 (in Untrusted-L3), HTTP application.
b) A packet from IP 192.168.1.3 (in Trusted-L3) to IP 98.0.25.78 (in Untrusted-L3), FTP application.
c) A packet from IP 192.168.1.3 (in Trusted-L3) to IP 98.0.25.78 (in Untrusted-L3), HTTP application.
d) A packet from IP 76.24.1.2 (in Untrusted-L3) to IP 192.168.1.88 (in Trusted-L3), HTTP.
2. Consider again the security policy of problem 1. Assume that the security officer must modify the policy, according to the following requirements.
a) Allow selective traffic from 192.168.1.3 (in Trusted-L3) to any IP address in Untrusted- L3. Only DNS, FTP, web-browsing must be allow from IP address 192.168.1.3 to Untrusted-L3.
b) Other devices in Trusted-L3 must be able to access any device in Untrusted-L3, any application.
c) Traffic generated in Untrusted-L3 must not be allowed to any zone.
3. Most firewalls are stateful devices. Explain what a stateful operation means for firewalls.
4. Firewalls and Next-generation Firewalls (NGFW) differ on the mechanisms / criteria used to filter packets. Describe how they differ, including filtering mechanisms.
Information related to above question is enclosed below:
Attachment:- homeworkModule7.rar