Explain what a stateful operation means for firewalls

Assignment Help Computer Networking
Reference no: EM132276366

Questions: 1. Consider the security policy shown below. Describe how the firewall processes each of the following packets traversing the firewall (clearly justify the action taken by the firewall). Assume also that there are two additional default rules at the end (Rule 5: intrazone default and Rule 6: interzone default) of the security policy.

a) A packet from IP 192.168.1.20 (in Trusted-L3) to IP 98.0.25.78 (in Untrusted-L3), HTTP application.

b) A packet from IP 192.168.1.3 (in Trusted-L3) to IP 98.0.25.78 (in Untrusted-L3), FTP application.

c) A packet from IP 192.168.1.3 (in Trusted-L3) to IP 98.0.25.78 (in Untrusted-L3), HTTP application.

d) A packet from IP 76.24.1.2 (in Untrusted-L3) to IP 192.168.1.88 (in Trusted-L3), HTTP.

2. Consider again the security policy of problem 1. Assume that the security officer must modify the policy, according to the following requirements.

a) Allow selective traffic from 192.168.1.3 (in Trusted-L3) to any IP address in Untrusted- L3. Only DNS, FTP, web-browsing must be allow from IP address 192.168.1.3 to Untrusted-L3.

b) Other devices in Trusted-L3 must be able to access any device in Untrusted-L3, any application.

c) Traffic generated in Untrusted-L3 must not be allowed to any zone.

3. Most firewalls are stateful devices. Explain what a stateful operation means for firewalls.

4. Firewalls and Next-generation Firewalls (NGFW) differ on the mechanisms / criteria used to filter packets. Describe how they differ, including filtering mechanisms.

Information related to above question is enclosed below:

Attachment:- homeworkModule7.rar

Reference no: EM132276366

Questions Cloud

Summarize the article - us economy : Summarize the article. support your observations with evidence from research and the readings - You can also use any financial websites along with any sources
Describe a hypothetical situation to promote service : Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive.
Research about group policy controls in microsoft windows : State the implications of your conclusions. State what might be the possible consequences of your conclusions.
Explain the technology evolution in systems development : What are FIVE (5) key trends for current IS development projects, considering the current technology evolution and best practices in systems development?
Explain what a stateful operation means for firewalls : ITEC 493 Most firewalls are stateful devices. Explain what a stateful operation means for firewalls. Firewalls and Next-generation Firewalls (NGFW) differ.
Modern methods of construction : SRR721 - Construction Research Project - Deakin University - Identify an issue of current relevance to the discipline of construction management
Develop in accordance with the system development life cycle : Outline the planning, analysis, design, and implementation phases. Develop in accordance with the systems development life cycle.
Summarize the advantages of modular data centers : Do some Internet research on modular (pod) data centers. Summarize the advantages of disadvantages of modular data centers.
Develop a genogram covering three generations : Due to HIPPA, you are to develop a genogram covering three generations based on information from Case study to reveal illustration of a family medical diagnosis

Reviews

Write a Review

Computer Networking Questions & Answers

  Evaluate two network monitoring technologies

Evaluate 2 network monitoring technologies. These should be able to provide you with a graphical look at your network nodes and layout.

  Consider a situation where two microcontroller

Consider a situation where two microcontrollers are connected with a CAN network. Computer 1 generates 8-bit data packets that must be sent to Computer 2, and Computer 2 generates 8-bit data packets that must be sent to Computer 1

  Determine the authoritative dns servers for a university

Run nslookup to obtain the IP address of a Web server in Asia. What is the IP address of that server - determine the authoritative DNS servers for a university

  Who is the manufacturer of this networking device

What should you check if you are installing a Power over Ethernet connection using computer equipment from two different manufactures?

  List four typical active attacks against wlan

List four typical active attacks against Wireless Local Area Network. What are some of the security concerns in the Internet Control Management Protocol (ICMP)?

  Develop a six-pages business plan for your new business

Using these methods of communication, as a group, develop a 4-6-pages business plan for your new business. The product or service of the business.

  What are the four fundamental properties of an analog signal

What characteristic of optical transmissions is primarily responsible for the distance limitations of fiber-optic cabling?

  How long it take to send the file from source to destination

Suppose the network is a packet-switched datagram network, and a connectionless service is used. Now suppose each packet has 2h bits of header. How long does it take to send the packet?

  Write your own testing program

COSC 2006 -Data Structures -  You are to write a class AssassinManager that allows a client to manage a game of assassin. Each person playing assassin has a particular target that he/she is trying to assassinate.

  How many times message m is modified before destination

When a message travels from source to destination through two routers, how many times the message M is modified before it reaches to the destination as M. Show your work to determine this number.

  Build the network according to the user requirements

ICT50415 IT Networking Assignment - Networking Project Area - Build the network according to the user requirements

  Performance of different network-layer routing algorithms

Performance of different network-layer routing algorithms - develop a program that will evaluate the performance of three different routing protocols

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd