Specifying a default policy for your firewall

Assignment Help Management Information Sys
Reference no: EM133438000

You have to configure a firewall to block incoming traffic into your network (192.168.10.0/24). It must have the following properties:

  1. Access to the web server www.my.org (192.168.10.112) is allowed for HTTP and HTTPS only.
  2. SSH access is allowed for all internal hosts from the external network 172.16.1.0/24 only and SSH access to host secure.my.org (192.168.10.200) must be blocked.
  3. All other incoming traffic is denied.

Your rules must be written in the below table format and no more than 4 rules must be specified to fulfil the above requirements.

There is no possibility of specifying a default policy for your firewall (bad product). Direction is In or Out. An IP address or network can be defined for Source IP/Net and Destination IP/Net. Single ports or comma-separated lists of ports can be specified for source and destination ports. Protocol is UDP or TCP. Your firewall has two actions (Accept and Reject). Wildcards are specified with an asterisk (*) and can be used in any fields except Rule#, Direction and Action.

Reference no: EM133438000

Questions Cloud

Compose an organizational security policy : Compose an organizational security policy that protects the confidentiality, integrity, and availability of the organization's data. PLEASE INCLUDE REFERENCES
Examine the ethical considerations and dilemmas : Examine the ethical considerations and dilemmas of a diverse and interconnected world - applying a systematic analysis technique. In this assignment
Discuss some of the issues organizations face when entering : Discuss some of the issues organizations face when entering or contracting for OD process. Briefly describe the Meyer and Zack knowledge management cycle.
What steps were taken to notify authorities : What steps were taken to notify authorities, and the public, and restore the system? What steps should have been taken to prevent the incident
Specifying a default policy for your firewall : You have to configure a firewall to block incoming traffic into your network (192.168.10.0/24). It must have the following properties
What you consider to be key stress management strategies : Define work stress, explain its impact on the individual and outline and justify what you consider to be key stress management strategies that leaders may
Perform a vulnerability assessment of your place : Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager
Analyze the impact of your leadership using self-reflection : Analyze the impact of your leadership using self-reflection (you may use any self-reflection tools). i need explanation in table form
How have sun tzu strategies in the art of war been adopted : How have Sun Tzu's strategies in The Art of War been adopted by American business? Identify which particular strategies would benefit business practices.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Which ones may not need your immediate attention

Pretend that your own computer is the laptop that has been secured. Make the first entry in your log book and describe how you would start his incident off correctly by properly protecting and securing the evidence.

  How do logging and separation of duties help comply

Discuss SOX in 500 words or more. How do logging and separation of duties help comply with SOX?

  How organizations establish five cobit it governance focus

Suppose senior management has tasked you with the planning of the COBIT compliance project. In terms of the COBIT framework, predict which key areas are likely to be problematic to implement. Suggest at least two (2) possible solutions to these pr..

  Define steps in the development of an effective erm diagram

Imagine that you work for a consulting firm that offers information technology and database services. Part of its core services is to optimize.

  Estimated project costs and benefits

HS2061 Information Systems Project Management Assignment. A project plan showing timescales and milestones. Estimated Project Costs and Benefits

  Explain what would you say in the policy

The policy should encourage the use of IM and chat while also providing useful guidance to avoid potential problems. What would you say in the policy?

  What is the function of vehicle order management

What role do global networks play in the effective implementation of JIT?What is the function of Vehicle Order Management (VOM)?

  Identify the potential risks found in the organization

Identify the potential risks found in the organization and for it's ability to function in it's chosen business vertical .

  Define mental models

Then describe how the shared mental models the associates adopted while working with Tony helped them maintain team efficacy when their supervisor quit.

  Conduct in-depth research on air carrier

provide a historical example that would be found going back several decades. Learning from the past is a great way to succeed in the future

  How will the composition of the dream team be changed

How will the composition of the dream team be changed if the following constraints are changed as follows: the average number of rebounds among the 12 selected players needs to be at least 8 rebounds per game

  Information technology and information systems

What is the difference between information technology and information systems? Describe some of the functions of information systems

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd