Write rule sets for two firewalls to permit traffic to flow

Assignment Help Computer Networking
Reference no: EM1386806

You are tasked with writing rule sets for two firewalls which protect network and form a DMZ. All traffic from internal network to Internet passes through DMZ. All servers which are accessible from Internet reside inside DMZ. All computers inside network (internal network and DMZ) have private IP addresses. All traffic to and from Internet passes through NAT device which is situated just inside perimeter firewall. All computers on this network are Windows computers

Servers in the DMZ
Service Public IP Address Private IP Address Comments
HTTP/HTTPS 200.100.100.10 192.168.20.10
FTP 200.100.100.11 192.168.20.11
DNS 200.100.100.12 192.168.20.12 utilizes TCP for zone transfers, services DNS lookup requests from all computers in internal network and DMZ
Email 200.100.100.13 192.168.20.13 SMTP
Proxy 200.100.100.14 192.168.20.14 Not accessible from Internet. Client computers connect to proxy service on port 8080

Clients on internal network: All user workstations access web sites via Proxy server. There are three different internal subnets: 10.10.10.0/24, 10.20.20.0/24 and 10.30.30.0/24. Computers on 10.10.10.0/24 subnet may access FTP servers on Internet. Computers on 10.20.20.0/24 network may access SSH server on Internet with the IP address 220.20.30.110. All computers on internal network may access company's Email, DNS, FTP and web servers which reside in DMZ.

Computers on three internal subnets use dynamic NAT pools as follows when making connections to internet.
Private IP address range NAT Pool
10.10.10.0/24 200.200.200.50 through 200.200.200.100
10.20.20.0/24 200.200.200.101 through 200.200.200.150
10.30.30.0/24 200.200.200.151 through 200.200.200.200

Reply the following:
Write down two rule sets for two firewalls which will permit only traffic described to flow.

Reference no: EM1386806

Questions Cloud

Percentage of persons enrolled in college : In a certain city, there are 100,000 persons age 18 to 24. A simple random sample of 500 such persons is drawn, of whom 198 turn out to be currently enrolled in college.
What is the total work completed on mass : A boy throws a 1.5 kg rock upward. To do so the boy applies a constant 38.5 N force upwards on the rock from point a to point b. after that the rock continues upward to its highest height at point c.
Individualistic american society created numerous problem : individualistic American society which created numerous problems for its managers while operating in Japan. Which of the subsequent can these problems be attributed to?
Find genotypes of the two parents of the litter : Long ears in some dogs are an autosomal dominant trait. Two dogs mate and produce a litter in which 75 percent of the puppies have long ears. Of the dogs with long ears in this litter,
Write rule sets for two firewalls to permit traffic to flow : Computers on three internal subnets use dynamic NAT pools as follows when making connections to internet. Write down two rule sets for two firewalls which will permit only traffic described to flow.
Average amount of purchase per weekend : The probability that average amount of purchase per weekend from Sam's sample is greater than average amount of purchase per weekend from Katie's sample =
Examine and explain how the macro level factors could change : Examine and explain how the macro level factors could change the specific aspects of Porter's 5 forces of competition.
Determine the final temperature of the system : A 790-N cliff diver in Alcapulco drops from a cliff 20.60 m above the water's surface. If friction is disregarded, what is the cliff diver's speed just before striking the water.
Probability of being deceptive : A federal report find that a lie detector test given to truthful persons have a probability of 0.2 of suggesting that the person is deceptive. A company asks 12 job applicants to take a lie detect test. Suppose that all 12 applicants answer truthf..

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd