Question

You are given the following informal firewall policy details to be implemented using the firewall topology illustrated in s

Example Firewall Internet Configuration Boandary ruter The external firewall provides a measure of access control and protect

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Solution:-

Internal firewall:

S.no Our Host Port Their host port comment action
1 - - DMZ mail gateway SMTP allow
2 - - DMZ mail gatewaty POP3/POP3S

Authentication

allow
3 - - DMZ web proxy HTTP/HTTPS

content filtering

allow
4 - - - -

block

deny

External firewall:

S.no Our Host Port Their host port comment action
1

DMZ mail gateway

- - SMTP allow
2

-

- DMZ mail gateway SMTP allow
3

-

- DMZ mail gateway POP3s Authentication allow
4

-

- block deny

In case any problem please comment, I am happy to assist you.

Thank you, Have a great day:-)

Add a comment
Know the answer?
Add Answer to:
You are given the following "informal firewall policy" details to be implemented using the firewall topology...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Figure 1 LAN Subnet: 192.168.40.0124 LAN Switch Internet External Firewall Internal Firewall DMZ Subnet: 192.168.10.0/24 LAN devices Web Server running on port 80 IDS (Snort VM) Remote Access S...

    Figure 1 LAN Subnet: 192.168.40.0124 LAN Switch Internet External Firewall Internal Firewall DMZ Subnet: 192.168.10.0/24 LAN devices Web Server running on port 80 IDS (Snort VM) Remote Access Server (Nginx VM) (OpenVPN) Overview Medium to large organisations typically consist of services that are accessed/consumed from external parties for various purposes. As such, a DMZ is a suitable solution to segregate such services from internal networkis). The network diagram provided (Figure 1) illustrates the IT environment of a medium organisation, which...

  • The new Chief Technology Officer (CTO) is seeking recommendations for network monitoring services for the local...

    The new Chief Technology Officer (CTO) is seeking recommendations for network monitoring services for the local intranet. The CTO would like the capability to monitor all traffic to and from the gateway, as well as the capability to block certain content. Which of the following recommendations would meet the needs of the organization? A. Recommend setup of IP filtering on both the internal and external interfaces of the gateway router. B. Recommend installation of a firewall on the internal interface...

  • 1. Let’s consider the network shown in Figure 1 where Snort is deployed. 1.1: In Figure...

    1. Let’s consider the network shown in Figure 1 where Snort is deployed. 1.1: In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? (9 points) 1.2: In Figure 1, say True or False to the following statement: “Snort can see both incoming packets from the left firewall and outgoing packets from the right firewall”. (5 points) 1.3: In Figure 1, assume a packet P matches the following Snort rule when the packet is analyzed...

  • answer the following questions: 1)ACK scans and NULL scans work only on UNIX and LINUX systems.(SELECT...

    answer the following questions: 1)ACK scans and NULL scans work only on UNIX and LINUX systems.(SELECT ONE): a)true b)false 2)Cross-site scripting attacks attempt to bypass the browsers security checks to gain elevated access privileges to sensitive data belonging to another site(SELECT ONE): a)true b)false. 3)Denial of service attacks target the confidentiality and integrity of a system or network.(SELECT ONE): a)true b)false 4)the wireless access point provides a connection to the network or service(SELECT ONE): a)true b)false 5)blocking ICMP packets may...

  • 1- It is advisable to have more than of form of defence, justify the advantages and...

    1- It is advisable to have more than of form of defence, justify the advantages and disadvantages of that approach? 2- In what case you would recommend a screening router firewall architecture over screened host architecture? 3- You need to implement defence in depth for your entire organization. Your management is interested in deploying intrusion prevention systems. Your goal is to protect. 1) All the traffic flowing through a network 2) Endpoints from intrusions. Analyse the technologies you will be...

  • You have decided to build a web application that allows user authentication(enrolling and verifying users) using...

    You have decided to build a web application that allows user authentication(enrolling and verifying users) using either fingerprint, iris, face recognition or voice. Using the image attached as a guideline, your task is to come up with an architecture plan diagram and a brief explanation of the diagram for this web application, depicting the technologies or technology stack that will be used. Application Delivery Infrastructure Web Server, Portal, Application Server, & User Interface Technology Middleware Infrastructure Enterprise Service Bus, Message...

  • A security analyst performs various types of vulnerability scans. Review the vulnerability scan results to determine...

    A security analyst performs various types of vulnerability scans. Review the vulnerability scan results to determine the type of scan that was executed and if a false positive occurred for each device. Instructions: Select the Results Generated drop-down option to determine if the results were generated from a credentialed scan, non-credentialed scan, or a compliance scan. For ONLY the credentialed and non-credentialed scans, evaluate the results for false positives and check the findings that display false positives. NOTE: If you...

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • ***I only need the High Level Project Plan (Time to Implement)****** You have recently been hired...

    ***I only need the High Level Project Plan (Time to Implement)****** You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the director ofInformation Systems and Telecommunications. Your assignment is to assist security posture of the firm anddevelop a security structure for this new company. Write your recommendations and reasons to the firm’s CEO. The firm has 600 employees in Tokyo, 50 in Houston, and is planning to open two branch offices in India andCalifornia....

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT