DESIGN PACKET FILTERING FIREWALL RULES AND IDENTIF

DESIGN PACKET FILTERING FIREWALL RULES AND IDENTIFY ADVANTAGES DISADVANTAGES

The primary theme of the paper is DESIGN PACKET FILTERING FIREWALL RULES AND IDENTIFY ADVANTAGES DISADVANTAGES in which you are required to emphasize its aspects in detail. The cost of the paper starts from $109 and it has been purchased and rated 4.9 points on the scale of 5 points by the students. To gain deeper insights into the paper and achieve fresh information, kindly contact our support.

An educational institute has a single router, referred to as the gateway router, connecting its internal network to the Internet. The institute has the public address range 138.77.0.0/16 and the gateway router has address 138.77.178.1 on its external interface (referred to as interface ifext). The internal network consists of four subnets:

 

      A DMZ, which is attached to interface ifdmz of the gateway router and uses address range 138.77.179.0/24.

      A small network, referred to as shared, with interface ifint of the gateway router connected to three other routers, referred to as staff_router, student_router, and research_router. This network has no hosts attached (only four routers) and uses network address 10.3.0.0/16.

    A staff subnet, which is for use by staff members only, that is attached to the

staff_router router and uses network address 10.3.1.0/24.

    A  student subnet,  which  is  for  use  by  students  only,  that  is  attached  to  the

student_router router and uses network address 10.3.2.0/24.

    A  research subnet,  which  is  for  use  by  research  staff,  that  is  attached  to  the

research_router router and uses network address 10.3.3.0/24.

 

In summary, there are four routers in the network: the gateway router, and routers for each of the staff, student and research subnets. There are five subnets: DMZ, shared, staff, student, and research.

 

There are two servers in the DMZ that all can accept requests from the Internet: a web server supporting HTTP and HTTPS, and a SMTP email server. Members of the staff, student and research subnets can access the web server; members of the staff subnet only can access the email server but using IMAP.

 

The gateway router also runs a stateful packet filtering firewall and performs port address translation. In addition to the DMZ setup as described above, security requirements for the educational institute are:

 

      External Internet users cannot access any internal computers (except in DMZ and as stated in other requirements).

    Staff, students and researchers can access websites in the Internet.

      The researchers (on the research subnet) run a server for sharing data with selected research partners external to the educational institute. That server provides SSH access and a specialised file transfer protocol using TCP and port 1234 to the partners. The server has internal address 10.3.3.31 and NAT is setup on the gateway router to map the public address 138.77.179.44 to the internal address. Currently there are two partner organisations   that   can   access   the  server,   and   they  have  network   addresses:

31.13.75.0/24 and 23.63.9.0/24.

      The professor that leads the research staff also wants access to the data sharing server while they are at home. At home that professor uses a commercial ISP that dynamically allocates IP addresses in the range 104.55.0.0/16.

 

Considering the above information, answer the following questions:

 

(a) Draw a diagram illustrating the network. Although there may be many computers in the staff, student and research subnets, for simplicity you only have to draw three computers in the staff subnet, three computers in the student subnet and three computers in the research subnet (one of those in the research subnet should be the data sharing server). Label all computers and router interfaces with IP addresses. [3 marks]

 

(b) Specify the firewall rules using the format as in the table below. You may add/remove rows as needed. After the table, add an explanation of the rules (why you design the firewall rules the way you did). [5 marks]

 

Rule

No.

Transport

Source

IP

Source

Port

Dest.

IP

Dest.

Port

Action

1

 

 

 

 

 

 

2

 

 

 

 

 

 

3

 

 

 

 

 

 

4

 

 

 

 

 

 

 

 

 

 

 

 

 

(c) Consider the rule(s) that  allows  the professor  to  access  from  home. Discuss  the limitations, and suggest possible solutions. [1 mark]

 

Marking Scheme

 

(a) 3 marks if correct network is drawn and labelled. 2 marks if some mistakes in location of nodes or links, or allocation of addresses. 0 or 1 mark if multiple mistakes.

(b) If all necessary rules are included, and no unnecessary rules are included, you will receive 5 marks. 0.5 mark will be deducted for an incorrect rule or incorrect explanation of the rule. 0.5 mark will be deducted for a missing rule. 0.5 mark will be deducted for a rule that is included but not needed. The explanation will only be considered if the rules appear wrong or inappropriate.

(c) 1 mark if a relevant limitation is described, and a potential solution is relevant. 0.5 mark of limitation or solution is wrong or irrelevant.

 

100% Plagiarism Free & Custom Written, Tailored to your instructions