To provide more protection, the ruleset from the preceding problem is modified as follows: a. Describe the
Question:
To provide more protection, the ruleset from the preceding problem is modified as follows:
a. Describe the change.
b. Apply this new ruleset to the same six packets of the preceding problem. Indicate which packets are permitted or denied and which rule is used in each case.
Transcribed Image Text:
Rule Direction A In B Out Out D In E Either [1] Sre Addr Dest Addr Protocol Sre Port Dest Port External TCP Internal TCP Internal TCP External TCP Any Any Internal External External Internal Any >1023 25 >1023 25 Any 25 >1023 25 >1023 Any Action Permit Permit Permit Permit Deny
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Answer rating: 100% (3 reviews)
a A source port is added to t...View the full answer
Answered By
Aysha Ali
my name is ayesha ali. i have done my matriculation in science topics with a+ . then i got admission in the field of computer science and technology in punjab college, lahore. i have passed my final examination of college with a+ also. after that, i got admission in the biggest university of pakistan which is university of the punjab. i am studying business and information technology in my university. i always stand first in my class. i am very brilliant client. my experts always appreciate my work. my projects are very popular in my university because i always complete my work with extreme devotion. i have a great knowledge about all major science topics. science topics always remain my favorite topics. i am also a home expert. i teach many clients at my home ranging from pre-school level to university level. my clients always show excellent result. i am expert in writing essays, reports, speeches, researches and all type of projects. i also have a vast knowledge about business, marketing, cost accounting and finance. i am also expert in making presentations on powerpoint and microsoft word. if you need any sort of help in any topic, please dont hesitate to consult with me. i will provide you the best work at a very reasonable price. i am quality oriented and i have 5 year experience in the following field.
matriculation in science topics; inter in computer science; bachelors in business and information technology
_embed src=http://www.clocklink.com/clocks/0018-orange.swf?timezone=usa_albany& width=200 height=200 wmode=transparent type=application/x-shockwave-flash_
4.40+
11+ Reviews
14+ Question Solved
Related Book For
Question Posted:
Students also viewed these Computer science questions
-
Based on Westlaw's data on the case Christoff v. Nestl USA, INC., I did the brief case. My question is, is there any need to add and adjust the content and form of the case brief, especially the...
-
Managing Scope Changes Case Study Scope changes on a project can occur regardless of how well the project is planned or executed. Scope changes can be the result of something that was omitted during...
-
SMTP (Simple Mail Transfer Protocol) is the standard protocol for transferring mail between hosts over TCP. A TCP connection is set up between a user agent and a server program.The server listens on...
-
1. What options does Personal Trainer have for developing a new system? What are some specific issues and options that Susan should consider in making a decision? 2. Susan has been asked to prepare a...
-
A geothermal power plant on the Raft river uses isobutane as the working fluid. The fluid enters the reversible adiabatic turbine at 320 F, 805 lbf/in 2 and the condenser exit condition is saturated...
-
Why are adjusting entries needed? LO5
-
What are the criteria for determining whether there is a match between the clusters uncovered in the training and test data sets?
-
Raj Kothare funded an irrevocable simple trust in May of last year. The trust benefits Rajs son for life and grandson upon the sons death. One of the assets he transferred to the trust was Webbco...
-
The table shows a book balance sheet for the Wishing Well Motel chain. The companys long-term debt is secured by its real estate assets, but it also uses short-term bank financing. It pays 10%...
-
A hacker uses port 25 as the client port on his or her end to attempt to open a connection to your Web proxy server. a. The following packets might be generated: Explain why this attack will succeed,...
-
Table 22.3 shows a sample of a packet filter firewall ruleset for an imaginary network of IP address that range from 192.168.1.0 to 192.168.1.254. Describe the effect of each rule. Table 22.3 Sample...
-
Table 9-5, on the textbook's Web site, gives data on five socioeconomic indicators for a sample of 20 countries, divided into four per-capita income categories: low-income (up to $500 per year),...
-
How has face book influenced political candidate's electoral success? What is the relationship between social media technology called face book and electoral success?
-
1. Discuss the international strategies that organizations can pursue 2. Identify and compare the various modes of of foreign market entry 3. Analyse the industry market 4. Evaluate relevant macro...
-
A bulk carrier was underway. The vessel was in ballast and hold washing was scheduled in preparation for taking the next cargo. An officer, bosun, and another deck crew conducted a risk assessment...
-
8. Neutrino radiation was observed over a certain period and the number of hours in which 0, 1, 2,... signals were received was recorded. 0 1 Number of Number of Hours with Signals per Hour This...
-
What are some advantages and disadvantages of centralization and decentralization. References: Altamimi, H., Liu, Q., & Jimenez, B. (2023). Not Too Much, Not Too Little: Centralization,...
-
Of the 14 females with one male, 7 had a male first. Recall the falcon data studied in Example 8.7.15, where 44 families of two birds were studied, and 14 had no males, 14 had one male, and 16 had 2...
-
Suppose that a company has 10.000 outstanding shares in the beginning of the year. On April 1st, the company increases its shares by 6.000. On July 1st, the company increases its shares again, but...
-
The program execution of Figure 3.5 is described in the text using six steps. Expand this description to show the use of the MAR and MBR. Memory CPU registers Memory CPU registers 3 0 0PC300 1 9 4 0...
-
Consider a hypothetical 32-bit microprocessor having 32-bit instructions composed of two fields: the first byte contains the opcode and the remainder the immediate operand or an operand address. a....
-
Consider a hypothetical microprocessor generating a 16-bit address (for example, assume that the program counter and the address registers are 16 bits wide) and having a 16-bit data bus. a. What is...
-
You have just been hired as a new management trainee by Earrings Unlimited, a distributor of earrings to various retail outlets located in shopping malls across the country. In the past, the company...
-
Brief Exercise 10-6 Flint Inc. purchased land, building, and equipment from Laguna Corporation for a cash payment of $327,600. The estimated fair values of the assets are land $62,400, building...
-
"faithful respresentation" is the overriding principle that should be followed in ones prepaparation of IFRS-based financial statement. what is it? explain it fully quoting IAS. how this this...
Study smarter with the SolutionInn App