Question
FIREWALL RULES The scenario describes the pertinent details of a small network, including specific addresses and port numbers. Your task is to determine if the
FIREWALL RULES
The scenario describes the pertinent details of a small network, including specific addresses and port numbers. Your task is to determine if the inbound firewall rules on the below table are correct as written, or if they need to be changed in order to be correct If they need to be changed, please note the change you would make to correct the rule
Part 1: Assume you have a small network at 150.88.52.0/24 subnet.
--Your web/e-mail server is at address 150.88.52.12
--You want only http: (port 80) and e-mail (port 25) requests from Loyola clients to come into your site
--You want your internal users to be able to access http: and e-mail services from Loyola servers only
--You want to allow ICMP pings
--Given this scenario, take a look at the next table and tell me which of the inbound rules shown there are okay, and which are not
--For the ones that are NOT okay, what would you do to fix them?
--Remember, you want rules that allow the above criteria, and nothing else!
Accept/ Source Destination Destination Rule # Protocol Source IP Flag Reject Port IP Port TCP Accept 140.192.*.* 150.88.52.12 TCP Accept 140.192.*.* 150.88.52.12 ICMP Accept Accept 140.192.** 80 150.88.52.* Accept 140.192.** 25 150.88.52.* Reject Accept/ Source Destination Destination Rule # Protocol Source IP Flag Reject Port IP Port TCP Accept 140.192.*.* 150.88.52.12 TCP Accept 140.192.*.* 150.88.52.12 ICMP Accept Accept 140.192.** 80 150.88.52.* Accept 140.192.** 25 150.88.52.* RejectStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started