Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Objective: Upon completion of this activity, you will be able to discuss the operation of different types of network firewalls. Student Instructions: Read Chapter 22

Objective:

Upon completion of this activity, you will be able to discuss the operation of different types of network firewalls.

Student Instructions:

Read Chapter 22 of the William Stallings textbook ( Cryptography and Network Security Principles and Practice Fifth Edition William Stallings ). Answer the following questions about network firewalls.

a. List three design goals for a firewall.

b. List four techniques used by firewalls to control access and enforce a security policy.

c. What information is used by a typical packet filtering firewall?

d. What are some weaknesses of a packet filtering firewall?

e. What is the difference between a packet filtering firewall and a stateful inspection firewall?

f. What is an application-level gateway?

g. What is a circuit-level gateway?

h. What are the differences between firewalls in Figures 2 and 3?

image text in transcribed

image text in transcribed

Figure 3

image text in transcribed

i. Why is it useful to have host-based firewalls?

j. What is the difference between an internal and an external firewall?

Figure 22.2 shows this simple interface. The list of inbound services that can be selectively reenabled, with their port numbers, includes the following: - Personal file sharing (548,427) - Windows sharing (139) - Personal Web sharing (80,427) - Remote login - SSH (22) - FTP access (20-21, 1024-64535 from 20-21) - Remote Apple events (3031) - Printer sharing (631,515) - IChat Rendezvous (5297, 5298) - ITunes Music Sharing (3869) - CVS (2401) Firewall On Click Stop to allow incoming network communication to all services and ports. Allow: On Description (Ports) Personal File Sharing (548,427) Windows Sharing (139) Personal Web Sharing (80,427) Remote Login - SSH (22) FTP Access (20-21, 1024-65535 from 20-21) Remote Apple Events (3031) Printer Sharing (631,515) To use FTP to retrieve files while the firewall is on, enable passive FTP mode using the Proxies tab in Network Preferences. (?) Figure 22.2 Example Personal Firewall Interface When FTP access is enabled, ports 20 and 21 on the local machine are opened for FTP; if others connect to this computer from ports 20 or 21 , the ports 1024 through 64535 are open. For increased protection, advanced firewall features are available through easy-to-configure checkboxes. Stealth mode hides the Mac on the Internet by dropping unsolicited communication packets, making it appear as though no Mac is present. UDP packets can be blocked, restricting network traffic to TCP packets only for open ports. The firewall also supports logging, an important tool for checking on unwanted activity

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

How To Make A Database In Historical Studies

Authors: Tiago Luis Gil

1st Edition

3030782409, 978-3030782405

Students also viewed these Databases questions