Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The following ruleset was generated to allow inbound and outbound SMTP traffic (See Table. 1) Rule Direction In Out Out In Either Src Addr External

image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed

The following ruleset was generated to allow inbound and outbound SMTP traffic (See Table. 1) Rule Direction In Out Out In Either Src Addr External Internal Internal Dest Addr Internal External External Internal Protocol TCP TCP TCP TCP Any Src Port 1023 25 1023 25 Any Dest Port 25 > 1023 25 1023 Any Action Permit Permit Permit Permit Deny Table1: Firewall ruleset A. Your host in this example has IP address 172.16.1.1. Someone tries to send e-mail from a remote host with IP address 192.168.3.4. If successful, this generates an SMTP dialogue between the remote user and the SMTP server on your host consisting of SMTP commands and mail where TCP connection is set up between a user agent and a server program. The server listens on TCP port 25 for incoming connection requests. The user end of the connection is on a TCP port number above 1023 Additionally, assume that a user on your host tries to send e-mail to the SMTP server on the remote system For each of the following Four packets generated in this scenario: 1. fill in the table here as follows based on our ruleset (Table. 1): In the Action cell specify the action that was performed (by writing "Permitted" or Denied").-Please use the exact spelling to avoid loosing point (no quotations) . In the Rule cell, specify the rule that was used to filter that packet based on the ruleset specified in Table 1 (by writing the rule letter." ' B', "C,)-Please use the exact spelling to avoid loosing point (no quotations). The following ruleset was generated to allow inbound and outbound SMTP traffic (See Table. 1) Rule Direction In Out Out In Either Src Addr External Internal Internal Dest Addr Internal External External Internal Protocol TCP TCP TCP TCP Any Src Port 1023 25 1023 25 Any Dest Port 25 > 1023 25 1023 Any Action Permit Permit Permit Permit Deny Table1: Firewall ruleset A. Your host in this example has IP address 172.16.1.1. Someone tries to send e-mail from a remote host with IP address 192.168.3.4. If successful, this generates an SMTP dialogue between the remote user and the SMTP server on your host consisting of SMTP commands and mail where TCP connection is set up between a user agent and a server program. The server listens on TCP port 25 for incoming connection requests. The user end of the connection is on a TCP port number above 1023 Additionally, assume that a user on your host tries to send e-mail to the SMTP server on the remote system For each of the following Four packets generated in this scenario: 1. fill in the table here as follows based on our ruleset (Table. 1): In the Action cell specify the action that was performed (by writing "Permitted" or Denied").-Please use the exact spelling to avoid loosing point (no quotations) . In the Rule cell, specify the rule that was used to filter that packet based on the ruleset specified in Table 1 (by writing the rule letter." ' B', "C,)-Please use the exact spelling to avoid loosing point (no quotations)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Introduction To Data Mining

Authors: Pang Ning Tan, Michael Steinbach, Vipin Kumar

1st Edition

321321367, 978-0321321367

More Books

Students also viewed these Databases questions