Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

You are given the following informal firewall policy details to be implemented using a firewall li 1. E-mail may be sent using SMTP in both

You are given the following informal firewall policy details to be implemented using

a firewall li

1. E-mail may be sent using SMTP in both directions through the firewall, but

it must be relayed via the DMZ mail gateway that provides header sanitization

and content filtering. External e-mail must be destined for the DMZ mail

server.

2. Users inside may retrieve their e-mail from the DMZ mail gateway, using either

POP3 or POP3S, and authenticate themselves.

3. Users outside may retrieve their e-mail from the DMZ mail gateway, but only if

they use the secure POP3 protocol and authenticate themselves.

4. Web requests (both insecure and secure) are allowed from any internal user out

through the firewall but must be relayed via the DMZ Web proxy, which provides

content filtering (noting this is not possible for secure requests), and users must

authenticate with the proxy for logging.

5. Web requests (both insecure and secure) are allowed from anywhere on the Internet

to the DMZ Web server.

6. DNS lookup requests by internal users are allowed via the DMZ DNS server,

which queries to the Internet.

7. External DNS requests are provided by the DMZ DNS server.

8. Management and update of information on the DMZ servers is allowed using secure

shell connections from relevant authorized internal users (may have different sets of

users on each system as appropriate).

9. SNMP management requests are permitted from the internal management hosts

to the firewalls, with the firewalls also allowed to send management traps (i.e.,

notification of some event occurring) to the management hosts.

Design suitable packet filter rule sets to be

implemented on the External Firewall and the Internal Firewall to satisfy the

aforementioned policy requirements

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

OpenStack Trove

Authors: Amrith Kumar, Douglas Shelley

1st Edition

1484212215, 9781484212219

Students also viewed these Databases questions

Question

Write the difference between sexual and asexual reproduction.

Answered: 1 week ago

Question

What your favourite topic in mathematics?

Answered: 1 week ago

Question

Briefly describe vegetative reproduction in plants.

Answered: 1 week ago