Objective: be able to design packet filtering firewall rules and identify advantages/disadvantages of such firewalls
An educational institute has a single router, referred to as the gateway router, connecting its internal network to the Internet. The institute has the public address range 220.127.116.11/16 and the gateway router has address 18.104.22.168 on its external interface (referred to as interface ifext). The internal network consists of four subnets:
A DMZ, which is attached to interface ifdmz of the gateway router and uses address range 22.214.171.124/24.
A small network, referred to as shared, with interface ifint of the gateway router connected to three other routers, referred to as staff_router, student_router, and research_router. This network has no hosts attached (only four routers) and uses network address 10.3.0.0/16.
A staff subnet, which is for use by staff members only, that is attached to the staff_router router and uses network address 10.3.1.0/24.
A student subnet, which is for use by students only, that is attached to the student_router router and uses network address 10.3.2.0/24.
A research subnet, which is for use by research staff, that is attached to the research_router router and uses network address 10.3.3.0/24.
In summary, there are four routers in the network: the gateway router, and routers for each of the staff, student and research subnets. There are five subnets: DMZ, shared, staff, student, and research.
There are two servers in the DMZ that all can accept requests from the Internet: a web server supporting HTTP and HTTPS, and a SMTP email server. Members of the staff, student and research subnets can access the web server; members of the staff subnet only can access the email server but using IMAP.
The gateway router also runs a stateful packet filtering firewall and performs port address translation. In addition to the DMZ setup as described above, security requirements for the educational institute are:
External Internet users cannot access any internal computers (except in DMZ and as stated in other requirements).
Staff, students and researchers can access websites in the Internet.
The researchers (on the research subnet) run a server for sharing data with selected research partners external to the educational institute. That server provides SSH access and a specialised file transfer protocol using TCP and port 1234 to the partners. The server has internal address 10.3.3.31 and NAT is setup on the gateway router to map the public address 126.96.36.199 to the internal address. Currently there are two partner organisations that can access the server, and they have network addresses: 188.8.131.52/24 and 184.108.40.206/24.
The professor that leads the research staff also wants access to the data sharing server while they are at home. At home that professor uses a commercial ISP that dynamically allocates IP addresses in the range 220.127.116.11/16.
Considering the above information, answer the following questions:
Objective: Understanding important challenges with securing WiFi networks
Objective: Understand what makes a strong password, and the difficulties of using passwords for most users
You are the IT security administrator for an organisation with about 100 users. The users all have office computers (PCs or laptops), but also use other computers for work (such as shared computers, and personal mobile devices). For example, a typical user may use a Windows PC in their office, occasionally use a Windows PC or Mac in a shared space or lab, and regularly use their own Android or iOS phone for work purposes. There is a mix of operating systems on computers and mobile devices.
You are tasked with educating users on passwords, and recommending password management solutions to the organisation. You are considering two options for password management.
Option 1. Educate users to manage their own passwords, while using some technical controls. This option involves recommending policies to management, providing user training, and applying password management rules in various systems (e.g. when passwords are created). Most users will not use password management software in this option.
Option 2. Enforce password management software for all users. This option requires all users to use a single password management application (e.g. LastPass, KeePass, or `wallet’ software).
First considering Option 1, answer the following sub-questions.
“Recommendation 1. You should do … . The advantage of doing this is … . But the disadvantage of doing this is … .”. (Note you cannot use the password length and character set as a recommendation – you must choose other recommendations)
Now considering Option 2, answer the following sub-questions.
Objective: Learn the steps of deploying a secure web server, as well as the limitations/challenges of digital certificates
For this question you must use virtnet (as used in the workshops) to study HTTPS and certificates. This assumes you have already setup and are familiar with virtnet. See Moodle and workshop instructions for information on setting up and using virtnet, deploying the website, and testing the website.
Your task is to:
Create topology 5 in virtnet
Deploy the MyUni demo website on the nodes
Setup the webserver to support HTTPS, including obtaining a certificate
Capture traffic from the web browser on node1 to the web server that includes a HTTPS session. Save the file as https.pcap.
Test and analyse the HTTPS connection.
Answer the following sub-questions based on above test and analysis.
Only draw the SSL packets; do not draw the 3-way handshake, TCP ACKs or connection close. Hint: identify which packets belong to the first TCP connection and then filter with “ssl” in Wireshark. Depending on your Wireshark version, the protocol may show as “TLSv1.2”.
A single TCP packet may contain one or more SSL messages (in Wireshark look inside the packet for each “Record Layer” entry to find the SSL message names). Make sure you draw each SSL message. If a TCP packet contains multiple SSL messages, then draw multiple arrows, one for each SSL message, and clearly label each with SSL message name.
Clearly mark which packets/messages are encrypted.
Objective: Understand the advantages and disadvantages of Internet privacy technologies, including VPNs, and learn about advanced techniques (Tor)
Encryption is commonly used to provide data confidentiality in the Internet: when two hosts communicate, other entities in the path between the two hosts cannot read the data being sent. However encryption on its own does not privacy of who is communicating. Although the other entities cannot read the data, they can determine which two hosts are communicating.
Consider a simple view of an Internet path where client C is communicating using IPv4 with server S. There are n routers on the path. Assume a malicious user, who wants to know information about who is communicating and when, has access to one of the routers in the path (router Rm), e.g. they can capture packets on that router. Note Rm is not directly attached to the subnets of C or S.
One method for providing privacy in the Internet is using a Virtual Private Network (VPN). Assume client C is using a VPN server which is located on a router in the path between C and S (but not on Rm).
Onion routing, used in Tor, is another method for providing privacy in the Internet. It is generally consider to provide more privacy than using a VPN. The following sub-questions require you to learn the basics of Tor.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Advanced Network Security. Retrieved from https://myassignmenthelp.com/free-samples/coit20262-advanced-network-security/filtering-firewall-rules.html.
"Advanced Network Security." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/coit20262-advanced-network-security/filtering-firewall-rules.html.
My Assignment Help (2021) Advanced Network Security [Online]. Available from: https://myassignmenthelp.com/free-samples/coit20262-advanced-network-security/filtering-firewall-rules.html
[Accessed 27 October 2021].
My Assignment Help. 'Advanced Network Security' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/coit20262-advanced-network-security/filtering-firewall-rules.html> accessed 27 October 2021.
My Assignment Help. Advanced Network Security [Internet]. My Assignment Help. 2021 [cited 27 October 2021]. Available from: https://myassignmenthelp.com/free-samples/coit20262-advanced-network-security/filtering-firewall-rules.html.
MyAssignmenthelp.com has assembled a team of extraordinarily talented and knowledgeable PhD qualified online dissertation experts to provide students required dissertation writing help in Canberra, Adelaide, Perth, Melbourne, Sydney and other parts of Australia. Students can buy dissertation online from us with three simple steps. Auditing dissertation help, history dissertation help, geography dissertation help, maths dissertation help are few popular services under our dissertation writing assistance.
Answers: Question 1 Question 2 LEDs are used in fiber optic communication networks. However, they are not the best choice because: LEDs emit incoherent light characterized by a broad spectrum since they generate light through spontaneous emission. As a result, the signal will be bound by chromatic dispersion thus limiting the distance over which LEDs based transmitters can transmit data. Also, LED transmitters can only be coupled into mul...Read More
Answers: Introduction An impressive growth can be expected in the use of the communication network taking into consideration few years down the lane. In order, to optimize and initiate the operation of this network, a good management the network facility should be incorporated and adopted. Network management as a term can have many definition depending upon whose operation function is at the questions end. Taking into consideration any organi...Read More
Answers: Part A Question 1 (a) File Transfer Protocol establishes two separate TCP connection between the client and the server using the two modes that are active mode and passive mode, for transferring the commands and data through the two different channels. Active Mode establishes command channel from the client to the server and the passive mode establishes the data channel from the server to the client. Question 1 (b) Anonymous IP ad...Read More
Answers: Question 1: The current era of globalization and technological advancement has necessitated several creative minds using technology to solve problems rather than just developing user interfaces. The reason why best interface is identified as no interface is because interfaces create major barriers. The elimination of interfaces is identified as a principle for embracing the natural processes (Doody, 2011). This was significantly addr...Read More
Answer: Proposal The proposal in this agenda is prepared to consider secure campus network concept along with suggesting security model. The paper provides proposal for showing security considerations and the factors that should be addressed for implementing network. The proposal further addresses checklist for showing certain aspects in the discussion in order to evaluate the campus network as to provide recommendations of best practic...Read More
Are you confident that you will achieve the grade?
Our best Expert will help you improve your grade