$20 Bonus + 25% OFF
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!
Add File

Error goes here

COIT20262 Advanced Network Security

tag 0 Download10 Pages / 2,409 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT


Objective: be able to design packet filtering firewall rules and identify advantages/disadvantages of such firewalls An educational institute has a single router, referred to as the gatewayR, connecting its internal network to the Internet. The institute has the public address range and the gateway router has address on its external interface (referred to as interface ifout).
The internal network consists of three subnets:
A DMZ, which is attached to interface ifdmz of the gateway router and uses address range
A small network, referred to as shared, with interface ifin of the gateway router connected to two other routers, referred to as staffR, and studentR. This network has no hosts attached (only three routers) and uses network address
A staff subnet, which is for use by staff members only, that is attached to the staffR router and uses network address
A student subnet, which is for use by students only, that is attached to the studentR router and uses network address

In summary, there are three routers in the network: the gateway router, and routers for the staff and student subnets. There are four subnets: DMZ, shared, staff, and student.
There are three servers in the DMZ that all can accept requests from the Internet:
1. A web server supporting HTTP and HTTPS (IP address is
2. A secure shell server using SSH (IP address is, and
3. A SMTP email server (IP address is

Members of the staff and student subnets can access the web server; members of the staff subnet only can access the email server but using IMAP; and internal members (both staff and students) cannot access the SSH server.The gateway router also runs a stateful packet filtering firewall and performs port address translation. In addition to the DMZ setup as described above, security requirements for the educational institute are:
External Internet users cannot access any internal computers (except in DMZ and as stated in other requirements).
Staff and students can access websites in the Internet.
The SSH server in the DMZ can only be accessed by external Internet users from subnets: and

Considering the above information, answer the following questions:
(a) Draw a diagram illustrating the network. Although there may be many computers in the staff and student subnets, for simplicity you only have to draw three computers in the staff subnet and three computers in the student subnet. Label all computers and router.
(b) Specify the firewall rules using the format as in the table below. You may add/remove rows as needed. After the table, add an explanation of the rules (why you design the firewall rules the way you did). 
Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

Unique Document

Under Evaluation

Get Money
into Your Wallet

Total 10 pages, 1 USD Per Page

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2021). Advanced Network Security. Retrieved from https://myassignmenthelp.com/free-samples/coit20262-network-and-security/encryption-systems.html.

My Assignment Help (2021) Advanced Network Security [Online]. Available from: https://myassignmenthelp.com/free-samples/coit20262-network-and-security/encryption-systems.html
[Accessed 17 September 2021].

My Assignment Help. 'Advanced Network Security' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/coit20262-network-and-security/encryption-systems.html> accessed 17 September 2021.

My Assignment Help. Advanced Network Security [Internet]. My Assignment Help. 2021 [cited 17 September 2021]. Available from: https://myassignmenthelp.com/free-samples/coit20262-network-and-security/encryption-systems.html.

Getting nightmare regarding pending chemistry assignment? Then it is high time you consider hiring chemistry assignment help service of MyAssigemnthelp.com. We at MyAssignmenthelp.com deliver quality subject specific assistance on more than 100+ subjects. For us, students' need is foremost, and we work round the clock to offer science, humanities and commerce assignment help. Among Commerce wing, our one of the most popular services is capital budgeting assignment help. In science segment, we have gained popularity with biology assignment help.

Latest Networking Samples

COIT20262 Advanced Network Security

Download : 0 | Pages : 11

Answers: 1. a. Figure 1: Network Diagram b. Rule No. Transport Source IP Source Port Dest. IP Dest. Port Action 1 TCP 1234 22 Allow 2 TCP 1234 22 Allow 3 HTTP/HTTPS Any 80,8080 Allow 4 HTTP/H...

Read More arrow Tags: Australia Ryde Management Masters in Business Administration- University of New South Wales Masters in Business Administration 

NIT2201 IT Profession And Ethics

Download : 0 | Pages : 9

Answer: Volkswagen Emission Scandal For over two years, the German car making company, Volkswagen, has been dealing with the scandal dubbed as the Volkswagen emission scandal. This emission scandal has immensely affected the integrity of the company regarding its view on the realization of a clean environment. A team of researchers from West Virginia University in May 2014, with the direction of Dan Carder, conducted an extensive emission tes...

Read More arrow Tags: Malaysia Ashfield Management nursing practice University of New South Wales Masters in Business Administration 

CS155 Computer And Network Security

Download : 0 | Pages : 11

Answer: Introduction: Firewalls are devices, systems or component collection that regulate and manage the flow of data between various networks that vary with the various trust levels through denying, permitting or proxying data. These firewalls can be placed as a barrier in between the external and internal entrusted networks that include the internet and they can also be implemented in creating different subnets in the network of the organi...

Read More arrow

ICTNWK511 Manage Network Security

Download : 0 | Pages : 6

Answer: Summary of Paper 1: Security threats and measures for the cyber-physical systems - ZHANG Li, WANG Qing, TIAN Bin The paper covers the security issues that are associated with the cyber physical systems (CPS) and also highlights various security measures that may be adopted to overcome these threats. The papers has been written in five major sections covering an introduction to cyber physical systems followed by the architecture of CP...

Read More arrow Tags: Australia Albion Management medication error University of New South Wales 

ITC506 Information Technology Ethics

Download : 0 | Pages : 6

Answer: Q1. What's going on? (Case Study) The Project Director of a company is requested by the Chief Information Officer (C.I.O) to deliver a project on under development without the implementation of Encryption of the product, commonly known as Early Launch. The Chief Information Officer says that, he/she has received pressure from the Chief Executive Officer (C.E.O) concerning the product delivery, whereby the client of the product has req...

Read More arrow Tags: Australia Pascoe Vale Management Finance Principle University of New South Wales 

5% Cashback

On APP - grab it while it lasts!

Download app now

*Offer eligible for first 3 orders ordered through app!

callback request mobile
Have any Query?