Thursday, 9 July 2015

Computer Networking - Firewalls II

Click here to order this paper @Essaybay.net. The Ultimate Custom Paper Writing Service
Computer Networking - Firewalls
Course material is attached for your convenience and as well as questions.
The below are simply in reference to the Questions material.
Thank you,
Lesson 4: Proxying Firewalls
Lesson 5: Firewall Architecture
Document Preview: 
Figure 1 shows how an internal desktop (denoted as Proxy Client) is protected by a proxy firewall. Let's assume that the internal desktop is used by Alice and she wants to remotely log into the external machine denoted as the Telnet server. Alice runs a Telnet client program on her desktop. Let’s first assume that the Proxy Firewall does not exist. In this case, when Alice needs to remotely login into the external Telnet server, the Telnet client program that runs on her desktop will send packet #1 of the TCP 3-way handshake protocol to the Telnet Server. What is the source IP address put in the header of packet #1 (4 points)? After a while, packet #2 of the TCP 3-way handshake protocol will be sent from the Telnet Server to the internal Proxy client. What is the source port number put in the header of packet #2 (4 points)? After a while, packet #3 of the TCP 3-way handshake protocol will be sent from the internal Telnet client program to the Telnet Server program. What is the dest IP address put in the header of packet #3? (4 points) Based on your answers to Questions 1, 2, and 3, you will notice that if the Telnet server is malicious, the Internal Network will face a major security threat. What is it? (6 points) 1.5: To address this security threat, let’s deploy the Proxy Firewall. To see why the proxy firewall is useful, let’s revisit the same example. When Alice needs to remotely login into the Telnet server, the Telnet client program will send packet #1 of the TCP 3-way handshake protocol to the Telnet Server. The destination IP address put in the header of packet #1 cannot be the IP address of the Proxy Firewall. Why? (6 points) What is the dest IP address put in the header of packet #1? (4 points) 1.6: When Packet #1 arrives at the Proxy Firewall: The Proxy Firewall will not let the packet directly go through the firewall. Why? (6 points) 8. When the packet leaves the Proxy Firewall, what is the source IP address in the header? (4 points) After a...
Attachments:

Click here to order this paper @Essaybay.net. The Ultimate Custom Paper Writing Service

No comments:

Post a Comment