
Write down two firewall rules on the router using the format below
(network interface, protocol, flag, source IP or CIDR, source port, destination IP or CIDR, destination port, action)
Rule1: block all of the incoming pings sent to the 172.20.241.0/24 subnet;
Rules2: block all of the outgoing pings to any computers outside of the 172.20.241.0/24 subnet.
What network attacks can the above firewall rules potentially protect against? Please identify one example of these attacks. Explain how this attack can be conducted and how this attack can be blocked using the rules above.
For the file rules in Q4.1, is it for stateful inspection or non-stateful inspection (2pts)? Can a non-stateful inspection firewall detect TCP SYN Flood attack? Why or Why not?

Trending nowThis is a popular solution!
Step by stepSolved in 5 steps

- You have just configured a DNS server. Your security team mandates that you cannot use the root hint servers for external lookups. Instead, all external lookups must go through the OpenDNS servers 208.67.220.220 and 208.67.222.222. What mechanism in the DNS server setup lets you specify a specific DNS server to query for external lookups ?arrow_forwardFigure 2 shows a site with a given network address and mask. The site consists of three LANS, a router indicated by a circle containing R and a Gateway indicated by a box containing G. The administrator has divided the site into several subnetworks. Choose appropriate subnetwork addresses, host addresses, and router addresses and assign them to the figure. Site address: 217.14.8.0 Mask: 255.255.255.224 LAN2 LAN1 R G www To the rest of the Internet Figure 2: Subnet configuration .. LAN3arrow_forwardSay an eavesdropper on a wired network sniffs packets that are part of a TLS-encrypted HTTP session. No other encryption is added. State whether the eavesdropper will see each of the following elements as encrypted or in plaintext: 1) application data, 2) HTTP headers, 3) Layer 4 headers, 4) Layer 3 headers, 5) Layer 2 headers. Justify your answer.arrow_forward
- Please explain what subnet mask 255.255.255.252 (/30) is and how it can be used to enhance network security with an example.arrow_forwardCourse: Data communication and communication Networks Answer the following questions related to SYN cookies. a. Why is it necessary for the server to use a special initial sequence number in the SYNACK? b. Suppose an attacker knows that a target host uses SYN cookies. Can the attacker create half-open or fully open connections by simply sending an ACK packet to the target? Why or why not? c. Suppose an attacker collects a large amount of initial sequence numbers sent by the server. Can the attacker cause the server to create many fully open connections by sending ACKs with those initial sequence numbers? Why?arrow_forwardThe information gathered by a standard packet-filtering router is used in what ways? The inability of a router to filter packets is inexplicable. Is there a significant difference between a router's packet filtering and a firewall's stateful inspection?arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education





