Advertisement
xdxdxd123

Untitled

Jun 1st, 2017
1,487
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.29 KB | None | 0 0
  1.  
  2. Question: Using Figure 6-18, create one or more rules necess...
  3. Bookmark
  4. Using Figure 6-18, create one or more rules necessary for both the internal and external firewalls to allow a remote user to access an internal machine from the Internet using the Timbuktu software. Your answer requires researching the ports used by this software packet.Servers Controlled access untrusted network External filtering router Figure 6-18 Screened subnet (DMZ) Demilitarized zone (DMZ) Trusted network Proxy access Internal filtering router
  5.  
  6. Show transcribed image text
  7. Expert Answer
  8. Anonymous
  9. Anonymous answered this Was this answer helpful?
  10. 1
  11. 0
  12. 283 answers
  13. The rules for both the internal and the external firewalls
  14.  
  15. The data packet has been examined by operating the Firewalls and comparison has been performed by programmed with the logical rules. The logic should be based on the set of guidelines which has been programmed by the administrator of firewall, or set to be created dynamically, and the basis of the requests which is outgoing for the information. The logical is also referred as the firewall rules, rule base, or firewall logic. For determining, whether a packet is to be allowed for passing through or it should be dropped specifically, by the packet header information has been used by the firewalls. It is necessary to create simple rules and considering how they are interacting for indulging the complex rules.
  16.  
  17. Rule 1:
  18.  
  19. Allowing the responses to the requests of the internal. In implementing the firewall, it is necessary for allowing a response for the information to the internal request. In the state of dynamic or stateful firewalls, for an outgoing request in a state table, has been matched by the incoming traffic has been accomplished easily. For the External Filtering Router it can be achieved in the simple packet filtering with the rule.
  20.  
  21. Rule 2:
  22.  
  23. From the public network the firewall device cannot be accessed directly. It is possible for the hacker to access firewall directly, and also they can able to modify the rule or delete the rule and also can able to allow the traffic over, which is unwanted. And for this reason, the other network devices should not be allowed for accessing directly and by the firewall too. If the hackers can have the ability for comprising the firewall and they can able to access the client and server by using the permission for causing damages to it.
  24.  
  25. Rule 3:
  26.  
  27. Until configuring the separate router for configuring the traffic which is to be handled, is it not sensible for restricting the outgoing traffic. By assuming potentially with the dangerous traffic which is inbound, and the work of the firewall is increased in the screening the outgoing traffic. The separate router is to be used for the organization, which is in need to get controlled over the outbound traffic.
  28.  
  29. Rule 4:
  30.  
  31. It is always necessary that the traffic of the email can be reached one and only your server. Then that server has to be configured properly for those packets in particular so that the rest of the network are said to be safe.
  32.  
  33. Rule 5:
  34.  
  35. In the general practice of firewall construction, the denial for the request of a rule should be permitted if the service of request is not explicitly allowed by the policy
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement