Language:EN
Pages: 7
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
shell scripts the firewall implementation and conf

Shell scripts the firewall implementation and configuration

ASSESSMENTS

Assessment Number 1: Case Study Research Report (50%)

2. A full topology diagram of the edge of the network infrastructure showing interface configurations, hostnames and the location of any additional security devices

3. Shell Scripts of the firewall implementation and configuration

For the written assignment you are expected to research a number of areas of network security through independent research covering the following aspects:

 Research the implementation of a secure network through the critical evaluation of technologies, infrastructures, topologies and devices that are required to develop a defence in depth strategy for the edge of a corporate network.

Extensive research demonstrating use of a wide range of current secondary research sources will be evident. Referencing and English will be excellent.

Second class (50-69%):
A clear and critical synthesis of the appropriate literature relating to network Security will be provided identifying appropriate technologies, devices, protocols etc. will be elicited. A good evaluation of your own work will be set out in apprendix A. In addition the topology diagram will be of a good standard, well laid out with the appropriate details. The list of protocols will reflect the majority needed to run a digital business in the modern era.

guide for the written aspect of the work and should be understood with the Universities which will be used to help with the grading of the assignment. It is recommended that you familiarise yourself with it.

FIREWALL SPECIFICATION INFORMATION

In order to obtain a passing D-grade you must develop a firewall script that:

• implements a basic firewall for the ports identified in the research paper, adds the SNAT rule(s) necessary to allow hosts on the Internal network to access web servers on the Internet which may be represented for test purposes by a server attached to the external subnet.

In addition to the ports and protocols identified through the research, to achieve a C-grade you must Complete

the work as for a D grade above and::

 Adds the necessary rule(s) to prevent direct access to the DMZ (i.e. using routing rather than DNAT) from the

external network.

stage but make sure that you capture traffic in both directions. Mark the packets on a copy of the output from

tcpdump showing the source and destination address for each packet as it crosses the network on BOTH sides

both directions. Mark the packets on a copy of the diagram of your configuration showing the source and

destination address for each packet as it crosses the network on BOTH sides of the firewall/router.

 Configure a proxy server (e.g. squid) in the Firewall Host.

 Add the rule(s) necessary to allow the proxy server (ONLY) to access web servers on the Internet which may be

 Add the necessary rule(s) to prevent direct access to the Internet (i.e. without going through the proxy server) from the internal network.

 Provide evidence of the SNAT in operation in the form of output from the tcpdump utility when a Web (http) browser on an internal host requests a page from a Web server on the external network through the proxy server.

Illustration 1: Topology for the dual edge firewall configuration

 Save the firewall configuration as firewall-<student-id>-GradeA.sh

To achieve an > 86% A-grade you should Complete the work as for a A grade above and:
5

Universities which will be used to help with the grading of the assignment. It is

recommended that you familiarise yourself with it.

 A Bibliography must be added before the appendix using the correct Harvard standards.

 Appendix A: Must contain a self evaluation of the work stating that it is yours and reflecting on what mark

and run. Exact copies of the ones submitted in the zip file must also be added as text in the assignment under

appendix B

Do not cut and paste phrases or paragraphs from published sources. You should seek to use your own words

to explain concepts and theory and cite accordingly

 If you wish to directly quote from published sources then you must use full Harvard presentation. See LEAP for

clear guidance.

technologies and solutions.

 Test the firewall rules as you go – use the resources provided to help you with your tests. Practical sessions will

Duration: 2 hours

Special Arrangements: Closed Book

Is the answer presented in an appropriate context to the question?

Is a coherent and well-structured answer to the question made?

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : Allison Morris

PageId: ELI57656E5