Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1.When shopping for a firewall, what 3 pieces of documentation should you bring

ID: 3823129 • Letter: 1

Question

1.When shopping for a firewall, what 3 pieces of documentation should you bring to a meeting with a vendor or consultant on the purchase

2. Complete the following statement: Access control lists or rules are created for each ______________ on the firewall

3. How many sets of rules do you need for this network diagram?  

4.Traffic from the untrusted network to the trusted network is called _____________ traffic.

5. List the seven best practices for firewalls (A)

For each one, briefly describe why it is a best practice, that is, explain how this best practice protects the trusted network. (B)

Untrusted network Web Server Proxy Server SMTP Server 10.10.10.5 10.10. 10.6 10.10.10.4 Demilitarized zone (DMZ) External Filtering Switch nternal Filtering Router Router Ext IP-10, 10.10.1 Ext IP 10.10.10.3 Int IP 10.10.10.2 Int IP 192.168.2.1 Trusted network Internal Server Firewall Admin IP: 192.168.2.2 IP: 192.168.2.3 NAT Table NT Address EXT Address 192.168.2.1 10.10.10.7 192.168.2.2 10.10.10.8 192.168.2.3 0.10.10.10

Explanation / Answer

1. 3 pieces of documentation : max no. of computers on network, max no. of new connections, RAM

2. incoming request

4. DMZ traffic

5. best practices : form firewall change control board, alert users and admin prior to firewall rule changes, documentation of all rules and usage of comments to explain the same, be careful about "Allow" rules, "deny all" first and then add exceptions to the rules , regularly review rules, organize rules as per performance