1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flura [38]
3 years ago
15

We have an internal webserver, used only for testing purposes, at IP address 5.6.7.8 on our internal corporate network. The pack

et filter is situated at a chokepoint between our internal network and the rest of the Internet. Can such a packet filter block all attempts by outside hosts to initiate a direct TCP connection to this internal webserver? If yes, design suitable packet filter rule sets (similar to those shown in the table below) that provides this functionality; if no, explain why a (stateless) packet filter cannot do it.
Table: Packet-Filtering Examples
Rule, Direction, Src address, Dest addresss, Protocol, Dest port, Action
1, In, External, Internal, TCP, 25, Permit
2, Out, Internal, External, TCP, >1023, Permit
3, Out, Internal, External, TCP, 25, Permit
4, In, External, Internal, TCP, >1023, Permit
5, Either, Any, Any, Any, Any, Deny

Computers and Technology
1 answer:
lukranit [14]3 years ago
3 0

Answer:

Check the explanation

Explanation:

A packet filter firewall is used as a check point between internal corporate network to the outside internet. It blocks all the inbound traffic from the outside hosts trying to initiate a direct TCP connection to the internal corporate webserver. The network design with firewall is shown in the attached image below:

The figures in the attached image below shows an internal corporate network is protected with a packet filter firewall to minimize the inbound traffic from the external network or an internet. Therefore, the packet filter is used as a check point between the network.

The packet filter blocks all attempts by the outside hosts in order to initiate a direct TCP connection to the internal webserver of the internal corporate network.

Going by the second part of the attached image below can can therefore conclude that:

• Rule 1 specifies that, deny any packet with the destination address 5.6.7.8 if the STN flag of TCP header is set.

• Rule 2 specifies that, allow the inbound email traffic from the external source.

• Rule 3 specifies, allows the Outbound TCP traffic from the internal corporate network.

• Rule 4 specifies, allows outbound Email traffic from the internal corporate network to the external network.

• Rule 5 specifies, block any traffic from any source to the any destination.

You might be interested in
web pages within the same website often have different blank because they have different blank A) home pages, urls B) goals, sou
jenyasd209 [6]

Answer:

D

Explanation:

Home page will not usually be formatted the same as the contact page because each page has a different purpose

8 0
4 years ago
Which of these about non-disclosure agreements is accurate?
grandymaker [24]

Answer: number 2

Explanation: number 2

6 0
3 years ago
Read 2 more answers
In 1–3 sentences, describe one reason you would import data into a database.
Norma-Jean [14]

Answer and Explanation

A database is an organised collection of a data which is stored and can be easily, managed, updated and can be accessed electronically when required. The reason for importing your data into the data base is because this data is secure from unauthorized people. This is because to access this data you need to login. You can also update it and access it electronically when the need be.

8 0
3 years ago
Read 2 more answers
Although “dog.jpg” and “dog.JPG” and “Dog.jpg” and “DOG.JPG” all appear to be the same file, they are not considered the same wh
____ [38]
Because of the capitalization; when talking about computer science and programming things have to be very tedious and specific. <span />
5 0
3 years ago
What are several different types of software, which sit in the middle of and provide connectivity between two or more software a
brilliants [131]

Answer:

The answer to the given question is the option "a".

Explanation:

In this question, the answer is "middleware" software because this software works between the operating system and the applications that provide connectivity to two or more software applications. for example database, application server, etc and other choices that are not correct can be described as:

  • In option b, The integration middle wear represents the software of the system. It does not coordinate between operating and application software.
  • In option c, It is used to manage the data and the information for the process.
  • In option d, It includes the hardware, software and the networks. In this hardware and software link for use software.

That's why the answer to this question is the option "a".

6 0
3 years ago
Other questions:
  • Write a sentinel-controlled while loop that accumulates a set of integer test scores input by the user until negative 99 is ente
    8·1 answer
  • What is the result of giving the which utility the name of a command that resides in a directory that is not in your search path
    10·1 answer
  • The entirety of a packet at one layer becoming the payload section at another layer is known as
    8·2 answers
  • A customer reports that recently several files cannot be accessed. The service technician decides to check the hard disk status
    11·1 answer
  • By default, the hyperlink will display the text in the hyperlink itself, such as the web URL. How can this behavior be modified?
    12·1 answer
  • When your purchases are swiped over the bar-code reader at the point-of-sale terminals at Wal-Mart, a _____ records the data.
    8·1 answer
  • Write a Python program stored in a file q1.py to play Rock-Paper-Scissors. In this game, two players count aloud to three, swing
    13·1 answer
  • To light up an LED, you need to connect the cathode leg to one of the Digital Pins and connect the Anode leg to the ……………. on th
    13·1 answer
  • Match the index with the value
    14·1 answer
  • Name the factors which of the following resources relate to :
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!