Answered! The following traffic should be allowed (and all others implicitly denied). 1. Every host not in the DMZ should be able query the web server (port 80)….

Answered! The following traffic should be allowed (and all others implicitly denied). 1. Every host not in the DMZ should be able query the web server (port 80).... 1

The following traffic should be allowed (and all others implicitly denied).

Don't use plagiarized sources. Get Your Custom Essay on
Answered! The following traffic should be allowed (and all others implicitly denied). 1. Every host not in the DMZ should be able query the web server (port 80)….
GET AN ESSAY WRITTEN FOR YOU FROM AS LOW AS $13/PAGE
Order Essay

1. Every host not in the DMZ should be able query the web server (port 80). Where do you place this rule? (Which firewalls and which direction)

2. All hosts associated with the company on should be able to establish communications with the IMAP server over SSL (port 993). What IP and port number will you include in the ACL?

3. Hosts satellite LANs should be able to establish communications with the database server (port 66). Write or describe the rule that applies to FW1.

This chart may help.

Direction Source IP Source Port Destination IP Destination Port Protocol Accept/Deny

Expert Answer

 1) Answer:

For this from every servers except DMZ , We need to provide the innound and outbound traffice

Direction SourceIP SourcePort DestinationIP DestinationPort Protocol Accept/Deny
FW3 192.168.15.0/24 80 192.168.17.2 80 HTTP Accept (for inbound direction need to permit Web server FW2
FW2 192.168.17.2/24 80 192.168.15.0 80 HTTP Accept (for outbound traffic need to permit for subnet at FW3
FW4 192.168.16.0/24 80 192.168.17.2/24 80 HTTP Accept (for inbound direction need to permit Web server FW2
FW2 192.168.17.2/24 80 19.168.16.0/24 80 HTTP Accept (for outbound traffic need to permit for subnet at FW4
FW5 192.168.14.0/24 80 192.168.17.2/24 80 HTTP Accept (for inbound direction need to permit Web server FW2
FW2 192.168.17.2/24 80 192.168.14.0/24 80 HTTP Accept (for outbound traffic need to permit for subnet at FW5
FW1 192.169.0.0/16 80 192.168.17.2/24 80 HTTP Accept (for inbound direction need to permit Web server FW2
FW2 192.168.17.2/24 80 192.169.0.0/16 80 HTTP Accept (for outbound traffic need to permit for subnet at FW1

2) Answer:

In this question, I’m giving answer with respect to single firewall direction. Remainig all similar to all firewalls.

FW5(config)#interface fa0/0    (inbound interface toward WAN)

FW5(config-if)#access-group 110 permit out

Command should be follow to make configuration between FW5 & FW2

FW5(config)#access-list 110 permit 192.168.14.0 0.0.0.255 host 192.168.17.1 0.0.0.255 993

FW2(config)#interface fa0/0    (toward interface for FW5)

FW2(config-if)# access-group 110 permit out

FW2(config)# access-list 110 permit host 192.168.17.1 0.0.0.255 192.168.14.0 0.0.0.255 993

Same thing will be applicable for remaing firewalls.

3) Answer:

Traffic towards FW1 must be permitted from Satellite firewalls(FW3&FW4&FW5) for port 66

Now providing the answer for FW3 to FW1 , remaing would be same. In this scenario we try to define the rule at FW1 wrt FW3:

For FW1

FW1(config)#interface fa0/0    (toward interface for FW5)

FW1(config-if)# access-group 110 permit out

FW1(config)# access-list 110 permit host 192.169.0.1 0.0.0.255 192.168.15.0 0.0.0.255 66

At FW2, we need to permit all traffic coming from FW3, FW4, FW5 for both inbound and outbound direction..so that FW2 can pass traffic at both direction..

FW2(config)#access-list 10 permit 192.169.0.0 0.0.0.255 192.168.15.0 0.0.0.255

FW2(config)#access-list 10 permit 192.169.0.0 0.0.0.255 192.168.14.0 0.0.0.255

FW2(config)#access-list 10 permit 192.169.0.0 0.0.0.255 192.168.16.0 0.0.0.255

FW2(config)#interface fa0/0 (interface toward inbound direction)

FW2(config-if)#access-group 10 permit in

FW2(config)#interface fa0/1 (interface toward outbound direction)

FW2(config-if)#access-group 10 permit out

Still stressed from student homework?
Get quality assistance from academic writers!