Explain why the flag has been set and what it means for this TCP connection

SKU: Ques46 Category:

Identify the IP address of both the client and the server

 

Order Now

Question 1:  Firewall Rule Design

The following diagram shows the topology of the network of a small company. There are three servers located in a DMZ (Demilitarised Zone).

 

The web server can directly accept requests (HTTP or HTTPS) from the Internet or from the internal network.

 

The DNS server can directly accept requests from the Internet. The DNS server can also directly accept requests from the internal network. However, if the DNS server can not resolve a domain name requested by the internal network, it will contact the DNS servers on the Internet directly for the name resolution.

 

On behalf of the users on the internal network, the email server sends emails to and receives emails from the Internet. The users on the internal network use IMAP (Internet E-mail Access Protocol) to read and organize their emails on the email server.

 

The users on the internal network are allowed to access the Internet only for HTTP, HTTPS and FTP services. However, the users of the internal network are never allowed to connect the Internet directly.

dn

 

Based on the above network configuration and application scenarios, answer the following three questions.

A)The firewall services are installed on the router. Create the firewall rules to implement the packet filtering and only allow the specified traffic. The firewall rules are to be created in the following format.

Rule No.Application ProtocolTransport ProtocolSource IPSource PortDestination IPDestination PortAction
1
2
:
:
:

 

B) Briefly explain each rule in the rule base that you have created.

 

C)The proxy services are also installed on the router to conceal the users of the internal network (192.168.1.0/25) from the Internet. Suppose that users on the internal computers send the following requests to the Internet. The proxy services perform the Port Address Translation (PAT). Complete the following connection table to show how PAT is working for requests from the users on the internal network.

Packet Addressing on internal networkPacket Addressing on external network
Source IPSource PortDestination IPDestination PortSource IPSource PortDestination IPDestination Port
192.168.1.21033203.206.209.7780
192.168.1.21035210.10.102.196443
192.168.1.52301203.206.209.5521
192.168.1.52302202.2.59.40443
192.168.1.5412372.5.124.5580
192.168.1.8412872.5.124.3521
192.168.1.81033150.101.16.25080
192.168.1.91035150.101.16.250443

 

Question 2:  PCAP Analysis

For this question, you are to use the extracts from a PCAP file given below.

a.Your task is to annotate each packet commenting on the following characteristics.

  • Comment on any significant TCP flags and what they mean in the context of the packet capture. Significant flags include SYN, FIN, RST, and URG. You must explain why the flag has been set and what it means for this TCP connection.
  • Comment on the direction of each packet (ie. client -> server or server -> client). Be clear to explain in which direction the interaction is occurring.

cab

 

b.Identify the IP address of both the client and the server?

c.What port numbers have been used by each and what is their type?

 

Question 3: Attack and Defence Research

DNS and ARP poisoning attacks are similar; however, there are fundamental differences between the two. You are to research these specific differences contrasting the way the attacks are conducted and some of the countermeasures available. Ensure you use at least three in-text academic references to contrast these attacks (include neither your textbook nor Wikipedia in these references. Failure to do so may not give you marks).

 

Remember that you are not to repeat in your research what DNS and ARP poisoning attacks are. We already know that from our discussions in class. In writing about the differences between the two types of attacks, contrast for example the complexity of the attacks (which one is easy to conduct and why), the impact (consequences) of the attacks, which one is more common and the different mechanisms available to counter the attacks. Write no more than 300 words (about a page including in-text references).

 

 
 

Writing your homework and assignments all on your own is a difficult task. So, Assignments4u has made it easy for students by helping them in writing their assignments. Assignments4u will assist you in completing your tasks, and you can approach us with all your assignment, homework, and essay writing requirements.

We have over 4350+ experienced writers working as experts in different streams of study. Get all your academic doubts clarified and take pride in learning subjects like history, math’s or law. Our assignment help and essay help is available in countries like USA, Australia, New Zealand, Singapore and many more. Get accounting assignment help, corporate nursing assignment help, marketing assignment help or else statistics assignment help in exchange for a nominal price.

Reviews

There are no reviews yet.

Be the first to review “Explain why the flag has been set and what it means for this TCP connection”

Your email address will not be published. Required fields are marked *

Sorry no more offers available

When assignments gets tough, get tougher

Want a fresh solution like this one? 
We are available 24/7
ORDER NOW
0 Shares
Share
Tweet
Pin
+1
Call Back