Question

In: Computer Science

Assignment4: Firewall Allow/Block Conflicts Using the information presented in chapter 7, the provided handout (Firewall Limitations),...

Assignment4: Firewall Allow/Block Conflicts

Using the information presented in chapter 7, the provided handout (Firewall Limitations), and the lessons learned from Lab4 to answer the following questions:

  • Discuss types of conflicts that may arise between firewall port ranges and individual port allow/block settings?
  • What are the different types of conflict that you identified from this discussion?

Solutions

Expert Solution

Explanation:

Firewall:

In the computing world, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.

There are different types of firewall which function in different ways – packet-filtering firewalls, application/proxy firewalls, and network address translation. Packet-filtering firewalls operate at the network layer, not allowing packets to pass through the firewall unless they match the established policy rule set. Routers can provide a very common form of packet-filtering firewall.

A network administrator configures the firewall based on the policy, for example blocking and allowing packets based on what protocol they match and which IP address they have as their destination.

In the light of the above discussions, the questions on conflicts arising in firewall are discussed as follows:

Q 1. Discuss types of conflicts that may arise between firewall port ranges and individual port allow/block settings?

Modeling of firewall rule relations is necessary for analyzing the firewall policy and designing management techniques such as anomaly discovery and policy editing.

Although deployment of firewall technology is an important step toward securing our networks, the complexity of managing firewall policies might limit the effectiveness of firewall security. In a single firewall environment, the local firewall policy may include intra-firewall anomalies, where the same packet may match more than one filtering rule.

Therefore, the effectiveness of firewall security is dependent on providing policy management techniques and tools that network administrators can use to analyze, purify and verify the correctness of written firewall filtering rules.

An intra-firewall policy anomaly is defined as the existence of two or more filtering rules that may match the same packet or the existence of a rule that can never match any packet on the network paths that cross the firewall. The types of conflicts in such firewall policy are as follows:

1) Shadowing anomaly:

A rule is shadowed when a previous rule matches all the packets that match this rule, such that the shadowed rule will never be activated.

2) Correlation anomaly:

Two rules are correlated if they have different filtering actions, and the first rule matches some packets that match the second rule and the second rule matches some packets that match the first rule.

3) Generalization anomaly:

A rule is a generalization of a preceding rule if they have different actions, and if the second rule can match all the packets that match the first rule.

4) Redundancy anomaly:

A redundant rule performs the same action on the same packets as another rule such that if the redundant rule is removed, the security policy will not be affected.

5) Irrelevance anomaly:

A filtering rule in a firewall is irrelevant if this rule cannot match any traffic that might flow through this firewall. This exists when both the source address and the destination address fields of the rule do not match any domain reachable through this firewall. In other words, the path between the source and destination addresses of this rule does not pass through the firewall.

Q2. What are the different types of conflict that you identified from this discussion?

As identified in the previous discussion, the different types of conflict are as follows:

1.Shadowing conflict:

Rule a is said to shadow rule b if a has higher-priority than b, a and b specify different actions, and every packet that satisfies b also satisfies a. In shadowing, the two rules are in conflict on every packet that the rules apply to.

2. Correlation conflict:

Rule a and b are correlated if a and b specify different actions and some packets that satisfy a also satisfy b and vice versa. In correlation, the rules conflict on some packets that the rules apply to.

3. Redundancy conflict:

Redundancy occurs in two cases. In the first case, redundancy occurs if two rules a and b are such that all packets that satisfy a satisfy b, a and b specify the same action, and b is higher priority than a. In the second case, redundancy occurs if all packets that satisfy a also satisfy b, a and b specify the same action, a is higher priority than b, and a is not involved in any correlation anomalies. In both cases of redundancy, the lower priority rule will never be applied.

4. Generalization conflict:

Rule a is said to generalize rule b if b has higher priority than a, a and b specify different actions, and every packet that satisfies b also satisfies a. In generalization there is shadowing but the conflict is resolved by the priority.

This concludes the answer to all parts of the question along with the necessary explanations. Please like the answer if it serves your purpose. Thank you.


Related Solutions

International Finance A)     Using the currency tables provided in the International Finance Handout (page 9) in...
International Finance A)     Using the currency tables provided in the International Finance Handout (page 9) in Canvas for July 4, 2014 (Friday’s reported price), convert $100,000 to Indian Rupees. You can choose to use either US $ Equivalent or Currency per US $ B)      Using the currency tables provided in the international Finance Handout (pages 8 and 9) in Canvas for June 6th, 2014 and July 4th, 2014 (Friday’s reported price for each), identify whether the US dollar got stronger...
Fill in the table below, using the information on this handout, based on what is best...
Fill in the table below, using the information on this handout, based on what is best for the client. Jake (age 47) and Sally (age 37) are married and have three children, ages 4, 7, and 10. The W2 table is for the 2019 income tax year. Assume tax laws in 2019 are as described in the textbook. They will file as Married Filing a Joint Return. If no information is given about something, assume zero, e.g., zero contributions to...
Look over Samantha's Handout of Information you were provided above. Similar to how you wrote about...
Look over Samantha's Handout of Information you were provided above. Similar to how you wrote about your goals for your own Diet Analysis, use Samantha's information to answer these questions. Do you think that Samantha's diet is sufficient enough to satisfy her hunger? Suggest FOUR changes in her diet (focus on food groups, nutrients, and other specific categories) Explain how she can make each change (i.e., decrease X, increase Y, etc. and by eating specifically which types of foods -...
Consider the information provided in the following table. Using the additional information provided at the bottom,...
Consider the information provided in the following table. Using the additional information provided at the bottom, calculate the value of the firm using FCFF method.                                                           [15] Year 2019 2020 2021 2022 2023 2024 2025 Total Assets 10000 Fixed Assets 8000 Current assets 2000 Debt 4000 Equity 5000 Current liabilities 1000 Sales 15000 Operating expenses 12000 EBIT 3000 Int 400 PBT 2600 Tax(25%) 650 PAT 1950 For first five years, growth rate is sales in 5% and from sixth year...
Consider the four definitions of information presented in this chapter. The problem with the first definition,...
Consider the four definitions of information presented in this chapter. The problem with the first definition, “knowledge derived from data,” is that it merely substitutes one word we don’t know the meaning of (information) for a second word we don’t know the meaning of (knowledge). The problem with the second definition, “data presented in a meaningful context,” is that it is too subjective. Whose context? What makes a context meaningful? The third definition, “data processed by summing, ordering, averaging, etc.,”...
In Chapter 7 three different stock valuation techniques are presented; the dividend growth model, the free...
In Chapter 7 three different stock valuation techniques are presented; the dividend growth model, the free cash flow model, the market multiple model. While none of these is the most appropriate for every single company, each is useful for determining the value of companies with certain characteristics. Pick a company, any [publicly traded] company, and argue why one of the three models would be most appropriate for your chosen company. Let the arguments begin!
•Calculate the variance analysis for the information provided below using this problem and the formula provided...
•Calculate the variance analysis for the information provided below using this problem and the formula provided to you. Data: Budget Actual Variance Total Payroll Cost $65,600.00 $78,627.50 $13,027.50 Total Nursing Hours 1600 1850 250 Composite Hourly Pay Rate $30.00 $33.00 $3.00 Patient Days 350 375 25 Formulas to use in calculations for variance analysis: Step #1: Compute the Efficiency Variance. Budgeted nursing hours   / Budgeted patient days = HPPD Budgeted Actual nursing hours / Actual patient days = HPPD Actual...
Using the framework presented in this chapter, draft a sample issue-specific security policy for an organization.
Using the framework presented in this chapter, draft a sample issue-specific security policy for an organization. At the beginning of your document, describe the organization for which you are creating the policy and then complete the policy using the framework.
Using one of the three perspectives on war presented in Chapter 19 (realism, pacifism, or just...
Using one of the three perspectives on war presented in Chapter 19 (realism, pacifism, or just war theory), discuss the following famous quotes: "The atom bomb was no 'great decision'...it was merely another powerful weapon in the arsenal of righteousness." - Harry S. Truman "It matters not whether these weapons of ours are humane; if they gain us our freedom, they are justified before our conscience and before our God." - Adolph Hitler
Assignment - Fill in the blanks Use the information provided in Kinn's Chapter 3 "Legal Principles"...
Assignment - Fill in the blanks Use the information provided in Kinn's Chapter 3 "Legal Principles" of the text and/or any other sources you have. Copy and Paste your assignment on a separate MS word document or compatible file, and submit your completed assignment electronically via Moodle prior to due date. Please highlight your answers. Word Pool • implied contract • patient abandonment • insurer • contract • premium • third party • minor • liable • expressed contract •...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT