Question

In: Computer Science

Consider the following simple ingress ACL with three rules: Rule 1. If TCP destination port=80 or...

Consider the following simple ingress ACL with three rules: Rule 1. If TCP destination port=80 or TCP destination port=443, then allow connection. Rule 2. If TCP destination port=25 and IP destination address=60.47.3.35, then allow connection. Rule 3. Disallow ALL connections.

Now answer the following questions:

Why is Rule 2 safer than Rule 1?

Which rule in the ACL represents the default behaviour of SPI firewalls for ingress connection-opening attempts?

Given the above ACL, what would the firewall do with an incoming ICMP echo message? (3.5+3+3.5=10 marks)

Solutions

Expert Solution

If You have Any Query Regarding this please ask in comment section I will be there to solve all your query in comment section immediately hope you will like it


Related Solutions

In a TCP segment, the destination port number tells _____________. A. which computer sent the TCP...
In a TCP segment, the destination port number tells _____________. A. which computer sent the TCP segment. B. which application layer process the packet is from C. the IP address of the source computer D. the IP address of the destination computer E. which application layer process that the packet should be sent to at the destination
-1 Two loop rules and a point rule are created for a simple circuit: 10 -...
-1 Two loop rules and a point rule are created for a simple circuit: 10 - 10I2 - 20I1 = 0 10 - 5I3 - 20I1 = 0 I1 = I2 + I3 I1 represents the current coming from the battery. Assume that all currents are positive. What is the equivalent resistance of the circuit? A. 10.0 ? B. 35.0 ? C. 12.7 ? D. 23.3 ? 1.2 For the situation described by the equations given in the previous question,...
Rule Based System 1. Given the rule following rules from the class notes on production rules...
Rule Based System 1. Given the rule following rules from the class notes on production rules to convert an Arabic number less than 40 to a roman numeral. USING LOGIC Rule 1: if x is null then prompt the user and read x Rule 2: if x is higher than 999 then print “too Big” and make x null Rule 3: if x is between 10 and 39 then print “X” and reduce x by 10 Rule 4: if x...
Respond to one of the following: 1. Consider the following statement: “F.O.B. destination means that title...
Respond to one of the following: 1. Consider the following statement: “F.O.B. destination means that title to the goods will switch to the buyer when goods are shipped.” Do you agree or disagree with the statement? Explain your answer. Also, what is the difference between an F.O.B. shipping point and an F.O.B. destination? Use at least one online reference to support your response. 2. What is the relationship between a purchase requisition and a purchase order? Why would a purchaser...
C program simple version of blackjack following this design. 1. The basic rules of game A...
C program simple version of blackjack following this design. 1. The basic rules of game A deck of poker cards are used. For simplicity, we have unlimited number of cards, so we can generate a random card without considering which cards have already dealt. The game here is to play as a player against the computer (the dealer). The aim of the game is to accumulate a higher total of points than the dealer’s, but without going over 21. The...
Q1)   Convert the following set of BNF rules to a single EBNF rule. <E> --> <E>...
Q1)   Convert the following set of BNF rules to a single EBNF rule. <E> --> <E> + <T> | <E> - <T> | <T> Q2)   Briefly explain how the expected type and actual type of <expr>             in the following two BNF rules are determined: <assign> --> <var> = <expr> (Rule 1) <expr> --> <var> + <var> (Rule 2)
Consider the simple regression model ? = ?0 + ?1? + ?) In the following cases,...
Consider the simple regression model ? = ?0 + ?1? + ?) In the following cases, verify if the ‘zero conditional mean’ and ‘homoscedasticity in errors’ assumptions are satisfied: a. If ? = 9? where ?(?⁄?) = 0, ???(?⁄?) = ? 2 b. If ? = 5.6 + ? where ?(?⁄?) = 0, ???(?⁄?) = 3? 2 c. If ? = 3?? where ?(?⁄?) = 0, ???(?⁄?) = ? 2 2) D. In which of the cases above are we...
Answer the following questions based on HSAB theory. If using Fajans Rules, give the rule number...
Answer the following questions based on HSAB theory. If using Fajans Rules, give the rule number and explain why it applies. 1. Explain why aluminum perchlorate is less soluble than aluminum cyanide. This is unusual since perchorates tend to be very soluble. 2. Explain why the Ksp for FeBr2 is 4.1 x 10–4 and the Ksp for FeF2 is 3.2 x 19–7. 3. Explain why the Ksp for Fe(OH)3 is 1.2 x 10–36 and the Ksp for Fe(OH)2 is 7.8...
Consider a three-member legislature operating under an open rule in which, in contrast to the assumption...
Consider a three-member legislature operating under an open rule in which, in contrast to the assumption in Baron and Ferejohn, once a proposal y has been made any member may be recognized next to either move the previous question or to offer an amendment. a) Characterize the stationary equilibrium in this case. b) For which values of delta is the equilibrium universalistic and for which is it majoritarian?
UDP and TCP use 1s complement for their checksums. Suppose you have the following three 8-bit...
UDP and TCP use 1s complement for their checksums. Suppose you have the following three 8-bit bytes: 01010011, 01100110, 01110100. a) What is the 1s complement of the sum of these 8-bit bytes? (Note that although UDP and TCP use 16-bit words in computing the checksum, for this problem you are being asked to consider 8-bit sums.) b) Why is it that UDP takes the 1s complement of the sum; that is, why not just use the sum? c) With...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT