Question

In: Computer Science

Describe the rules to modify a NAT router to prevent packets with spoofed IP addresses from...

Describe the rules to modify a NAT router to prevent packets with spoofed IP addresses from exiting a private network.

Solutions

Expert Solution

Rules to modify a NAT router to prevent packets with spoofed IP addresses from exiting a private network.

A NAT router uses mapping rules which translates the source and destination other internet or private networks addresses. The rules are used to modify the source addresses and destination addresses of incoming IP packets or outgoing IP packets and then send the packets on.

The NAT rules are also used in redirecting traffic from a port to another prior and at the same time maintaining integrity during redirection or any modification on the packets.

NAT rules which apply to both IPv4 and IPv6

The following syntax should be followed when creating NAT rules for NAT router

1.The rules must begin with one of the commands below:

map it maps one network or one IP address to another network or IP address respectively.

rdr

rdr redirects packets from one part pair and IP address to another port pair and IP address

bimap

bimap establishes bidirectional NAT between internal and external IP addresses.

map-block

Map block establishes static IP based translation and it is based on algorithm which forces addresses to be translated to destination range.

Rule number 2

Interface name such bge0 should follow the commands in rule number 1

Rule number 2

Choose a parameter which will determine the NAT configuration.

Examples of parameters are

ipmask

which designates network mask

dstipmask :

which designates the address which ipmask is translated to and,.

mapport :

which designates udp, tcp protocols within a range of port numbers

map net2 192.168..0/ -> 10.2.0.1/24

Short Answer:

First of all NAT is further understood as a technological characteristics of a router that will translate ip addresses.

The rules that are modified here to prevent packets with a spoofed IP addresses from existing network involves introducing elaborate protocols which are created to contral access of specific identifiable subnets or specific nodes within the network.It further involves restricting certain dubious services like trojans, worms, and other client or server viruses from linking the main server


Related Solutions

Briefly describe the operation of TCP/IP in the process of sending a message from port 3...
Briefly describe the operation of TCP/IP in the process of sending a message from port 3 on host A to port 1 on host B.
Describe the PCAOB’s independence and ethics rules and briefly discuss whether they are different from the...
Describe the PCAOB’s independence and ethics rules and briefly discuss whether they are different from the AICPA rules.
1. List and describe the mechanisms that can reproductively isolate species and prevent them from interbreeding....
1. List and describe the mechanisms that can reproductively isolate species and prevent them from interbreeding. Explain speciation and how it might benefit or harm a population. 2. Describe the various types of fossils and the unique circumstances under which they can form. Next, list and describe conditions that will prevent fossilization. What kinds of organisms are most likely and least likely to be preserved as fossils? Explain how fossils can illustrate the lineage between an ancestor species and its...
Describe 5 health teaching items to prevent them from acquiring cestode infections to be discussed to...
Describe 5 health teaching items to prevent them from acquiring cestode infections to be discussed to the following: a. A group of young professionals who loves sushi and everything raw and Japanese b. A group of fishermen who enjoys kinilaw; who believes that the vinegar and chili are enough to kill any form of infection. c. Association of Dog breeders d. Busy mothers who are informal settlers along Pasig River
Describe the mechanism used by a web application to prevent its session cookies from being used...
Describe the mechanism used by a web application to prevent its session cookies from being used by another web application from a different company.
Describe two mechanisms by which regulatory T cells can prevent helper T cells from becoming activated.
  1. Describe two mechanisms by which regulatory T cells can prevent helper T cells from becoming activated. 2. Summarize the pros and cons of “live” (attenuated) vs. “killed” (inactivated) vaccines.
1. Describe two mechanisms by which regulatory T cells can prevent helper T cells from becoming activated.
  1. Describe two mechanisms by which regulatory T cells can prevent helper T cells from becoming activated. 2. A poison ivy rash is the result of a hypersensitivity reaction. What type of hypersensitivity reaction is this, and how is it generated?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT