Qualified Writers
Rated 4.9/5 based on 2480 reviews

100% Plagiarism Free & Custom Written - Tailored to Your Instructions

An educational institute has a single router, referred to as the gateway router, connecting its internal network to the Internet. The institute has the public address range  and the gateway router has address on its external interface (referred to as interface ifext). The internal network consists of four subnets:

A DMZ, which is attached to interface ifdmz of the gateway router and uses address range

A small network, referred to as shared, with interface ifint of the gateway router connected to three other routers, referred to as staff_routerstudent_router, and

research_router. This network has no hosts attached (only four routers) and uses network address

staff subnet, which is for use by staff members only, that is attached to the staff_router router and uses network address

student subnet, which is for use by students only, that is attached to the student_router router and uses network address

research subnet, which is for use by research staff, that is attached to the research_router router and uses network address

In summary, there are four routers in the network: the gateway router, and routers for each of the staff, student and research subnets. There are five subnets: DMZ, shared, staff, student, and research.

There are two servers in the DMZ that all can accept requests from the Internet: a web server supporting HTTP and HTTPS, and a SMTP email server. Members of the staff, student and research subnets can access the web server; members of the staff subnet only can access the email server but using IMAP.

The gateway router also runs a stateful packet filtering firewall and performs port address translation. In addition to the DMZ setup as described above, security requirements for the educational institute are:

External Internet users cannot access any internal computers (except in DMZ and as stated in other requirements).

Staff, students and researchers can access websites in the Internet.

The researchers (on the research subnet) run a server for sharing data with selected research partners external to the educational institute. That server provides SSH access and a specialised file transfer protocol using TCP and port 1234 to the partners. The server has internal address and NAT is setup on the gateway router to map the public address to the internal address. Currently there are two partner organisations that can access the server, and they have network addresses: and

The professor that leads the research staff also wants access to the data sharing server while they are at home. At home that professor uses a commercial ISP that dynamically allocates IP addresses in the range

Advanced Network Security

Page 2 of 10


Assignment 2

Term 1, 2017

Considering the above information, answer the following questions:

(a)Draw a diagram illustrating the network. Although there may be many computers in the staff, student and research subnets, for simplicity you only have to draw three computers in the staff subnet, three computers in the student subnet and three computers in the research subnet (one of those in the research subnet should be the data sharing server). Label all computers and router interfaces with IP addresses. [3 marks]

(b)Specify the firewall rules using the format as in the table below. You may add/remove rows as needed. After the table, add an explanation of the rules (why you design the firewall rules the way you did). [5 marks]

















































(c)Consider the rule(s) that allows the professor to access from home. Discuss the limitations, and suggest possible solutions. [1 mark]

Marking Scheme

(a)3 marks if correct network is drawn and labelled. 2 marks if some mistakes in location of nodes or links, or allocation of addresses. 0 or 1 mark if multiple mistakes.

(b)If all necessary rules are included, and no unnecessary rules are included, you will receive 5 marks. 0.5 mark will be deducted for an incorrect rule or incorrect explanation of the rule. 0.5 mark will be deducted for a missing rule. 0.5 mark will be deducted for a rule that is included but not needed. The explanation will only be considered if the rules appear wrong or inappropriate.

(c)1 mark if a relevant limitation is described, and a potential solution is relevant. 0.5 mark of limitation or solution is wrong or irrelevant.

Price: £109

100% Plagiarism Free & Custom Written - Tailored to Your Instructions