Rule No. |
Transport |
Source IP |
Source Port |
Destination Port |
Destination IP |
Action |
1 |
TCP |
10.4.10.0 – 10.4.10.255 |
143 |
143 |
142.66.13.10 |
Allow |
2 |
TCP |
Any |
143 |
143 |
142.66.13.10 |
Deny |
3 |
TCP |
Any |
1433 |
1433 |
142.66.13.30 |
Allow |
4 |
TCP |
Any |
1023 |
Any |
142.66.13.20 |
Deny |
5 |
TCP |
142.66.13.10 |
1023 |
Any |
142.66.13.30 |
Allow |
6 |
TCP |
142.66.13.30 |
1023 |
Any |
142.66.13.20 |
Allow |
7 |
TCP |
10.40.10.2 |
1234 |
1234 |
10.4.10.4 |
Allow |
8 |
TCP |
10.40.20.2 |
1234 |
1234 |
10.40.10.3 |
Allow |
9 |
TCP |
10.40.10.3 |
1234 |
1234 |
Any |
Deny |
Explanation of the rules:
Wifi protected access is referred to as WPA and it is an encryption technique used for securing the wireless access point from unauthorized access. It is the revised version of WEP and it uses the TKIP temporal key integrity protocol for the initialization and checking the integrity of the authentication.
WPA can operate with the WEP and increases the security of Access point. There are different version of WPA and the most recent version is the WPA 2 and it uses the CCMP Counter Mode Cipher Block Chaining Message Authentication Code Protocol as the encryption algorithm for authentication and verification of the integrity of the wireless network. There are some vulnerability related to WPA 2 such as unauthorized access of the wireless network where the intruders have the access of the WPS access points. For the removal of the threat the WPS is required to be disabled and increase the security of the network.
The performance of the wireless network depends on different factors such as the range of the access point and the radio frequency of the wireless signals. The antennas are used for the propagation of the radio waves and a transmitter is used for transmitting the radio waves. The transmit power of the antenna should depend on the requirement of the wireless network and the coverage area of the wireless access point is required to be analyzed for the development of the wireless network. The wireless access point is required to be installed in the range of the organization and the obstruction is required to be removed for increasing the efficiency of the wireless network.
RADIUS stands for remote authentication dial in user service and is used for the management of the client server and enabling remote access of the servers for communicating with the central server. Dial up connection is used for the communication and access the resources of the network. It can be used in an organizational network for the management of the database and share it with the remote users for maintaining transparency of the network. The RADIUS servers helps an organization to improve its security and helps to set an organizational policy for the administration of the single point network. It is an industrial standard and can be used for tracking the statistics of the network and review the policy of the network.
For the detection of the rogue access point manually the functionality and the ability of the wireless network is required to be analyzed and if it is found that the wireless access point is unauthorized and connected with the wired network then it is considered as the rogue. On the other hand if the access point is found in the RF environment and not connected with the wired network it is considered as interfering access point. The wireless access point is directly related with the security threats since it is connected with the wired network. An attacker gaining the access of the access point can intrude into the network and cause a threat for the organization. A strong authentication is required to be used for the wireless access point for the mitigation of the threats and increase the security of the network.
Port number 443 is used by the web server for establishment of the HTTPS connection
Symmetric key of a single bit is used for message encoding
Public key of 4 bit is utilized for the creation of a public key cipher and the RSA algorithm is utilized for the cipher and SHA-1 algorithm is utilized for hashing
A certificate is generated on the first node of the virtnet and MyUni website is deployed on the node number 3 and the node 1 is used for the creation of the certificate and uploaded on the 3rd node. The web browser uses the certificates for the establishment of a single session for the users.
A threatening client can without a lot of a stretch out end up being more comfortable with the machine territories of the server and the customer furthermore get data about the range and the time of the clients. On the off chance that the NAT is utilized the mal master would be not skilled get the IP address of C and subsequently, would be not able take after the closeness of the client. The malicious client can in like way track the IP addresses and the region of substitute machines that are conversing with VPN servers.
The virtual private network helps the sender and the receiver to send and receive data utilizing a public network securely. Here the client sends data to the server via n number of routers and different paths can be used for reaching the destination address and vpn can be used for securing the channel of communication and increasing the efficiency of the network solution. A point to point connection is established and different proxy servers are used for the protection of the identity and location address of the server or the client. The routers used in the network connection is required to be configured with tunneling and different service is required to be enabled for increasing the security of the network.
Tor is referred to as a network that can be used for anonymous communication between the world wide network and it can be a software. A network surveillance is required to be traced and analysis of the traffic is required to be performed for the protection of the personal identity of the sender and the receiver. The tor network does not prevent the online service and the application of the onion routing helps to increase the efficiency of the tor. Thee data are encrypted and in the tor network including the IP address of the next node and a virtual circuit is utilized for the decryption of the data and forwarding the data packets in the network.
Anwar, R.W., Bakhtiari, M., Zainal, A., Abdullah, A.H., Qureshi, K.N., Computing, F. and Bahru, J., 2014. Security issues and attacks in wireless sensor network. World Applied Sciences Journal, 30(10), pp.1224-1227.
Biswas, S., Bicket, J., Wong, E., Musaloiu-e, R., Bhartia, A. and Aguayo, D., 2015, August. Large-scale measurements of wireless network behavior. In ACM SIGCOMM Computer Communication Review (Vol. 45, No. 4, pp. 153-165). ACM.
Kavianpour, A. and Anderson, M.C., 2017, June. An Overview of Wireless Network Security. In Cyber Security and Cloud Computing (CSCloud), 2017 IEEE 4th International Conference on (pp. 306-309). IEEE.
Khan, S. and Pathan, A.K., 2013. Wireless networks and security. Berlin: Springer.
Kumar, V., Jain, A. and Barwal, P.N., 2014. Wireless sensor networks: security issues, challenges and solutions. International Journal of Information and Computation Technology (IJICT), 4(8), pp.859-868.
Liang, C. and Yu, F.R., 2015. Wireless network virtualization: A survey, some research issues and challenges. IEEE Communications Surveys & Tutorials, 17(1), pp.358-380.
Liu, J., Lai, Y. and Zhang, S., 2017, March. FL-GUARD: A Detection and Defense System for DDoS Attack in SDN. In Proceedings of the 2017 International Conference on Cryptography, Security and Privacy (pp. 107-111). ACM.
Mukherjee, A., Fakoorian, S.A.A., Huang, J. and Swindlehurst, A.L., 2014. Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys & Tutorials, 16(3), pp.1550-1573.
Pathan, A.S.K. ed., 2016. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press.
Prasad, N.H., Reddy, B.K., Amarnath, B. and Puthanial, M., 2016. Intervlan Routing and Various Configurations on Vlan in a Network using Cisco Packet Tracer. International Journal for Innovative Research in Science and Technology, 2(11), pp.749-758.
Stallings, W. and Tahiliani, M.P., 2014. Cryptography and network security: principles and practice (Vol. 6). London: Pearson.
Tse, A. and Carley, K.M., 2017, July. Event-Based Model Simulating the Change in DDoS Attack Trends After P/DIME Events. In International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation (pp. 120-126). Springer, Cham.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download