Question: 2. Firewall (18 points) SMTP (Simple Mail Transfer Protocol) is the standard protocol for transferring mail between hosts over TCP. A TCP connection is set

 2. Firewall (18 points) SMTP (Simple Mail Transfer Protocol) is the

2. Firewall (18 points) SMTP (Simple Mail Transfer Protocol) is the standard protocol for transferring mail between hosts over TCP. A TCP connection is set up between a user agent and a server program. The server listens on TCP port 25 for incoming connection requests. The user end of the connection is on a TCP port number above 1023. Suppose you wish to build a packet filter rule set allowing inbound and outbound SMTP traffic. You generate the following rule set: Rule Direction Sre Addr Dest Addr Protecol Dest Port Action Permit Permit Permit Permit In Out Out In Either 25 1023 25 1023 External Internal External External Internal Any TCP Internal External Any TCP TCP Any a. Describe the effect of each rule. b. Your host in this example has IP address 172.16.1.1.Someone tries to send e-mail from a remote host with IP address 192.168.3.4. If successful, this generates an SMTP dialogue between the remote user and the SMTP server on your host consisting of SMTP commands and mail. Additionally, assume that a user on your host tries to send e-mail to the SMTP server on the remote system. Four typical packets for this scenario are as shown below. Indicate which packets are permitted or denied and which rule is used in each case. Packet Direction Sre Addr In Out Out 192.168.3.4 172.16.1.1 172.16.1.1 92 168.34 Dest Addr Protocol Dest Port Action 172.16.1.1 192.168.3.4 192.168.34 172.16.1.1 TCP TCP TCP TCP 25 1234 1357 c. Someone from the outside world attempts to open a connection from port 5150 on a remote host (10.1.2.3) to the Web proxy server on port 8080 on one of your local hosts (172.16.3.4) in order to carry out an attack. Typical packets are as below. Will the attack succeed? Provide your explanations Packet Direction Stc Addr 10.1.2.3 172.16.3.4 Dest Addi Protocol Dest PortAction In Out 172.16.3.4 10.1.2.3 TCP TCP 8080 5150

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!