Question: Network Security Instructions Questions (Using ACLs): Exercise 1: Study the network diagram carefully and write ACLs for each of the given specifications (requirements). You must
Network Security
Instructions

Questions (Using ACLs):

Exercise 1: Study the network diagram carefully and write ACLs for each of the given specifications (requirements). You must use extended ACLs only when necessary. The ACL must be complete (that is, indicate the router and the interface that you will put it on) and correct (syntactically and must meet the security requirement). Notes: 1. Each of the following specifications is independent of the others. Write the answers to each specification separately. 2. Only a few hosts on each network are shown as examples. There could be other hosts on a particular network that are not shown. For example, on the network 170.16.80.0, there could be other hosts in addition to the one shown, namely, 170.16.80.16. Specifications: a) Prevent all traffic from the workstation 170.16.10.5 from reaching the workstation 170.16.80.16. Traffic from all other hosts/ networks including traffic from outside should be allowed everywhere. b) Traffic from the network 170.16.40.0 must not be allowed on the 170.16.50.0 network. All other traffic must be allowed on 170.16.50.0 as long as it originates from 170.16.0.0 (that is, outside traffic must not be allowed). c) Workstations 170.16.50.75 and 170.16.50.7 should not be allowed HTTP access to the tower box 170.16.70.2. All other workstations can have HTTP access on the tower box. All other traffic including traffic from outside networks are allowed
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
