Computer Networks
Tutorial #16
- What are some of the standard security attacks which The Bad
Guys can make against an Internet-connected computer system?
- What is meant by the term "packet filtering firewall"? Why would
such a device be used? What are some of its limitations? How might
such a device be used in conjunction with a "circuit level gateway"
and what additional security would this provide?
- The firewall examples given in the lecture all assumed a single point
of connection between a business's internal network (or Intranet) and
the outside Internet. How would the situation be complicated if there
were multiple connections?
- You have been asked to configure the Bendigo "gateway" router
r-bgoatm34 to prohibit traffic from subnet 8 (ie, 149.144.8.0)
from crossing the microwave link to Bundoora. Define an access list
(address and mask pair) which will do this, using the syntax from
the lecture.
- The La Trobe "gateway" router blocks connections made to
TCP port 80, except under certain conditions. What are these conditions?
- (Philosophical Question) Discuss some of the legal and ethical
questions alluded to in the last slide of today's lecture.
Practical exercises:
- Do a traceroute from one of the department's Unix systems to a host
outside La Trobe University. Which router do you think is the one which
blocks TCP port 80 connections?
- Many businesses with Internet connections use any or all
of circuit-level gateways, application gateways and
packet filtering firewalls. Can
you discover any? NB: It is regarded as extremely
rude to attempt to establish connections to systems
where they are obviously not wanted. Use lots of caution!
- Look up some firewall-related web sites.
[Previous Tutorial]
[Tutorial Index]
[Next Tutorial]
Phil Scott