Computer Networks

Tutorial #16

  1. What are some of the standard security attacks which The Bad Guys can make against an Internet-connected computer system?

  2. What is meant by the term "packet filtering firewall"? Why would such a device be used? What are some of its limitations? How might such a device be used in conjunction with a "circuit level gateway" and what additional security would this provide?

  3. The firewall examples given in the lecture all assumed a single point of connection between a business's internal network (or Intranet) and the outside Internet. How would the situation be complicated if there were multiple connections?

  4. You have been asked to configure the Bendigo "gateway" router r-bgoatm34 to prohibit traffic from subnet 8 (ie, 149.144.8.0) from crossing the microwave link to Bundoora. Define an access list (address and mask pair) which will do this, using the syntax from the lecture.

  5. The La Trobe "gateway" router blocks connections made to TCP port 80, except under certain conditions. What are these conditions?

  6. (Philosophical Question) Discuss some of the legal and ethical questions alluded to in the last slide of today's lecture.

Practical exercises:


[Previous Tutorial] [Tutorial Index] [Next Tutorial]
Phil Scott