Run a Firewall Simulation

Question

Run a Firewall Simulation

Follow the instructions below. In a Word document, answer the questions asked along the way. Questions that should be answered are written in italics text. There is no need to structure your paper as an essay (i.e., do not write an introduction or conclusion or arrange your responses in a narrative). Download the firewall visualization tool from the course resources. Unzip the file.

Start the firewall visualization tool by double-clicking on “Firewall Visualization Tool.jar.” Note this tool requires Java to be installed on your computer. The home screen of the tool looks like this:

Choose “no firewall” and click next. On the resulting screen, click the button to continue.

firewall visualization tool - screen 2

Note that the traffic flows from both the cloud and Internet to the client machines. By default, there is no malicious traffic flowing to the machines. Click on the “OS Exploits” option. Eventually, you will see a similar red-colored bug flow from the Internet into the local area network and land on a machine, infecting the machine. Once a machine is infected, it is marked as such with the “international no” emblem. Now you will configure a firewall to prevent such infections. Start a new session by clicking “File | New” in the upper window of the tool. This time, choose the “perimeter firewall” option. The window that comes up will look like this:

firewall visualization tool - screen 3

You now have a firewall between the Internet (represented by a cloud) and your network router. Click the play button and watch what happens. Do you see traffic flowing from the Internet into your system or from your network to the Internet? Explain why or why not. Add some active attacks by clicking on several different options. Are these attacks able to get to your network? Do you feel your system is secure? What’s wrong with this scenario? Configure your firewall to allow traffic to flow in and out of your network. Do this by choosing the “options” tab at the top of the tool and define firewall rules. You should see a screen similar to the one below:

firewall visualization tool - screen 4

Name your firewall rule (typically with a name that focuses on a given subject or attack). The “Source IP” option and port refer to how you want the firewall to recognize a given source IP/port combination and respond. The “Destination IP” is similar but focuses on a destination rule. The goal of any good firewall configuration is to identify legitimate traffic while restricting malicious traffic. Try setting the following firewall rule:

• Rule Name: DNS Rule • Source IP: DNS, Source Port: 53 • Destination IP: Any, Destination port * • Protocol: Any.

Click “Save Rule.” You should now see the rule in your Active Rules box. Click “close” and you should be back to your Network Firewall Visualization Tool window. Click the play button and watch what happens. You may need to move the speed bar to the right for a higher rate of traffic. What traffic now flows through the firewall? Add some active attacks and watch if they flow through the firewall. Would you claim your rule is now sufficient to allow traffic to flow for a typical network? Why or why not? Do any of the active attacks now work against machines behind the firewall? Come up with a series of rules that seem to protect the network from all attacks. Be sure to watch the legitimate traffic denied and malicious traffic permitted in the lower right hand portion of the screen. That should tell you how well your rules are working. How many rules did you have to write to secure your network? Were you able to completely secure the network? What types of rules did you create? Choose “File | New” to restart the program and click “load from file” button. Point the program to the “Firewall Workstation Data File.dat” file. This scenario was configured so that workstations can pass through firewall2 and gain access to the database. Firewall1 has an “allow all traffic” rule set so all information is passed through to the network and from the network to the servers. Write rules to prevent active attacks from passing through firewall1 and attacking the database. Which active attacks are you able to prevent by restricting access on the firewall? Think back to your reading on malicious software attacks and distributed denial of service attacks. Why do you think that these types of attacks are not able to be prevented through the firewall? How might you prevent these attacks from taking place? Close the firewall simulation tool and write up your responses to the questions above in italics.

  Length: 3-5 pages, not including title and reference pages

 

Details
Attachments
Purchase An Answer Below

Have a similar question?