It’s not utilized in the firewall implementation, but it’s

It’s not utilized in the firewall implementation, but it’s a rule… It’s not utilized in the firewall implementation, but it’s a rule number that you may use to monitor a specific rule. Setup-firewall.py does not verify any value for this field. Match traffic and do not give rules precedence in this area, please.   o Block or Allow as an action Traffic that meets the remaining criteria of this rule will be blocked by block rules. As a result, the firewall’s Let rules will override Block rules in order to allow specified traffic through (see below for an example). A string is the entry (Block,Allow). This is the MAC address of the source and the destination. MAC Addresses may be used to identify a specific host. Use to match a certain piece of hardware in the real world. SDN-topology.py defines the MAC address of each host in the network. Network Address in the form of xxx.XXXXXXXXXXX in CIDR notation for the source and destination. A single IP Address (using its IP address and a subnet mask of /32) or a specific Subnet may be matched using this method. An entry might look like this: 10.0.0.1/32. Make certain that the IP Address shown is the Network Address if you’re not using /32 (individual host) as your CIDR mask. Cidr notation is explained in this primer.In an IP Address, the network and host addresses are encoded in 32 bits. Bits are split into four 8-bit chunks for a total of 32. The subnet mask /24 specifies the maximum number of bits in an IP Address that may be used to identify a specific network. 24 bits are used to identify the network and 8 are used to identify a specific host. A network address is defined by the first 24 bits (the 192.168.10), whereas a host address is defined by the last 24 bits (0). (255 hosts). For a /24, the IP must reflect the first 24 bits of the network address. The complete 32 bits of the /32 address are a network address and indicate one host. For each host, an IP address is specified in sdn-topology-py.Protocol is defined by the IANA as an integer IP protocol number (0-254). An IP example is ICMP. Protocol 1 is TCP, Protocol 6 is IP, and so on. An integer is required. Source/Destination Port = IANA Application Port Number if Protocol is TCP or UDP. TCP Port 80, for example, is often used for online traffic. If you want to verify the regulations for this project, the following website is the place to go: https://en.wikipedia.org/wiki/List of TCP and UDP port numbersTo further complicate things, don’t utilize ICMP port numbers to distinguish between various parts of the protocol. You may use this to keep track of the regulations.     In your current position, you work for GT-SDN Corporation, a multinational firm with locations in China, India, and the United Kingdom, which serves as the company’s data center. The following objectives must be achieved by the firewall you build:   • Task 1: You have two active DNS servers on the headquarters network.the older DNS-over-TLS protocol and the more recent UDP protocol)standard). The public DNS service provided by hq1 is available to everyone, whereas the private DNS service provided by hq2 is only accessible to the five business networks (i.e., the US, China, India, UK, and Headquarters network). In order to accomplish such policies, write out a set of firewall rules. (UDP Port 53 and UDP Port 853 are the only ports you should use)   Host hq3 serves as a virtual private network (VPN) server on the headquarters network and links to each of the other sites (hosts us, uk, in, and cn3).VPN server that uses OpenVPN (standard ports – both TCP and UDP Ports 1194). configure the firewall so that only the four remote hosts (us3, uk3, in3, and cn3) may connect to the hq3 OpenVPN server. Other hosts should not be able to connect to the OpenVPN server on hq3 for any reason.   Task 3: Make the Headquarters network accessible through ICMP ping to all other networks across the globe (including from the us, uk, in, and cn networks). Due to firewall implementation constraints, the hq network would be able to ping the us, uk, in, and cn networks from the rest of the globe. Why? What modifications to the implementation requirements may be made so that this is possible?   • Task 4: Ransomware may infiltrate a business network through a remote desktop connection, either via an unsafe version of a browser or by exploiting a vulnerability in the operating system.Microsoft Remote Desktop Protocol (MDP) or Virtual Network Computing (VNC) protocols are both acceptable options for a remote desktop server. A set of rules should be created to prohibit Internet access to the five business networks’ remote desktop servers. us, and the rest of the world to participate 20 remote desktop server on the headquarters network using in and cn When using VNC or Remote Desktop, use TCP Ports 3389 and 5900.   • Task 5: A micro webservice on TCP and UDP Port 8500 handles financial data on hosts us3 and us4. It’s recommended that this service be restricted to hosts uk2, uk3, uk4, uk5, and uk6, as well as in4, in5, us5, and hq5. Use the lowest subnet mask that handles the given hosts in CIDR notation, and keep track of their IP addresses.)   In order to prevent the GRE IP Protocol from entering any of the five corporate networks, complete Task 6. (i.e., the US, China, India, UK, and Headquarters network). Encapsulation protocol GRE is utilized in PPTP-based VPN connections. PPTP-based VPN connections do not use any of the ports you’ve blocked; only the IP protocol does.   #!/usr/bin/pythonPOX-enabled SDN firewall project for CS 6250 Fall 2020# habit-v23-building In order to evaluate your work, this file specifies the topology that will be utilized. YouUsing this file as a template, you may create a slew of different firewall configurations.All of the commands in this section are the same Mininet commands that you used in the previous section.This is a # project. Python 3 has been used to update this document. import from mininet.topo Topoby importing from MiniNet.net MininetImport CPULimitedHost and RemoteController from mininet.node.import custom from mininet.utilTCLink may be imported from mininet.link.Import CLI from mininet.cli into your program. top-level class “FirewallTopo”:”’This class specifies the Mininet Topology for the network utilized in the project. There are a total of a total ofa number of computers and networks: At the top of the food chain (hq1-hq5). 10.0.0.0/24 as a subnetThe American Broadcasting Company (ABC) (us1-us5). 10.1.0.1/24 is the subnet address.Network of India (in1-in5). The 10.0.20.0/24 subnetChina’s Internet (cn1-cn5). The 10.0.30.0/24 subnetThe UK Broadcasting Corporation (uk1-uk5). 10.0.40/10.40.20 To get the IP and MAC addresses of a computer, use the host definitions shown below.”’  In the example above, the cpu is at.1, the bw is at 10, and the latency is at nil.super(FirewallTopo,self). init__() Link setup includes the hostname.Hexagon’s hconfig is set to cpu.configuration = “bw”: bw, “delay”: delay;”> The firewall switch has been created.self.addSwitch(‘s1’) returns s1. Hq1 = self.addHost(“hq1,” “10.0.0.1,” “00:00:00:00:00:1e,” **hconfig) hq1in the self.addHost method, self.addHost(“hq2″;”ip:”10.0.0.2″;”maac”;”**hconfig”) is called.In this case, the value of hq3 is self.addHost(hq3; ip: ‘10.0.0.60’, mac id ’00:00:00:00:02:1e’)addHost(‘hq4′, ip=10.0.0.63, mac: 00:00:00:00:03:1e, **hconfig) hq4 = self.addHostHq5 = self.addHost(“hq5”, “10.0.0.220”, “00:00:00:00:04:1e”, **hconfig) Hq5 =self.addLink(s1,hq1)self.addLink(s1,hq2)self.addLink(s1,hq3)self.addLink(s1,hq4)self.addLink(s1,hq5) mac=’00:00:00:01:00:1e”; self.addHost(“us1″, ip=’10.0.1.1’, **hconfig)”us2” = self.addHost(“us2″, ip=”10.0.1.2″, MAC=”00:00:00 00:02:01:1e”), **hconfigme = self.addHost(“us3”, “10.0.1.33”, “00:00:00:03:02:1e”);self.addHost(‘us4′, ip=’10.0.1.34′, mac=’00:00:00:04:03:1e’, **hconfig)self.addHost(‘us5′, ip=’10.0.1.125′, mac=’00:00:00:05:04:1e’, **hconfig) us5self.addLink(s1,us1)self.addLink(s1,us2)self.addLink(s1,us3)self.addLink(s1,us4)self.addLink(s1,us5) addHost in1 = self.addHost(“in1″, ip=”10.0.20.1″, mac=”00:00:00:06:00:1e”)**hconfig 00:00:00:07:01:1e in2 = self.addHost(“in2,” ip=”10.0.20.2″)**hconfig in3 = self.addHost(“in3″, ip=”10.0.20.3″, mac=”00:00:00:08:02:1e”);**hconfig 00:00:00:09:03:1e in4 = self.addHost(“in4”, “10.0.20.126”)**hconfig 00:00:00:0a:04:1e in5 = self.addHost(“in5”, “10.0.20.125”)self.addLink(s1,in1)self.addLink(s1,in2)self.addLink(s1,in3)self.addLink(s1,in4)self.addLink(s1,in5) **hconfig: cn1 = self.addHost(“cn1,” ip=”10.0.30.1,” mac=”00000000000000000000000000″)to self.addHost(self.addHost, host, ip, mac, **hconfig) cn2 = self.addHostIn this case, the host is cn3 (self.addHost(cn3; ip=’10.0.30.3; mac=’00;00:00;22:00;1e’, **hconfig)).Ip=10.0.30.4, Mac=00:00:00:0e:03:1e; self.addHost(“cn4”, “ip”)cn5 = self.addHost(‘cn5′, ip=’10.0.30.5′, mac=’00:00:00:0f:04:1e’, **hconfiguration)self.addLink(s1,cn1)self.addLink(s1,cn2)self.addLink(s1,cn3)self.addLink(s1,cn4)self.addLink(s1,cn5) Ip=’10.0.40.1′, Mac=’00:00:00:10:00:1e;**hconfig;uk1′, self.addHost(“uk1”);In this example, the host name is “uk2” and the IP address is “10.0.40.128.”Ip=’10.0.40.129′, Mac=’00:00:00:02:02:1e”; **hconfig); uk3 = self.addHost(ip=’10.0.40.130, mac=’00:00:00:03:03:1e”, self.addHost()) uk4In this case, the uk5 host will be added to the self.addHost() function.self.addLink(s1,uk1)self.addLink(s1,uk2)self.addLink(s1,uk3)self.addLink(s1,uk4)self.addLink(s1,uk5) “other1” and “10.0.200.1” are the ip and mac addresses of the other host, respectively.self.addLink(s1,wo1) Defintion:a copy of this text (“Starting Mininet Topology…”)scribble or jot down (“If you see a Unable to Contact Remote Controller, you have an error in your code…”)a copy of this article may be found (“Remember that you always use the Server IP Address when calling test scripts…”)The Firewall Topo (topo) ()Mininet(topo=topo, link=TCLink, controller=RemoteController(“SDNFirewall”), port=6633) is the network. net.start()CLI(net) it’s a yes or no situation:main()  This class specifies the Mininet Topology for the network utilized in the project. The following computers/networks make up this network: At the top of the food chain (hq1-hq5). 10.0.0.1/24 is the subnet address. The American Broadcasting Company (ABC) (us1-us5). The IP address range 10.0.1.0/24 is a subnet. Network of India (in1-in5). The 10.0.20.0/24 subnet China’s Internet (cn1-cn5). The 10.0.30.0/24 subnet The UK Broadcasting Corporation (uk1-uk5). 10.0.40/10.40.202. Using the variable that you just generated in e, divide the inventory into several bands. Beginning at zero, work your way up to thirty-six in steps of six. Establish the database and give it the name “Inventory Usage Ageing.” Select just the PRODCODE, DEPOT, TOTALCOST, and MONTHS fields by clicking the Fields to Include button. The outcome of the stratification should be printed out as a three-dimensional chart, and then the chart should be saved as a pdf file. Take a snapshot of the things that have been in inventory for more than 36 months. How many product lines have an use period that is longer than 36 months?3. Determine how accurate the system is at automatically reordering inventory. You may pick the things you want to look at by using the @BETWEEN function to find those where the quantity is between MIN and MAX. There are three inputs required for the @Between function. The first factor is the area that is being evaluated. The second value represents a low limit for that field, whereas the third value represents a high limit for that field. @Between chooses the things that fall somewhere in the middle of the two limitations. The notation @Between followed by is quite often seen in usage. NOT to identify objects that fall beyond the parameters that have been established.4. Locate products for which an up-to-date selling price has not been recorded. This is known as the CURSELLPRI. Instead of doing an extraction, you should use Criteria.5. Make a column that shows if there has been an increase or drop in the selling prices. Calculate the percentage difference between PREVSELPRI and CURSELPRI. This is the basic calculation. Please refer to it as the PRICE MOV field. However, if PREVESELPRICE is equal to zero, the percentage should be shown as 100. Make a stratification result using this field’s increment of 10, then save it.6. Extract any PRICE MOV values that have a significant variation, such as those that have grown or reduced by a factor of 50 percent. You may determine increases or decreases of more than +50 percent or -50 percent by using the @Abs function. However, exclude the instances in which PREVSELPRI=0.7. Make a new field that can determine the percentage of the profit margin; this is essentially the difference between the CURSELPRI and the AV COST fields. However, if CURSELPRI is equal to zero, the profit margin percentage should be shown as 0Image transcription textGiven the following recursive function:f(0) =1 f(n)=2f(n-1)+2″ n>0Answer 1-4 1. Write a recu… Show more… Show more       Computer Science Engineering & Technology Networking COMP 595

How it works

  1. Paste your instructions in the instructions box. You can also attach an instructions file
  2. Select the writer category, deadline, education level and review the instructions 
  3. Make a payment for the order to be assignment to a writer
  4.  Download the paper after the writer uploads it 

Will the writer plagiarize my essay?

You will get a plagiarism-free paper and you can get an originality report upon request.

Is this service safe?

All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 20% with the discount code ESSAYHELP