Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Restricting network access It is possible to restrict network access using appli

ID: 3731293 • Letter: R

Question

Restricting network access

It is possible to restrict network access using application-specific configurations, generalized userspace restrictions (e.g., TCP wrappers), host (kernel) level firewalls, and network firewalls.

For a specific application or protocol, implement rules to restrict access at the application, host, and network levels. Verify that your rules are working properly, i.e., that the protocol is being blocked where you think it is being blocked.

Once you've implemented a complete block, implement a partial block (e.g., allow some hosts and restrict other hosts).

Note that while you can do this exercise in a virtual environment, it is probably easier to do it on a regular network you control (e.g., a home network).

Explanation / Answer

Answer)

To restrict the access at the application, host, and network levels (Completely or partially) the following rules are to be followed:

Access policy: This allows the administrator to define with multiple access policies that would check and regulate the users and devices that gets connected to the network.

This is again based on different situations like user profile, device type or the user location.

Concurrent check of endpoint devices: When a user runs on end point devices, it will make a thorough check and validate the software are installed or not and also would also check the devices have updated versions. If any of the compliance checks fails, then access to the network is denied until the appropriate updates are made.

Guest Login and access: At times an application would needs to allow non-employees /users to access the network. There has to accessibility to connect to the corporate network with restricted access for the external users.

Discover all devices and profiling: The increased use of Internet especially in industry verticals like healthcare or manufacturing, a comprehensive view of any and all devices connected to the network is needed. The ability to discover all devices on the network, profiling them is needed and done for the IT administrator to have a global view of what is on the network.

Enforcement: At times unauthorized device or user makes an attempt to connect to the network/application. When this happens, an automatically disconnection to the device is done. There should be an option to enforced isolation of the particular device till a thorough investigation is done to examine if the device was supposed to be authorized and why it was manifested with unauthorized behaviors.

Security Inquiring: As a part of the security checks network access control plays a vital role. A continuous monitoring of the behavior of devices and users on the network with thorough check on logs, flows and packets are a must which in turn would also make the task easy to detect malicious behaviors which would result in ex-filtration, hacking, security bleach by stolen credentials or any other attack on the network infrastructures.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote