|Type of paper:||Essay|
|Categories:||Engineering Software Cyber security|
In this case, the bastion hose will serve a unique purpose in the network with a distinctive design and configuration to make sure that it withstands any form of security attack. The bastion host will have fewer applications installed in the computer, only the software firewall which will make sure that the system is designed in such a way that it is hardened. The different rules which will be set will be aimed at making the network more secure (Zhao & Guo, 2018). This is primarily done because the host is located in a demilitarized zone (DMZ), in this case, access from other computers or networks that are untrusted might affect the way that the network.
In the DMZ, the network contains servers which are accessible publicly, a network in this region is isolated from the internal network system, but it is not separated from the public in the outside network. For this reason, there is a need to develop rules to secure the network (Mihalos, Nalmpantis & Ovaliadis, 2019). A firewall system is a system which helps in isolating one network from the other network, in this case, the firewall will carry out packet filtering, proxying of the application layer and controlling the access of the network.
In this case, the firewall will be used to separate the various areas of the network; the following interfaces will be used. An interface for establishing a connection to the internet, this interface will be assigned a low-security level. An interface that will allow the connection of the network to the DMZ, this is the location where the public servers are situated, and the security level that is assigned in this case is medium.
An interface which allows access to the internal network will also be used, the security level that will be assigned in this case will be high. The rules for the firewall in this case include;
- The access of servers from the high-security level, to the low-security level, access is permitted.
- The access of servers from a low-security level to a high-security level, access is denied.
- Access between servers that are within the same security levels, the access, in this case, is denied.
With these rules, the traffic which will be flowing through the firewall will be allowed in cases where:
- Devices which are in the internal network to the DMZ, the remote devices, and the internet.
- Devices that are in the DMZ to the organization's tools and the internet.
The TCP wrappers should be used when there is a need to have access control. The TCP wrappers are used to filter the access that individuals have to the network. For the TCP wrappers to control the access that individuals have to the server, the TCP wrappers will allow the bastion host to be used as a token that will filter the requests of access which are sent to the servers.
The TCP wrappers contain the different configurations that can be used to control the different ways that the server is accessed and the various individuals who can have access to the server (Rahalkar, 2016). In this case, the TCP wrappers can be used in situations where access to the server need to be restricted and access controlled. The access directives handled by the TCP wrappers will allow for the having controlled access of the server.
Mihalos, M. G., Nalmpantis, S. I., & Ovaliadis, K. (2019). Design and Implementation of Firewall Security Policies using Linux iptables. Journal of Engineering Science & Technology Review, 12(1). http://126.96.36.199/downloads/Volume12Issue1/fulltext91212019.pdf
Rahalkar, S. A., (2016). IDSes, Firewalls, and Honeypots. In Certified Ethical Hacker (CEH) Foundation Guide (pp. 161-169). Apress, Berkeley, CA. http://www.academia.edu/download/52426632/Certified_Ethical_Hacker_CEH_Foundation_Guide.pdf
Zhao, Z., & Guo, H. (2018, July). Method for Enforcing Access Control Policies on NCMS. In 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI) (pp. 226-231). IEEE. https://oar.a-star.edu.sg/jspui/bitstream/123456789/2954/3/NCMS-SOLI2018-40.pdf
Cite this page
Paper Example. Harden, a Bastion Host. (2023, Jan 19). Retrieved from https://speedypaper.com/essays/harden-a-bastion-host
If you are the original author of this essay and no longer wish to have it published on the SpeedyPaper website, please click below to request its removal:
- The Development of the Human and Technology. Essay Sample.
- Progressive Relaxation Essay Sample
- Business Essay Example: Organic Food-Boost Juice
- Is Learning Framed In? Education Essay Sample
- Can a Firm Pursuing Transient Advantages in Innovation Be Successful in Competitive Markets?
- Free Paper: Case Studies in Intercultural Conflict and Conflict Management
- Essay Example about Leading Change: Why Transformation Effort Fail