0% found this document useful (0 votes)
17 views3 pages

Vulnability Assigment

Uploaded by

tnyange909
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views3 pages

Vulnability Assigment

Uploaded by

tnyange909
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

INSTITUTE OF ACCOUNTANCY ARUSHA

FACULTY OF INFORMATICS

INDIVIDUAL ASSIGNMENT

NAME: AUGUSTINO TITUS WIHALE

REGISTRATION NO: BCSe-01-0122-2022

MODULE NAME: VULNALIBILIY ANALYSIS

MODULE CODE: CYU 08102

FACILITATOR: DR. KEFA G

SEMESTER: ONE

ACADEMIC YEAR: 2024/2025

DATE OF SUBMISSION: 31/ Dec/ 2024


Question 1.
Given Data:
1. A. 172.16.0.0 , Subnet Mask: 255.255.0.0
Wildcard Mask = 255.255.255.255 - 255.255.0.0 = 0.0.255.255
2. B. 172.16.1.0, Subnet Mask: 255.255.255.0
Wildcard Mask = 255.255.255.255 - 255.255.255.0 = 0.0.0.255
3. C. 192.168.1.0, Subnet Mask: 255.255.255.0
Wildcard Mask = 255.255.255.255 - 255.255.255.0 = 0.0.0.255
4. D. 172.16.16.0, Subnet Mask: 255.255.240.0
Wildcard Mask = 255.255.255.255 - 255.255.240.0 = 0.0.15.255
5. E. 172.16.128.0, Subnet Mask: 255.255.192.0
Wildcard Mask = 255.255.255.255 - 255.255.192.0 = 0.0.63.255

Final Table:
Network/Subnet Address/Wildcard
Mask Mask

172.16.0.0 / 172.16.0.0 /
255.255.0.0 0.0.255.255

172.16.1.0 / 172.16.1.0 /
255.255.255.0 0.0.0.255

192.168.1.0 / 192.168.1.0 /
255.255.255.0 0.0.0.255

172.16.16.0 / 172.16.16.0 /
255.255.240.0 0.0.15.255

172.16.128.0 / 172.16.128.0 /
255.255.192.0 0.0.63.255

Question 2:
What happens here?
The access control list (ACL) implemented on RouterA filters traffic using the
following rules:
1. Permit traffic from 172.16.30.0/24 to 172.16.50.0/24.
2. Deny all other traffic.
As a result:
 Traffic from 172.16.10.0/24 and 172.16.20.0/24 is denied when
trying to access other networks.
 However, some traffic might bypass filtering due to the lack of
granularity in the standard ACL, particularly when interfaces overlap.

Why is extended ACL better?


Extended ACLs allow filtering traffic based on:
 Source and destination IP addresses.
 Specific protocols (e.g., TCP, UDP, ICMP).
 Ports (e.g., HTTP, FTP, SSH).
For this scenario, an extended ACL could:
 Permit specific traffic between networks.
 Deny unnecessary traffic based on both source and destination.
 Improve security by adding protocol-specific filtering.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy