Create a basic firewall using iptables packet filtering

Assignment Help Computer Network Security
Reference no: EM132166021

Objectives

To learn about and create a basic firewall using iptables packet filtering rules under Linux

Background information:

- You will be using iptables under Linux to design a simple firewall.
- Pay close attention to the assigned IP's and subnet masks you are using.
Correct network setup is required for the firewall rules to work properly.

Q1. Document the addresses & masks for each of the interfaces for each machine below.
Put the interface name as well, if you so wish - point is to document to avoid looking it up

- You will need to have IP Forwarding enabled on the firewall (VM1).
- There's a couple of ways of doing this, but only one or two will persist when you restart.
And that's the one I want you to use - research how

Q2. So, how, specifically, did you enable the IP Forwarding feature so that it persists AND is activated it right away?

- You will need to ensure that NO firewall(s) are running on any of the 3 systems
- If one is to ANY degree, it may cause grief - and lost marks - for the WHOLE lab

- You will need to manually add a couple of routes for things to work properly.
- One on the Host O/S to allow it to connect to the 10.20.0.0 network
- Possibly one on VM2 to allow to connect to the Internet (172.16.0.x. network)
- Possibly one on VM1 to allow for connecting back to Internet (172.16.0.x. network)

Hint: you may need to specify the gateway to use in the route entries...
Hint: you will not be able to ping unless *both* machines have their routes set up correctly!

Q3. Document the specific route commands you used to do create routes for each VM, if necessary (3 marks, 1 mark for each VM)

- Test to ensure that you have end-to-end connectivity in your virtual network
- Ping each computer in the virtual LAN from all the other computers.
- Do a traceroute to check that the expected path is being followed.
- Examine the routing table for errors using route -n (windows), or ip route

- Do not proceed until your mini-network is entirely functional end-to-end.
- N.B.: Connectivity outside the lab environment isn't required for this lab. So you do NOT need to get to the "real" Internet, RED or BLUE networks.

Q4. Based on your answers above, explain the difference between DROP and REJECT.

Q5. There are 2 other default chains available for IPTables: INPUT and OUTPUT.
Explain the difference between and purpose of each one of the three chains

Q6. From the host, conduct a simple, quick & simple NMAP portscan of VM2
- Simply to confirm the services/ports expected ARE up and available
- Submit the complete NMAP scan result here, indicating that they are (no underlining)

Q7. Submit your firewall.conf as part of your lab submission. (no underlining)
N.B.: only stateless rules with documentation will receive marks

Q8. Submit the complete NMAP scan result here.

Q9. Run the following tests and fill out the table with the appropriate information below.
Explanations should refer to specific rule in your firewall

Q10. Research and define, in your own words, what the difference(s) are between stateful and packet filtering rules using iptables.

Q11. Place your documented firewall script that meets the above policy criteria here.
N.B.: only stateful rules with documentation will receive marks.

Q12. Submit the populated test plan table as part of your lab submission

Q13. NMAP connect scan from the host to VM1

Q14. NMAP connect scan from the host to VM2

Q15. NMAP udp scan from the host to VM1

Q16. NMAP udp scan from the host to VM2

Q17. NMAP connect scan from the host to VM1

Q18. NMAP connect scan from the host to VM2

Q19. NMAP udp scan from the host to VM1

Q20. NMAP udp scan from the host to VM2

Attachment:- Basic Firewall.rar

Verified Expert

In the filed of networking, firewall place an important role. In the given task there is requirement to configure linux based firewall (firewalld). In the given task there is requirement to setup 2 virtual machine and 1 host machine. Based on the requirement , necessary rules related to ssh, http and ftp has been configured in vm.

Reference no: EM132166021

Questions Cloud

Why is there a need to convert data from one data type : Why is there a need to convert data from one data type to another? Include at least one (1) example in your response.
Research at least eight problems faced by it professionals : Research and outline at least EIGHT problems faced by IT professionals and discuss any FOUR.
Is this character a good person or a bad person-a hero : One of the chapter's questions for "critical viewing" is "Does the character have a rich inner life?"
Tends to be a lot of politics and biased involved : As most Board of Directors are elected by shareholders, there tends to be a lot of politics and biased involved.
Create a basic firewall using iptables packet filtering : CST8230 - how, specifically, did you enable the IP Forwarding feature so that it persists AND is activated it right away - Correct network setup is required
What was your main term course : What was your Main term course? Reflect on the connection between knowledge or concepts from this courses and how those have been or could be applied.
Change the composition of a board of directors : Do you think that most shareholders even research the board of directors of a given company before they make the decision to invest and become a shareholder?
Identify best practices and measures the organization : Propose a possible change in that organization's approach to security that could have prevented the breach/failure for that scenario.
Performance gap-developing tentative acquisition strategy : In your judgment, what is the most challenging aspect of identifying a performance gap and developing a tentative acquisition strategy?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd