Explain the design of your firewall

Assignment Help Operating System
Reference no: EM131201245

Firewall (Linux)-

A simple firewall is a filter which blocks the packets based on the pre-defined filter rules. There are two general strategies to set-up a filter. One strategy is restrictive firewall which blocks all packets except those specified. The other is connectivity-based firewall which allows all packets to pass through but blocks those specified. The packets to be allowed to pass through the filter in a restrictive firewall and the packets to blocked in a connectivity-based firewall can be defined case-by-case by the filter rules. The filter rules can be defined by the protocol type, host/network IP-address/name, TCP/UDP port number, interface name, etc. In Linux, the filter rules are set-up and maintained by ipchains or iptables commands (iptables is more powerful than ipchains).

Set-up and test a simple restrictive firewall and a simple connectivity-based firewall in a host. The restrictive firewall should allow the input packets of a (or a few) specific protocol type(s) to pass through the filter and block all the other packets. The connectivity-based firewall should block the input packets of a (or a few) specific protocol type(s) but allow all the other packets to pass through. Log the allowed packets in the restrictive firewall and log the blocked packets in the connectivity-based firewall.

Some notes-

-Consult the man page to find the details of iptables command. Further information is available at www.netfilter.org.

-You may need to clean out any existing filter rules for the assignment and you should clean out what you have set-up after you finish your test. The following is a sample for clean out.

iptables -F INPUT

iptables -P INPUT ACCEPT

iptables -F FORWARD

iptables -P FORWARD ACCEPT

iptables -F OUTPUT

iptables -P OUTPUT ACCEPT

-You may need to set-up the firewall on one machine and use a different machine to send packets to test the firewall.

What to submit:

1 document to explain the design of your firewall (filter rules)

2 sets of shell scripts: one for restrictive firewall and another for connectivity-based firewall. Each set of scripts should contain a script to setup the firewall and a script to test the firewall.

2 logged files from the tests (1 for each firewall). Logged files should include information such as protocol type, source and destination IP addresses and host names, etc.

Reference no: EM131201245

Questions Cloud

How estate planning differ from partnership to a corporation : In terms of minimizing tax liability, how would estate planning differ from a partnership to a corporation?- Draw a conclusion about the purpose for the company's trust based on the research of your company.
What role will technological advancement play in the future : In consideration of the arguments made by Chandler, Enduring Logic of Industrial Success, answer this question: What role will technological advancement play in the future evolution of firms and industries?
Briefly describe your favorite marketing campaign : Word of mouth advertising finds ways to engage consumers so they choose to talk with others about a product, service, or brand. Name a product. As the marketing director for that product, describe what you will do to help stimulate positive word o..
Which would tend to make demand inelastic : Which of the following would tend to make demand INELASTIC? In which of the following econometric problems do we find Durbin-Watson statistic being far away from 2.0?
Explain the design of your firewall : A simple firewall is a filter which blocks the packets based on the pre-defined filter rules. There are two general strategies to set-up a filter. Explain the design of your firewall (filter rules)
Selection of countries using each model : Create a chart that compares and contrasts the theories including the main theorists, a selection of countries using each model, and a summary of where the economic power lies (i.e., people, market, government).
Develop branding strategies for existing and new products : Examine the marketing science of customer behavior and products in the marketing exchange process and create dynamic strategies for competing. Evaluate the basis for market segmentation and approaches to segmentation.
Examples of simple linear regressions : Provide two examples of simple linear regressions we could use in (1) economics and (2) finance. Carefully define the variables you would use as the dependent variable (y) and the explanatory variable (x). Now discuss different types of hypothesis..
Analyze integrated marketing communications : Develop the differentiation strategy in relation to the closest competitor. Establish whether the company's intention is to be a leader or follower within the industry.

Reviews

Write a Review

Operating System Questions & Answers

  Specify the order in which processes execute

Specify the order in which processes execute and determine the mean process turnaround time for each of the scheduling algorithms.

  Create a wbs for the b&b problem

Create a WBS for the B&B problem Feasibility Analysis Discuss Web-based options with Tom and Sue. Determine if Web-based or stand-alone system.

  Simulate fdisk command for allocating partitioning on a disk

To simulate the FDISK command for allocating partitioning on a disk. Output text file consisting of disk allocation information (device, starting location, ending location, block size, id, file system).

  Operating systems assign a process number

Operating systems assign a process number to every running application program. Can you explain why these process numbers cannot be used instead of port numbers

  Description of semiconductor memory and drams

Q-Prepare a detailed description of semiconductor memory and DRAMS

  Explain how pipelining improves cpu efficiency

Explain how pipelining improves CPU efficiency and What is the potential effect of executing a conditional branch instruction on the efficiency gained by pipelining

  Discuss the merits of adopting busines strategy approach

Compare any other productivity based solutions you may have come across in your readings.

  What is the maximum data transfer rate

What is the storage capacity of the disk? What is the maximum data transfer rate (bytes/second)? What is the maximum rotational delay? What is the transfer time?

  What do you understand by the term addressing structure

What do you understand by the term Addressing structure

  Requirements model for aims project

Need help in finalizing the requirements model for Airlines Information Management System (AIMS) project. The requirements model require to include use case diagrams for the entire AIM system.

  Determine the average seek time of traversed disk

Traversed Disk receives request to access random sector on random track. Suppose head starts at track 0. Determine the average seek time?

  Install a wireless lan network in an organization

Discuss and explain reasons that might make it favorable or unfavorable to install a Wireless LAN network in an organization over a traditional wired network.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd