Securing system using iptable firewall

Assignment Help Computer Engineering
Reference no: EM13835712

Securing system using IPTable firewall

You are required to set up, configure, and test your firewall. You need to do research and reading to be able to complete this assignment.
You have to discuss the main use, limitations, and possible security holes of your firewall and write it in your report. You should test that following packages areinstalled on your machines: SSH and Webserver. Start the services and ensure that they are available for you to do experiment with IPTable Firewall. You should include screen shots in your answers to show the output of your results.

Important:

You need to save copies of all different configurations (for each part) that you have done.(You should include your firewall rules and the results in the report)

Configure your firewall to:

1. Reject all ssh packets.

2. Allow ssh remote connections.

3. Deny ping.

4. Reject all traffic coming to port 80.

5. Block incoming traffic connection to your IP address of your virtual machine.

6. Allow traffic coming to port 80 (inbound) but reject traffic going out (outbound) through port 80.

You then have to:

a. describe in detail how you test 1,2,3,4,5,6 with real practical tests and/or with your gathered information (write it in your report), and

b. discuss the advantages and disadvantages of firewalls with iptables and make suggestions to overcome the disadvantages in your report.

Reference no: EM13835712

Questions Cloud

Identify a management based research problem : Students are to identify a management based research problem from a 2014/2015 online news story. The report should discuss the design of a project that may provide a solution to the problem using a quantitative, qualitative or mixed methods approa..
Developing aggregate capacity requirements : Developing Aggregate Capacity Requirements
Addresses the importance of quality management and measureme : Addresses the importance of quality management and measurement
Is wikileaks a danger to society : Discuss what is WikiLeaks. Is Wikileaks a danger to society or a vital provider of information? You will need to prepare an essay. The essay should introduce the topic, examine the literature, discuss current issues, include case studies and draw a c..
Securing system using iptable firewall : Discuss the advantages and disadvantages of firewalls with iptables and make suggestions to overcome the disadvantages in your report - Start the services and ensure that they are available for you to do experiment with IPTable Firewall.
What is a swott analysis? : What is a SWOTT analysis?
Analyze the reason for the type of organizational structure : Analyze the reason for the type of organizational structure
What is the purpose of strategic objectives : What is the purpose of strategic objectives
What is the application layer protocol involved : What is the full (expanded) address of the abbreviated IPv6 address FDEC::CF:0:FFFF - what is the type of block of the abbreviated IPv6 address

Reviews

Write a Review

Computer Engineering Questions & Answers

  Design program using switch statements in visual basic

design program using switch statements in Visual Basic.

  Define what a cache is and what its purpose

define what a cache is and what its purpose is. Also describe what data gets placed into the cache, and when it is put there.

  When potential new suppliers compete for contracts

The company's newly hired VP of the IT is conducting this project because she does not have a security specialist on her staff and has learned that the company does not have the comprehensive security strategy. In fact, she suspects lack of even b..

  Ientify three key business requirements or needs that the

3. identify three key business requirements or needs that the system must meet of your selected

  1 how big is the mac address space the ipv4 address space

1 how big is the mac address space? the ipv4 address space? the ipv6 address space?nbspnote the size of an address

  What could possibly be used as a key field

I need help with doing some web search research on relational databases and define briefly how such a database works, and basic components.

  Questionmicroprocessor - motorola 68k assembly language1

questionmicroprocessor - motorola 68k assembly language1. hardware an 8 bit printer port is at location 2000. cpu will

  Describenbspthe architectural differences between the

identifynbspa task you perform regularly such as cooking mowing the lawn or driving a car.writenbspa short structured

  How did you find out the dotted quad address that is what

the current ip address standard is 32 bits. ipv6 will increase the address length to 128 bits. an ip socket address is

  Suppose that screen is an ostream iterator initialized

What is the output of the following program segment? (suppose that screen is an ostream iterator initialized to the standard output device to output elements of the type int.)

  Is concept of the process play a meaningful part

It is said that there is a dual definition of what an operating system must do. The first one is to present a "virtual machine" to the user which isolates him/her from bare-bones hardware and is user friendly and effective.

  Evaluate the ethical concerns that information systems

write a 4-5 page research paper in which you present a summary of the issue. express your own opinion or position on

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd