Reference no: EM132418857
Assignment: Securing system using IPTable firewall
You are required to set up, configure, and test your firewall. You need to do research and reading to be able to complete this assignment.
You have to discuss the main uses, limitations, and possible security holes of your firewall and write it in your report. You should test that following packages are installed on your machines: Telnet, MySQL and Apache webserver. Start the services, and test that they are working prior to your experiments with the IPTables firewall. Include screenshots in your answers to show that the services are working and the output of your results to show that the requested filtering is performed.
Important:
You need to save copies of all different configurations (for each part) that you have done. (You should include your firewall rules and the results (screenshots) in the report)
Configure your firewall to:
1. Reject all incoming and outgoing ping packets.
2. Reject all incoming telnet packets and allow all outgoing telnet packets.
3. Reject all traffic coming to MySQL server.
4. Block incoming packets to the IP address of your virtual machine.
5. Allow packets inbound to port 80 (inbound) and reject packets going out (outbound) through port 80.
You then have to:
a. Discuss the advantages and disadvantages of firewalls with iptables and make suggestions to overcome the disadvantages in your report.
|
What is Guerrilla marketing - what type of media does it use
: Guerrilla Marketing and what type of media does it use and What kind of criticism has the use of Guerrilla Marketing received?
|
|
Analyze the primary and/or secondary data and research
: Analyze the primary and/or secondary data and research-major areas of increase and decrease in revenue or type and/or category of business
|
|
About the benefits of the cloud computing applications
: Even with this great news about the benefits of the cloud computing applications,
|
|
Discuss difference between two similar competitive brands
: For this discussion forum, define the product difference between two similar yet competitive brands (e.g. Coca-Cola and Pepsi, Kleenex and Puffs, Heinz Ketchup.
|
|
Securing system using iptable firewall assignment
: Securing system using IPTable firewall Assignment Help and Solution - Discuss the advantages and disadvantages of firewalls with iptables and make suggestions
|
|
Compute the original cost of the equipment
: On the last day of the fourth year, the equipment was sold for $5000 and resulted in a loss of $7000.
|
|
Discuss about pricing strategies for firms with market power
: Drawing on the material you read about pricing strategies for firms with market power, what can Disney do to sustain its profits while ensuring that it does.
|
|
Computer forensics process
: The computer forensics investigative process includes five steps: Identification, Preservation, Collection, Examination, and Presentation.
|
|
Mkt501-strategic marketing assignment
: MKT501-Strategic Marketing Assignment help and Solutions:-Trident University International Discuss the aspects of the IMC discuss the pros and cons
|