Explain the design of your firewall

Assignment Help Operating System
Reference no: EM131201245

Firewall (Linux)-

A simple firewall is a filter which blocks the packets based on the pre-defined filter rules. There are two general strategies to set-up a filter. One strategy is restrictive firewall which blocks all packets except those specified. The other is connectivity-based firewall which allows all packets to pass through but blocks those specified. The packets to be allowed to pass through the filter in a restrictive firewall and the packets to blocked in a connectivity-based firewall can be defined case-by-case by the filter rules. The filter rules can be defined by the protocol type, host/network IP-address/name, TCP/UDP port number, interface name, etc. In Linux, the filter rules are set-up and maintained by ipchains or iptables commands (iptables is more powerful than ipchains).

Set-up and test a simple restrictive firewall and a simple connectivity-based firewall in a host. The restrictive firewall should allow the input packets of a (or a few) specific protocol type(s) to pass through the filter and block all the other packets. The connectivity-based firewall should block the input packets of a (or a few) specific protocol type(s) but allow all the other packets to pass through. Log the allowed packets in the restrictive firewall and log the blocked packets in the connectivity-based firewall.

Some notes-

-Consult the man page to find the details of iptables command. Further information is available at www.netfilter.org.

-You may need to clean out any existing filter rules for the assignment and you should clean out what you have set-up after you finish your test. The following is a sample for clean out.

iptables -F INPUT

iptables -P INPUT ACCEPT

iptables -F FORWARD

iptables -P FORWARD ACCEPT

iptables -F OUTPUT

iptables -P OUTPUT ACCEPT

-You may need to set-up the firewall on one machine and use a different machine to send packets to test the firewall.

What to submit:

1 document to explain the design of your firewall (filter rules)

2 sets of shell scripts: one for restrictive firewall and another for connectivity-based firewall. Each set of scripts should contain a script to setup the firewall and a script to test the firewall.

2 logged files from the tests (1 for each firewall). Logged files should include information such as protocol type, source and destination IP addresses and host names, etc.

Reference no: EM131201245

Questions Cloud

How estate planning differ from partnership to a corporation : In terms of minimizing tax liability, how would estate planning differ from a partnership to a corporation?- Draw a conclusion about the purpose for the company's trust based on the research of your company.
What role will technological advancement play in the future : In consideration of the arguments made by Chandler, Enduring Logic of Industrial Success, answer this question: What role will technological advancement play in the future evolution of firms and industries?
Briefly describe your favorite marketing campaign : Word of mouth advertising finds ways to engage consumers so they choose to talk with others about a product, service, or brand. Name a product. As the marketing director for that product, describe what you will do to help stimulate positive word o..
Which would tend to make demand inelastic : Which of the following would tend to make demand INELASTIC? In which of the following econometric problems do we find Durbin-Watson statistic being far away from 2.0?
Explain the design of your firewall : A simple firewall is a filter which blocks the packets based on the pre-defined filter rules. There are two general strategies to set-up a filter. Explain the design of your firewall (filter rules)
Selection of countries using each model : Create a chart that compares and contrasts the theories including the main theorists, a selection of countries using each model, and a summary of where the economic power lies (i.e., people, market, government).
Develop branding strategies for existing and new products : Examine the marketing science of customer behavior and products in the marketing exchange process and create dynamic strategies for competing. Evaluate the basis for market segmentation and approaches to segmentation.
Examples of simple linear regressions : Provide two examples of simple linear regressions we could use in (1) economics and (2) finance. Carefully define the variables you would use as the dependent variable (y) and the explanatory variable (x). Now discuss different types of hypothesis..
Analyze integrated marketing communications : Develop the differentiation strategy in relation to the closest competitor. Establish whether the company's intention is to be a leader or follower within the industry.

Reviews

Write a Review

Operating System Questions & Answers

  1 what does it mean to say that a programming language is

1. what does it mean to say that a programming language is machine independent?2. name and describe four different

  List significant differences between the windows and linux

List at least 5 significant differences between the following two OS. Windows, Unix and/or Linux, MAC OS (is actually Unix/Linux style in how it looks, but behaves differently), Other open source and Other closed source.

  Network security principles

Explain a recent high profile computer security issue that you have heard of. Based on basic network security principles, how might the issue have been avoided?

  Why do you think that embedded systems are so popular

Why do you think that embedded systems are so popular? Is it because of how reliable they are? Are they also secure

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Issues with trusted platform modulewrite a research paper

issues with trusted platform modulewrite a research paper discussing the issues with trusted platform module tpm. your

  Differences between a process and a program

During its lifetime a process goes through several different "states". Explain each state and what events cause the state transitions.

  Generate the special login script

Design and implement the disableuser.sh script. Generate the special login script that incorporates the quoted message.

  Discuss technology related ethical issue

Discuss and explain a technology related ethical issue. Determine the issue and its possible outcomes? How can the issue be resolved?

  Determine the value of flags

Suppose if the last operation performed on a computer with an 8-bit word was an addition in which 2-operands were 00000010 and 00000011, determine the value of the following flags?

  Determine the rang of usable ip addresses

Determine the rang of usable IP addresses for the following IP subnet also determine the bradcast address for the subnet?

  What is the value in accumulator b

What will be the value in Accumulator A after the following program is executed

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd