Explain the design of your firewall

Assignment Help Operating System
Reference no: EM131201245

Firewall (Linux)-

A simple firewall is a filter which blocks the packets based on the pre-defined filter rules. There are two general strategies to set-up a filter. One strategy is restrictive firewall which blocks all packets except those specified. The other is connectivity-based firewall which allows all packets to pass through but blocks those specified. The packets to be allowed to pass through the filter in a restrictive firewall and the packets to blocked in a connectivity-based firewall can be defined case-by-case by the filter rules. The filter rules can be defined by the protocol type, host/network IP-address/name, TCP/UDP port number, interface name, etc. In Linux, the filter rules are set-up and maintained by ipchains or iptables commands (iptables is more powerful than ipchains).

Set-up and test a simple restrictive firewall and a simple connectivity-based firewall in a host. The restrictive firewall should allow the input packets of a (or a few) specific protocol type(s) to pass through the filter and block all the other packets. The connectivity-based firewall should block the input packets of a (or a few) specific protocol type(s) but allow all the other packets to pass through. Log the allowed packets in the restrictive firewall and log the blocked packets in the connectivity-based firewall.

Some notes-

-Consult the man page to find the details of iptables command. Further information is available at www.netfilter.org.

-You may need to clean out any existing filter rules for the assignment and you should clean out what you have set-up after you finish your test. The following is a sample for clean out.

iptables -F INPUT

iptables -P INPUT ACCEPT

iptables -F FORWARD

iptables -P FORWARD ACCEPT

iptables -F OUTPUT

iptables -P OUTPUT ACCEPT

-You may need to set-up the firewall on one machine and use a different machine to send packets to test the firewall.

What to submit:

1 document to explain the design of your firewall (filter rules)

2 sets of shell scripts: one for restrictive firewall and another for connectivity-based firewall. Each set of scripts should contain a script to setup the firewall and a script to test the firewall.

2 logged files from the tests (1 for each firewall). Logged files should include information such as protocol type, source and destination IP addresses and host names, etc.

Reference no: EM131201245

Questions Cloud

How estate planning differ from partnership to a corporation : In terms of minimizing tax liability, how would estate planning differ from a partnership to a corporation?- Draw a conclusion about the purpose for the company's trust based on the research of your company.
What role will technological advancement play in the future : In consideration of the arguments made by Chandler, Enduring Logic of Industrial Success, answer this question: What role will technological advancement play in the future evolution of firms and industries?
Briefly describe your favorite marketing campaign : Word of mouth advertising finds ways to engage consumers so they choose to talk with others about a product, service, or brand. Name a product. As the marketing director for that product, describe what you will do to help stimulate positive word o..
Which would tend to make demand inelastic : Which of the following would tend to make demand INELASTIC? In which of the following econometric problems do we find Durbin-Watson statistic being far away from 2.0?
Explain the design of your firewall : A simple firewall is a filter which blocks the packets based on the pre-defined filter rules. There are two general strategies to set-up a filter. Explain the design of your firewall (filter rules)
Selection of countries using each model : Create a chart that compares and contrasts the theories including the main theorists, a selection of countries using each model, and a summary of where the economic power lies (i.e., people, market, government).
Develop branding strategies for existing and new products : Examine the marketing science of customer behavior and products in the marketing exchange process and create dynamic strategies for competing. Evaluate the basis for market segmentation and approaches to segmentation.
Examples of simple linear regressions : Provide two examples of simple linear regressions we could use in (1) economics and (2) finance. Carefully define the variables you would use as the dependent variable (y) and the explanatory variable (x). Now discuss different types of hypothesis..
Analyze integrated marketing communications : Develop the differentiation strategy in relation to the closest competitor. Establish whether the company's intention is to be a leader or follower within the industry.

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd