Add the linux firewall rules to enforce the protection

Assignment Help Computer Engineering
Reference no: EM132182763

Discussion Question :

You have a web server running on port 8888 in a Linux computer, but without any firewall rules in place for protection.

Now, you want to use iptables to protect the website so that only computers from address 172.90.0.0/16 but excluding 172.90.255.0/24 can access the web server.

Show the commands of iptables that add the Linux firewall rules to enforce the protection.

Reference no: EM132182763

Questions Cloud

Fourth branch of government : The Constitution makes no reference to a bureaucracy, and yet presidents have been generally powerless at their efforts to reform the structure and operation
Process of each party nominating : Which collective dilemma among members of a political party in the electorate is most clearly resolved by the process of each party nominating a single
Describe some problems that might arise in a group project : Describe some problems that might arise in a group project and suggest one or more strategies for dealing with those problems.
Calculate the reorder point : The $8 carrying cost per jersey per year consists of the required return on investment of $5.00, Calculate the reorder point
Add the linux firewall rules to enforce the protection : You have a web server running on port 8888 in a Linux computer, but without any firewall rules in place for protection.
Good for a a long research paper : What are some ethical issue topics, in business, good for a a long research paper?
Presidential primary and a caucus : What is meant by the term "coattail effect"? What is the difference between a presidential primary and a caucus?
Record the transactions starting of a general journal : M. Maxwell owns a retail business and made sales on account during the month of July 20--. Record transactions starting on page 15 of a general journal
Watch the show one evening and note the amounts : In other words, assume each contestant will spin the wheel on an average of 3 times before either hitting Bankrupt, Loose a Turn or not guessing a letter.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What speed transmission line is necessary

What speed transmission line is necessary to support either type of connection? Show all your work.

  Create an initial researched and cited discussion response

Create an initial researched and cited discussion response early in the week about the topic you choose and follow with at least two researched.

  Elaborate a flow diagram of a sand casting process

Elaborate a flow diagram of a sand casting process - Construct the FMEA Chart for the sand casting process.

  How would investigte the likely behaviour of such a system

Consider a 68000 system with n peripherals capable of generating a vectored interrupt. Suppose the ith peripheral generates a level /, interrupt request.

  Identify the quality attributes the system will need

Identify the quality attributes this system will need for its architecture. Construct a matrix of quality attributes (nonfunctional requirements) that you've identified.

  Define the newton method

Automate the switch from steepest descent to Newton in ShowMixed. Cross over when the reduction in sep(t) is less than 1% as a result of a steepest descent.

  Write the code and create the requisite submission files

Display the menu and then execute the user's choice. Keep displaying the menu (and executing the user's choice) until the user chooses Option 5.

  Discuss the relevance of information security standards

Discuss the relevance of information security standards in the context of implementing effective IS security in an organisation

  What was fingerprint generated with kleopatra certificate

What was the fingerprint generated with your Kleopatra certificate? What key type was used to create the certificate on Kleopatra? What other types of encryption key types are possible?

  Discuss about cyber security and risk management

Base on your article review and the assigned reading, discuss the relationship between cyber security and risk management.

  What type of sampling technique will you use and why

What type of sampling technique will you use and why? What may be the demographic characteristics of your sample? Identify potential data collection techniques and justify your choice.

  Calculate her encrypted pair

What are the original plaintext and signature? Is this a valid message signature pair?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd