Explain the design of your firewall

Assignment Help Operating System
Reference no: EM131201245

Firewall (Linux)-

A simple firewall is a filter which blocks the packets based on the pre-defined filter rules. There are two general strategies to set-up a filter. One strategy is restrictive firewall which blocks all packets except those specified. The other is connectivity-based firewall which allows all packets to pass through but blocks those specified. The packets to be allowed to pass through the filter in a restrictive firewall and the packets to blocked in a connectivity-based firewall can be defined case-by-case by the filter rules. The filter rules can be defined by the protocol type, host/network IP-address/name, TCP/UDP port number, interface name, etc. In Linux, the filter rules are set-up and maintained by ipchains or iptables commands (iptables is more powerful than ipchains).

Set-up and test a simple restrictive firewall and a simple connectivity-based firewall in a host. The restrictive firewall should allow the input packets of a (or a few) specific protocol type(s) to pass through the filter and block all the other packets. The connectivity-based firewall should block the input packets of a (or a few) specific protocol type(s) but allow all the other packets to pass through. Log the allowed packets in the restrictive firewall and log the blocked packets in the connectivity-based firewall.

Some notes-

-Consult the man page to find the details of iptables command. Further information is available at www.netfilter.org.

-You may need to clean out any existing filter rules for the assignment and you should clean out what you have set-up after you finish your test. The following is a sample for clean out.

iptables -F INPUT

iptables -P INPUT ACCEPT

iptables -F FORWARD

iptables -P FORWARD ACCEPT

iptables -F OUTPUT

iptables -P OUTPUT ACCEPT

-You may need to set-up the firewall on one machine and use a different machine to send packets to test the firewall.

What to submit:

1 document to explain the design of your firewall (filter rules)

2 sets of shell scripts: one for restrictive firewall and another for connectivity-based firewall. Each set of scripts should contain a script to setup the firewall and a script to test the firewall.

2 logged files from the tests (1 for each firewall). Logged files should include information such as protocol type, source and destination IP addresses and host names, etc.

Reference no: EM131201245

Questions Cloud

How estate planning differ from partnership to a corporation : In terms of minimizing tax liability, how would estate planning differ from a partnership to a corporation?- Draw a conclusion about the purpose for the company's trust based on the research of your company.
What role will technological advancement play in the future : In consideration of the arguments made by Chandler, Enduring Logic of Industrial Success, answer this question: What role will technological advancement play in the future evolution of firms and industries?
Briefly describe your favorite marketing campaign : Word of mouth advertising finds ways to engage consumers so they choose to talk with others about a product, service, or brand. Name a product. As the marketing director for that product, describe what you will do to help stimulate positive word o..
Which would tend to make demand inelastic : Which of the following would tend to make demand INELASTIC? In which of the following econometric problems do we find Durbin-Watson statistic being far away from 2.0?
Explain the design of your firewall : A simple firewall is a filter which blocks the packets based on the pre-defined filter rules. There are two general strategies to set-up a filter. Explain the design of your firewall (filter rules)
Selection of countries using each model : Create a chart that compares and contrasts the theories including the main theorists, a selection of countries using each model, and a summary of where the economic power lies (i.e., people, market, government).
Develop branding strategies for existing and new products : Examine the marketing science of customer behavior and products in the marketing exchange process and create dynamic strategies for competing. Evaluate the basis for market segmentation and approaches to segmentation.
Examples of simple linear regressions : Provide two examples of simple linear regressions we could use in (1) economics and (2) finance. Carefully define the variables you would use as the dependent variable (y) and the explanatory variable (x). Now discuss different types of hypothesis..
Analyze integrated marketing communications : Develop the differentiation strategy in relation to the closest competitor. Establish whether the company's intention is to be a leader or follower within the industry.

Reviews

Write a Review

Operating System Questions & Answers

  Consider a web server with one cpu that serves web requests

Consider a web server with one CPU that serves web requests; each web request requires 3 (time) units of CPU processing and 9 (time) units to read data from disk.

  Web security threats

Think about the given threats to Web security and explain how each is countered by a particular feature of SSL.

  What is sequential flooding of the buffer pool

What is sequential flooding of the buffer pool? Name an important capability of a DBMS buffer manager that is not supported by a typical operating system's buffer manager.

  Find the sizes of the tag, block and word fields

Assume that a computer using direct mapped cache has 2^24 words of main memory and a cache of sixty-four blocks, where each cache block contains sixteen words.

  Demonstrate mastery conceptualizing the problem

Why is this question interesting? Who might care what the results would be - Any other thoughts or ideas you might have regarding this research issue.

  Inventory management systemsyour sister owns a small

inventory management systemsyour sister owns a small clothing store. during a conversation at a family dinner she

  Describe the concept of a signal, and indicate configuration

When a child process is fork()ed, a parent may wait for the successful completion of the child via the wait() service (or one of its variants) so that the return result of that application can be read from the process descriptor block.

  Difference from a firewall to border security

Discuss why is it important for a firm to have firewalls and border security in place? I know that a firewall is to stop intruders from entering your network but when read on it seems border security is very similar.

  Cache access time of 20ns

Given a cache access time of 20ns, a main memory access time of 1000ns, and a cache hit ratio of 90 percent. Assuming fetches to main memory are started in parallel with look-ups in cache

  How to log in and navigate through the operating system

Create a help document for your scenario company that shows how to log in and navigate through the operating system.

  Compute number of disk tracks traversed by using fcfs-sstf

Compute number of disk tracks traversed by using FCFS, SSTF, SCAN, and LOOK algorithms for series of disk track service request given below.

  Jobs can be scheduled partially

Assume that jobs can be scheduled partially, so that a job of value Vi which requires time Ti will receive value, x Vi , if processed only for time, t = x Ti, for a fraction, 0

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd