Securing system using iptable firewall

Assignment Help Computer Network Security
Reference no: EM13846356

Securing system using IPTable firewall

You are required to set up, configure, and test your firewall. You need to do research and reading to be able to complete this assignment.

You have to discuss the main use, limitations, and possible security holes of your firewall and write it in your report. You should test that following packages areinstalled on your machines: SSH and Webserver. Start the services and ensure that they are available for you to do experiment with IPTable Firewall. You should include screen shots in your answers to show the output of your results.

Important:

You need to save copies of all different configurations (for each part) that you have done.(You should include your firewall rules and the results in the report)

Configure your firewall to:

1. Reject all ssh packets.

2. Allow ssh remote connections.

3. Deny ping.

4. Reject all traffic coming to port 80.

5. Block incoming traffic connection to your IP address of your virtual machine.

6. Allow traffic coming to port 80 (inbound) but reject traffic going out (outbound) through port 80.

You then have to:

a. describe in detail how you test 1,2,3,4,5,6 with real practical tests and/or with your gathered information (write it in your report), and

b. discuss the advantages and disadvantages of firewalls with iptables and make suggestions to overcome the disadvantages in your report.

Environment must be IPTables on Kali Linux

Reference no: EM13846356

Questions Cloud

Current production levels : A mine is for sale. A mining engineer estimates that, at the current production levels, the mine will yield an annual net income of $100,000 for 20 years, after which the mineral will be exhausted. If an investor’s minimum acceptable rate of return i..
What is the equivalent present value : What is the equivalent present value of the following series of payments: $10,000 the first year, $11,000 the second year and $12,000 the third year? Consider 4% interest, compounded annually.
Recommendation to purchase upstart software : Obsolete Computer Systems, Inc. wants to emerge as a major producer of computer software. The company has two options: Either it can purchase Upstart Software for $25m now whose products are expected to survive 5 years. As a member of Obsolete’s boar..
Ppt on child protection in australia : power point presentation is Child protection In Australia
Securing system using iptable firewall : You have to discuss the main use, limitations, and possible security holes of your firewall and write it in your report - discuss the advantages and disadvantages of firewalls with iptables and make suggestions to overcome the disadvantages in your ..
Degree of combined leverage for this japanese firm : Firms in Japan often employ both high operating and financial leverage because of the use of modern technology and close borrower-lender relationships. Assume the Mitaka Company has a sales volume of 130,000 units at a price of $30 a unit; variable c..
Design the ecological pyramid : When researching your selected ecosystem, give special attention to the plant and animals species that inhabit that ecosystem. This information will be used to design the ecological pyramid.
What is the levered value of the equity : Gail's Dance Studio is currently an all equity firm that has 80,000 shares of stock outstanding with a market price of $42 a share. The current cost of equity is 12% and the tax rate is 34%. Gail is considering adding $1 million of debt with a coupon..
About the income statement : The Sterling Tire Company's income statement for 2013 is as follows: Sterling Tire Company. Income Statement

Reviews

Write a Review

Computer Network Security Questions & Answers

  How can this deficiency be addressed

How can this deficiency be addressed? What suggestions would you offer to make more users security competent?

  Importance of presentation and content in presentation

There has been a discussion for years on which is more important, content or presentation. This is very important when thinking about creating a PowerPoint slideshow.

  Analyse security procedures

Analyse security procedures

  Give the security levels top secret-secret and confidential

Give the security levels Top SECRET,SECRET,CONFIDENTIAL, and UNCLASSIFIED (order from highest to lowest), and catergories A, B,C, specify what type of access (read,write, both or neither) is allowed in each of the following situations .

  What is the actual running environment of tool

What is the functionality of the tool and what is the actual running environment (software and hardware) of the tool?

  Information systems security policy

From the e-Activity, discuss how the National Security Telecommunications and Information Systems Security Policy (NSTISSP) national policies facilitate the confidentiality, integrity, authentication, and non-repudiation of computing security

  Identify and prioritize it security controls

Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization

  Identify at least two criminology theories

Motive is one of the main themes that law enforcement must identify in order to prevent future crimes. Law enforcement utilizes the science of criminology to understand criminality and identify potential criminals.  1. Identify at least two criminol..

  Evaluate computer forensic analysis procedures and

computer crime and forensic analysisprovide two examples to distinguish the difference between what is considered a

  Cyber terrorism & information warfare

Risk Management, IT Related Risks, Radio Frequency Identification (RFID), Easy listing of special programs,  Social Engineering

  Computer security for your company

Present a brief summary of the arguments for and against outsourcing computer security for your company. Select two firms that offer computer security outsourcing services, and compare them and their services. Include several pros and cons of each

  Personal and business-related cybersecurity scenarios

Analyze personal privacy issues related to various personal and business-related cybersecurity scenarios - Describe the mission of each, and examine and compare details of each stated privacy policy.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd