Reference no: EM132418986
Assignment: Securing system using IPTable firewall
You are required to set up, configure, and test your firewall. You need to do research and reading to be able to complete this assignment.
You have to discuss the main uses, limitations, and possible security holes of your firewall and write it in your report. You should test that following packages are installed on your machines: Telnet, MySQL and Apache webserver. Start the services, and test that they are working prior to your experiments with the IPTables firewall. Include screenshots in your answers to show that the services are working and the output of your results to show that the requested filtering is performed.
Important:
You need to save copies of all different configurations (for each part) that you have done. (You should include your firewall rules and the results (screenshots) in the report)
Configure your firewall to:
1. Reject all incoming and outgoing ping packets.
2. Reject all incoming telnet packets and allow all outgoing telnet packets.
3. Reject all traffic coming to MySQL server.
4. Block incoming packets to the IP address of your virtual machine.
5. Allow packets inbound to port 80 (inbound) and reject packets going out (outbound) through port 80.
You then have to:
a. Discuss the advantages and disadvantages of firewalls with iptables and make suggestions to overcome the disadvantages in your report.
Attachment:- Securing system using IPTable firewall.rar
|
Dividend distribution-ryan corporation
: Ryan Corporation began business on March 1, 2016. At that time. it issues 20,000 shares of $60 par value, seven percent cumulative preferred stock
|
|
Why derivatives should be accounted for at historical cost
: Defend and support why the derivatives should be accounted for at historical cost.
|
|
Compute the current yield on both bonds
: Bond A pays $70 annual interest with semiannual payment and has a market value of $800. It has 8 years to maturity.
|
|
Define product difference between similar competitive brands
: Discussion: Product Differentiation, Product differentiation is a strategy that relies on differences in products or processes affecting perceived customer.
|
|
Set up - configure and test firewall
: Discuss the main uses, limitations, and possible security holes of your firewall and write it in your report. You should test that following packages
|
|
Age Care - Aged People and Disabled People
: The purpose of this assessment is for students to reflect and report upon "age care: aged people and disabled people" and present their real-world learnings
|
|
How a hacker can use threat to get sensitive information
: In 250-300 words with 2-3 Refrences, describe a type of email threat and how a hacker can use it to get sensitive information. How can a network administrator.
|
|
Prepare a powerpoint presentation on email forensics
: Prepare a powerpoint presentation on Email Forensics. It is important that you use your own words, that you cite your sources, that you comply with.
|
|
How and why the ads campaigns have changed over time
: How and why the ads campaigns have changed over time -explaining the campaign, who is the target, design and etc,how does that differ from the previous years.
|