Assignment 2: Securing system using IPTable firewall…
Assignment 2: Securing system using IPTable firewall Due Week 8, Worth 25%
You are required to set up, configure, and test your firewall. You need to do research and reading to be able to complete this assignment.
You have to discuss the main use, limitations, and possible security holes of your firewall and write it in your report. You should test that following packages are installed on your machines: SSH and Webserver. Start the services and ensure that they are available for you to do experiment with IPTable Firewall. You should include screen shots in your answers to show the output of your results.
Important:
You need to save copies of all different configurations (for each part) that you have done. (You should include your firewall rules and the results (screen shots) in the report)
Configure your firewall to:
1. Reject all
Telnet packets.
2. Allow
Telnet remote connections.
3. Deny
ping.
4. Reject all traffic coming to MySQL server.
5. Block incoming traffic connection to your IP address of your virtual machine.
6. Allow traffic coming to port 80 (inbound) but reject traffic going out (outbound) through port 80.
You then have to:
a. discuss the advantages and disadvantages of firewalls with
iptables and make suggestions to overcome the disadvantages in your report.
Submission
You should submit your report on the Moodle. The length of the report should be no longer than 10 pages.
Assignment 2: Securing system using IPTable firewall Due Week 8, Worth 25% You are required to set up, configure, and test your firewall. You need to do research and reading to be able to complete this assignment. You have to discuss the main use, limitations, and possible security holes of your firewall and write it in your report. You should test that following packages are installed on your machines: SSH and Webserver. Start the services and ensure that they are available for you to do experiment with IPTable Firewall. You should include screen shots in your answers to show the output of your results. Important: You need to save copies of all different configurations (for each part) that you have done. (You should include your firewall rules and the results (screen shots) in the report) Configure your firewall to: 1. Reject all Telnet packets. 2. Allow Telnet remote connections. 3. Deny ping. 4. Reject all traffic coming to MySQL server. 5. Block incoming traffic connection to your IP address of your virtual machine. 6. Allow traffic coming to port 80 (inbound) but reject traffic going out (outbound) through port 80. You then have to: a. discuss the advantages and disadvantages of firewalls with iptables and make suggestions to overcome the disadvantages in your report. Submission You should submit your report on the Moodle. The length of the report should be no longer than 10 pages. Scoring Question Score Description Content 1 Denial of Telnet access 5 Show that Telnet packets are rejected 2 Access of Telnet service 5 Show that Telnet packets are accepted 3 Ping service denial 5 Deny ping 4 Traffic to MySql 10 Show all traffic coming to MySql is rejected 5 IP address access control 10 Demonstration of Blocking traffic connection to your IP address of your virtual machine 6 Port 80 one way traffic 10 Show that traffic coming to port 80 is allowed but rejected going out through port 80 Subtotal: 45 Subtotal for…
Attachments:
Needs help with similar assignment?
We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

