Vous êtes sur la page 1sur 2

Need this or a similar Assignment

Contact: qualityonewriters@gmail.com

Whatsapp/Call: +91-9502220077

Assignment 2: Securing system using IPTable firewall


Due Week 8, Worth 25%

You are required to set up, configure, and test your firewall. You need to do research and reading to
be able to complete this assignment.

You have to discuss the main use, limitations, and possible security holes of your firewall and write it
in your report. You should test that following packages areinstalled on your machines: SSH and
Webserver. Start the services and ensure that they are available for you to do experiment with
IPTable Firewall. You should include screen shots in your answers to show the output of your results.

Important:
You need to save copies of all different configurations (for each part) that you have done.(You
should include your firewall rules and the results in the report)

Configure your firewall to:

1. Reject all ssh packets.

2. Allow ssh remote connections.

3. Deny ping.

4. Reject all traffic coming to port 80.

5. Block incoming traffic connection to your IP address of your virtual machine.

6. Allow traffic coming to port 80 (inbound) but reject traffic going out (outbound) through port 80.

You then have to:

a. discuss the advantages and disadvantages of firewalls with iptables and make suggestions
to overcome the disadvantages in your report.

b. discuss the role and significance of circuit relay firewall in securing communication
byreflecting on the SOCKS package specified in RFC1928 (https://www.ietf.org/rfc/rfc1928.txt) in
200 words.
Submission

You should submit your report on the Moodle. The length of the report should be no longer than 10
pages.

Scoring
Question Score Description
Content
1 Denial of SSH 5 Show that ssh packets are rejected
access
2 Access of SSH 5 Show that ssh packets are accepted
service
3 Ping service denial 5 Deny ping
4 Ports 80 denial 10 Show all traffic coming to port 80 is rejected
5 IP address access 10 Demonstration of Blocking traffic connection to your IP
control address of your virtual machine
6 Port 80 one way 10 Show that traffic coming to port 80 is allowed but rejected
traffic going out through port 80
Subtotal: 45 Subtotal for content
Presentation
Experiment setup in 15 Report should show the detail how you test 1,2,3,4,5,6 with
Kali real practical tests and/or with your gathered information
IPTable advantages 15 Include advantages and disadvantages of firewalls with
and disadvantages iptables and make suggestions to overcome the disadvantages
in your report
Circuit relay firewall 15 Role and significance of circuit relay firewall in securing
communication by reflecting on the SOCKS package specified in
RFC1928 (https://www.ietf.org/rfc/rfc1928.txt) in 200 words.

Spelling, Grammar, 10 The reports content is appropriately written in English, with no


Presentation, Style spelling errors and grammar issues.
References The report is well presented, with diagrams, headings, tables
and other visual aids.
The report contains appropriate references and referencing
style.
Subtotal: 55 Subtotal for presentation
Total: 100

Vous aimerez peut-être aussi