You are required to set up, configure, and test your firewall. You need to do research and reading to be able to complete this assignment.
You have to discuss the main use, limitations, and possible security holes of your firewall and write it in your report. You should test that following packages are installed on your machines: SSH and Webserver. Start the services and ensure that they are available for you to do experiment with IPTable Firewall. You should include screen shots in your answers to show the output of your results.
Important:
You need to save copies of all different configurations (for each part) that you have done. (You should include your firewall rules and the results in the report)
Configure your firewall to:
1. Reject all ssh packets.
2. Allow ssh remote connections.
3. Deny ping.
4. Reject all traffic coming to port 80.
5. Block incoming traffic connection to your IP address of your virtual machine.
6. Allow traffic coming to port 80 (inbound) but reject traffic going out (outbound) through port 80.
You then have to:
a. describe in detail how you test 1,2,3,4,5,6 with real practical tests and/or with your gathered information (write it in your report), and
b. discuss the advantages and disadvantages of firewalls with iptables and make suggestions to overcome the disadvantages in your report.
c. discuss the roles and significance of packet filtering, circuit relay and application layer firewalls in building multilayer firewalls. Highlight impact on the network traffic delivery time with the use of multilayer firwalls.
Submission
You should submit your report on the Moodle. The length of the report should be no longer than 10 pages.
Scoring
Question
Score
Description
Content
1 Denial of SSH access
5
Show that ssh packets are rejected
2 Access of SSH service
5
Show that ssh packets are accepted
3 Ping service denial
5
Deny ping
4 Ports 80 denial
10
Show all traffic coming to port 80 is rejected
5 IP address access control
10
Demonstration of Blocking traffic connection to your IP address of your virtual machine
6 Port 80 one way traffic
10
Show that traffic coming to port 80 is allowed but rejected going out through port 80
Subtotal:
45
Subtotal for content
Presentation
Experiment setup in Kali
15
Report should show the detail how you test 1,2,3,4,5,6 with real practical tests and/or with your gathered information
IPTable advantages and disadvantages
15
Include advantages and disadvantages of firewalls with iptables and make suggestions to overcome the disadvantages in your report
Multilayer firewall
15
Roles and significance of packet filtering, circuit relay and application layer firewalls in building multilayer firewalls and impact on delivery of traffic
Spelling, Grammar, Presentation, Style References
10
The presentation’s content is appropriately written in English, with no spelling errors and grammar issues.
The report is well presented, with diagrams, headings, tables and other visual aids.
The report contains appropriate references and referencing style.
Subtotal:
55
Subtotal for presentation
Total:
100
Place your order now for a similar paper and have exceptional work written by our team of experts to guarantee you A Results
Why Choose US
6+ years experience on custom writing
80% Return Client
Urgent 2 Hrs Delivery
Your Privacy Guaranteed
Unlimited Free Revisions
You May Also Like This:
- Wireshark Packet Capture
- The Enterprise Information Security Policy
- Information Security Policy
- Computer Systems Security Foundations
- HTML elements
- Management Information Systems
- Designing infrastructure and security protocols.
- Forensic Psychology: Concealed information under stress
- Implementing Network and Personnel Security Measures
- Usability
- contemporary global security agenda in relation to major events and key theoretical concepts;
- Comparing Homeland Security Research Products
- Computer sciences and Information technology
- Approving weed
- Human Resource Information Systems Technology
- Information Literacy
- Security Policy
- Legal Challenges for Private Security
- How can organizations develop confidence in the security of their networked systems when they have the capability to open their systems to almost any network?
- Examine the history and events that led to the creation of the Department of Homeland Security
- Developing a comprehensive implementation proposal for an information system
- EXPONENTIAL SMOOTHING FORECASTING AND VALUE OF INFORMATION
- Project Information, Organisation and behaviour
- Collection Management and Information ethics for library
- border security in Texas
- Analysis and the current status of security logins to DAMTSC
- Consumer Health Information Website Analysis
- Homeland Security
- computer security
- SQL Security and High Availability