Question No

  • Uploaded by: Raymond Glenn
  • 0
  • 0
  • July 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Question No as PDF for free.

More details

  • Words: 686
  • Pages: 4
Firewalls Lab TSIT02 Group member Abdul Jamal Mikael Enberg (Absent on Lab time)

Source IP address

192.168.81.114

Destination IP address 192.168.81.111

Question No: 1 what does the command in 7.6 achieve? The command “ INPUT -m state --state ESTABLISHED -j ACCEPT ” depicts that packets related to alive existing connections, will be allowed. Question No: 2

A list of all the rules you added, preceded by the number of step where

you added it and there are two rules for step 7.11. 7. Allow all outgoing traffic and incoming traffic that is initiated by you, but block anything that you have not started. -A INPUT -s 192.168.81.114 –j ACCEPT -A INPUT –m state –state ESTABLISHED -j ACCEPT 8. Allow yourself access to all your web pages. -A INPUT -s 192.168.81.114 –j ACCEPT 9. Allow everybody access to your public web page. -A INPUT –p tcp --destination-port 80 –j ACCEPT 10. Allow your co-group, but nobody else, access to your internal web page. -A INPUT –s 192.168.81.111 –p tcp –destination-port 8080 –j ACCEPT 11. You do not want employees in your company to spend their time surfing the web from the company computer. Block such access.

-A OUTPUT –p tcp –destination-port 80 –j DROP OR #-A INPUT –p tcp –source-port 80 –j DROP 12. You realise (if you did not think about the complication already in step 11) that now your employees cannot access some necessary internal information. Fix this without violating the goal you should achieve in point 11 above -A OUTPUT –s 192.168.80.111 –d 192.168.80.114 –j ACCEPT Question No: 3 Your final rule list as an appendix. INPUT RULES A INPUT –p tcp –source-port 80 –j DROP -A INPUT –s 192.168.81.111 –p tcp –destination-port 8080 –j ACCEPT -A INPUT –p tcp --destination-port 80 –j ACCEPT -A INPUT -s 192.168.81.114 –j ACCEPT -A INPUT –m state –state ESTABLISHED -j ACCEPT -P INPUT DROP OUTPUT RULES -A OUTPUT –s 192.168.80.111 –d 192.168.80.114 –j ACCEPT -A OUTPUT –p tcp –destination-port 80 –j DROP -P OUTPUT ACCEPT FORWARD RULES -P FORWARD ACCEPT Question No: 4 a. In what way was your computer vulnerable at the start of the session? Initially, there was no firewall configured on the systems at the start of the session, we can access any system and there resources. On the other site any other groups can access anything from our computer because ports on the system were also open and use for communication with no restrictions. So the vulnerability can be avoid by implementing firewall polices and rules b. What unwanted events were protected against at the end of the session? In the end of the session, the whole network secured. Firewall filters all packets, which is coming-in and coming-out from our system. we configure firewall rules on the system, which

block unwanted communications ,data and allow that information we need. we apply restriction on the port and ip address, any one cannot access our secret information without permission. c. Give examples of what a filter firewall cannot protect against? Filter firewall can only protect against that for which it was designed. Firewall can only filter that data which passes through firewall. eg Flashes drive, Magnetic tape. It can offer no shield from internal attacks on local network. Firewall cannot protect well against viruses,spyware which are unknown or new for firewall. d. What is a good basic strategy for setting up a firewall? Motivate! When implementing security for the network of an organization. We first to know all the security threats, which can be accomplish, when we meet to each and every employ in the organization. When we find the all security requirements than it time to apply these on the firewall. e. Give an example of how a different order among the rules in your final list would destroy the expected effect of some rule! Motivate! Change the order between the rules can affect on the result. If the first rule allow the co-group (ip) and block the port 8080 to all others. If order is change, the co-group cannot access this port. The firewall rules will be totally change by changing the order.

Related Documents

Question No
July 2020 1
Question No
June 2020 0
Question
May 2020 22
Question
November 2019 43
Question
November 2019 33
Question
June 2020 8

More Documents from ""

Question No
July 2020 1
20041202-firefox
August 2019 40
Acer Mpc Pricelist
May 2020 19
Microsoft-certification
August 2019 53
Calculus.docx
November 2019 38