logo

Securing System for IP Enabled Firewall

   

Added on  2023-03-17

9 Pages1040 Words63 Views
 | 
 | 
 | 
Running head: INFORMATION SECURITY 1
Information Security
[Author Name(s), First M. Last, Omit Titles and Degrees]
[Institutional Affiliation(s)]
Author Note
[Include any grant/funding information and a complete correspondence address.]
INTRODUCTION
Securing System for IP Enabled Firewall_1

Running head: INFORMATION SECURITY 2
The assignment in this document is on securing system for the IP enabled firewall. In this
assignment, deliverable include the configuration and the testing of our firewall. The assignment
uses IP tables to deliver the task. The second section of the assignment focuses on discussing the
various advantages and disadvantages that normal firewall has over the IP Tables
implementation. The last section provides an overview of a circuit relay firewall, the various
roles it play and the significance it has in overall securing of communication
1. Reject all ssh packages
The command below is used
# iptables –A INPUT –p tcp - -dport ssh –j REJECT
# iptables –A INPUT –p tcp - -dport ssh –j REJECT will reject all ssh packages
Here, two policies get applied, the INPUT and the OUTPUT, the REJECT option will
reject the above policy applied.
# iptables –L is used to show the results as shown in the screenshot below
Securing System for IP Enabled Firewall_2

Running head: INFORMATION SECURITY 3
2. Allow ssh remote connections
Once the reject ssh policy, the following command will be used to allow ssh remote
connection
# iptables –A INPUT –i eth0 –p tcp - -dport ssh –m state - -state NEW, ESTABLISHED
–j ACCEPT
The result below is shown using the command # iptables –L
Securing System for IP Enabled Firewall_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
System Security with IPTable Firewall
|19
|2526
|13

Securing System Using IP Table Firewall
|9
|931
|74

Network Security Rules
|3
|806
|470

COMP9046 Network Security and Forensics
|25
|528
|129

Firewall Rules for Network Security: Accessing, Mitigating Virus Attack, VPN Access, VLAN Access, Blocking RFC 1918
|10
|922
|63

Advanced Network Security: Installation and Configuration Guide for CentOS, Apache, PHP, MySQL, and More
|28
|1536
|248