logo

Securing System Using IP Table Firewall

   

Added on  2023-03-20

9 Pages931 Words74 Views
 | 
 | 
 | 
Running head: SECURING SYSTEM USING IP TABLE FIREWALL
Assignment 2: Securing system using IP Table firewall
Name of the Student
Name of the University
Author’s Note
Securing System Using IP Table Firewall_1

1
SECURING SYSTEM USING IP TABLE FIREWALL
Table of Contents
1. Denial of SSH Access............................................................................................................2
2. Access of SSH Service...........................................................................................................3
3. Ping Service Denial................................................................................................................3
4. Ports 80 denial........................................................................................................................4
5. IP address access control........................................................................................................5
6. Port 80 one way traffic...........................................................................................................5
Advantage and disadvantage of firewalls with iptables.............................................................6
Suggestion for overcoming the disadvantage............................................................................7
Role and significance of circuit relay firewall in securing communication...............................7
Bibliography...............................................................................................................................8
Securing System Using IP Table Firewall_2

2
SECURING SYSTEM USING IP TABLE FIREWALL
1. Denial of SSH Access
root@kali:~# sudo iptables -A INPUT -p tcp -s 192.168.202.132 --dport 22 -j ACCEPT
root@kali:~# sudo iptables -A INPUT -p tcp --dport 22 -j DROP
root@kali:~# sudo iptables-save
# Generated by iptables-save v1.6.1 on Fri May 10 14:17:39 2019
*filter
:INPUT ACCEPT [3:234]
:FORWARD ACCEPT [0:0]
Securing System Using IP Table Firewall_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
System Security with IPTable Firewall
|19
|2526
|13

Securing System for IP Enabled Firewall
|9
|1040
|63

Firewall Rules for Network Security: Accessing, Mitigating Virus Attack, VPN Access, VLAN Access, Blocking RFC 1918
|10
|922
|63

Advanced Network Security: Installation and Configuration Guide for CentOS, Apache, PHP, MySQL, and More
|28
|1536
|248

Network Security Rules
|3
|806
|470

COMP9046 Network Security and Forensics
|25
|528
|129