ICT 205 Cyber Security: Firewall Setup and Configuration Report

Verified

Added on  2022/10/01

|10
|1961
|27
Report
AI Summary
This report provides a comprehensive overview of firewall configuration, a crucial aspect of network security. It begins with an executive summary highlighting the importance of firewalls in protecting against internet-based threats. The report delves into the introduction of firewalls, differentiating them from Access Control Lists (ACLs), and explores various types of firewalls based on their generations. The discussion section covers the firewall design process, including identifying security needs, developing a comprehensive retreat policy, and classifying acceptable communications. It also examines network architecture for firewalls, detailing how they integrate with routers, proxy servers, and other components. The report then analyzes the advantages and disadvantages of firewalls, emphasizing their role in blocking malicious packets while acknowledging limitations such as their inability to prevent social engineering attacks. Furthermore, the report introduces Kali Linux and UFW, essential tools for penetration testing and firewall management, along with the SUDO command and root access in Kali Linux. The conclusion reiterates the significance of firewalls in protecting against cyber threats. Finally, the report includes a reference list of sources used.
Document Page
Running head: FIREWALL CONFIGURATION
FIREWALL SETUP AND CONFIGURATION
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1FIREWALL CONFIGURATION
Executive Summary:
Firewalls are the elapsed leads in the IoT . Frequently periodic operators connect on the Internet,
entirely unmindful to what is the fashionable behind the prospects. If user firewall does not
provide warnings, operators may not uniformly know it just stationary spiteful code from
running on user method. Defending operator profound data from replicated criminals has become
progressively significant, and the user is indebted it to own self to absorb a bit approximately the
software that’s shielding the user. Deliver on to study how work firewalls, why user requisite
them, and how to select an arrangement that will greatest oblige user requirements.
Document Page
2FIREWALL CONFIGURATION
Table of Contents
Introduction:....................................................................................................................................3
Discussion:.......................................................................................................................................3
Firewall design work:..................................................................................................................3
Network Architecture for Firewall:.............................................................................................4
Advantages and Disadvantages of Firewall:................................................................................5
Kali Linux:...................................................................................................................................5
UFW:...........................................................................................................................................6
SUDO:.........................................................................................................................................6
Root Kali:.....................................................................................................................................7
Conclusion:......................................................................................................................................7
Reference lists:.................................................................................................................................8
Document Page
3FIREWALL CONFIGURATION
Introduction:
A firewall is a network safety method, both hardware and software constructed, which
displays all external and outbound traffic and grounded on a well-defined set of safety
instructions it receives, throwaway or drop that exact traffic. Previously Firewalls, network
safety was accomplished by Access Control Lists (ACLs) exist in routers. ACLs are procedures
that regulate whether network admittance should be arranged or repudiated to exact internet
protocol. However, ACLs cannot restrict the nature of the packet it is spoiling. Also, ACL
unaccompanied cannot keep intimidations out of the network. Hence, the firewall was
familiarizing (Hutchens 2014). There are different types of firewall. Firewalls can be
characterizing established on its generation. Like first-generation, second generation, third
generation and next generations. Five types of firewall are circuit level, stateful inspection,
packet filtering, next-generation, application-level gateways.
Discussion:
Firewall design work:
The five chronological phases to monitor when scheming a firewall contain. At first,
recognize safety necessities for the association. Calculate safety necessities, evaluate security
position and use the material in essential the safety necessities. Express a complete retreat policy.
A strict safety policy comprises system resources, access strategies and approval panels and
confirms that the firewall statements all security supplies. Express a firewall thinking.
Categorizing properties, presentations, and facilities to be threatened in contradiction of
pressures from external the association and insider occurrences varieties it more comfortable to
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4FIREWALL CONFIGURATION
express and arrange the firewall. Categorize acceptable communications (Allen, Herivanto and
Ali 2014). Describe a suitable use procedure to agree to the categories of setup activities such as
presentations that are acceptable and repudiated on the LAN and the Internet Web facilities.
Classify the firewall implementation facts. Defining execution points is ultimate to firewall
design. Firewalls are arranging at the superiority, between the secluded LAN and public web,
such as the Internet. As processes of security, progress a network traffic model outline that
classifies network’s usual traffic decorations. Situation a standard empowers calculating
unbalanced conduct and then locale thresholds to defend against attacks.
Network Architecture for Firewall:
The supreme key feature of a firewall is that it is at the admission argument of the
interacted system it defends. This earnings fundamentally that the firewall is the first sequencer
that obtains and switches received system traffic, and it is the last to grip outbound traffic. A
router on devoted construction to the Internet can be persevering hooked on firewall scheme. It
can also be deliveries with the assistance of a hub for full contact server external firewall. A
router can be constructing with particular sifting rules. However, this router may be retained by
ISP.
Consequently, ISP may be inquired to put all anticipated regulator. On a dial-up service
like an ISDN stroke, a third network card is recycled to deliver a cleaned DMZ. It contributes
full regulator over Internet amenities and still divides them from the consistent network (Javid ,
Riaz and Rasheed 2014). A proxy server can be recovered to observe the traffic on the system
and permitting the operators to a part number of facilities, or some unsolicited amenities may be
blocked. It can be combining with the firewall. A proxy server on administration's LAN linked
with the firewall should have instructions to only permit the proxy server to attach to the Internet
Document Page
5FIREWALL CONFIGURATION
for the facilities it is providing. This way, the operators can get to the Internet only from side to
side the proxy. There are four mutual architectural operations of firewalls. These operations are
screening host firewalls, packet sifting, screened subnet firewalls, dual-homed firewalls and
router.
Advantages and Disadvantages of Firewall:
The crucial problem is not whether to block destructive packets, but was to prevent them.
The separate classification's functioning system-based firewall can be constructed to deliver an
excellent agreement of sanctuary, but a network-based firewall, such as a router, can keep
multiple structures instantaneously.
A firewall cannot avoid operators or aggressors with modems from calling in to or out of
the core network, thus sidestepping the firewall and its fortification entirely. Firewalls cannot
apply user password procedure or avoid misapplication of Password. User password strategy is
decisive in this part since it summaries satisfactory deportment and circles the consequences of
nonconformity (Suh, Park, Lee and Yang 2014). Firewalls are unproductive against nontechnical
safety hazards such as public engineering. Firewalls cannot discontinue inner operators from
retrieving websites with malicious code, creation user instruction life-threatening. Firewalls
cannot defend the user from poor results. Firewalls cannot guard the operators once they retreat
policy is also negligent.
Kali Linux:
Kali Linux is a Debian-based Linux circulation designed at progressive Dissemination
Safety and challenging Inspecting. Kali comprises numerous hundred implements which are
gears near countless material safety responsibilities, such as Dissemination Challenging, Safety
Document Page
6FIREWALL CONFIGURATION
investigation, Computer Forensics and Inverse Engineering (He, Chomsiri, Nanda and Tan
2014). Kali Linux is industrialized, subsidized and preserved by Offensive Security, a significant
information safety training corporation. Kali Linux was unconfined on the 13th March 2013 as a
comprehensive, top-to-bottom restructure of BackTrack Linux, observing entirely too Debian
progress values. Kali Linux is precisely couturier to the wants of infiltration taxing authorities,
and therefore all certification on this site shoulders preceding information of, and understanding
with, the Linux functioning system in overall.
UFW:
The Uncomplicated Firewall is a front end for maximum extensively recycled firewall,
and it is fine contented for host-based firewalls. Ufw provides a framework for handling net
filter, as well as delivers a command-line margin for controlling the firewall (Beggs 2014). It
offers user amicable and easy to practice streak for Linux newbies who are not much using with
firewall ideas. While on the additional side same complicated instructions assistances
superintendents it set convoluted instructions using expertise line interface. The UFW is
upstream for other deliveries such as Linux, Debian and Ubuntu.
SUDO:
Sudo is a contraction of "superuser do" and is a Linux facility that permits agendas to be
implemented as an excellent operator or alternative user. It is fundamentally the Linux
corresponding of the run as the command in Windows. Commands that can be running with
Sudo are definite in a file termed Sudoers in the private folder (Balmer et al. 2014). This file
should the individual be edited using visudo power. Sudo may be constructed to log every
command run. When an operator efforts to appeal Sudo without being registered in the formation
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7FIREWALL CONFIGURATION
file, an exemption suggestion is accessible to the user demonstrating that the struggle has been
chronic. The root user will be notifying via access is verified in the structure record.
Root Kali:
Throughout setting up, Kali Linux permits operators to construct a password for the root
manipulator (Selvi, Sankar and Umarani 2014). But, should the programmer adopt to boot the
live duplicate in its place, the amd64, i386, ARM and VMW descriptions are arranged with the
avoidance origin password – “toor“, deprived of the estimates.
Conclusion:
Lots of people everywhere the world practice the Internet for commercial practice, investigation
and individual practices. If every particular procedure one processor to access the Disposable at
any one time, that is trillions of bytes of data. Persons are at risk of being hacked or diseased
effortlessly by excellent hackers. What can a person do? The explanation is to keep user
workstation exhausting firewalls. Fundamentally, a firewall is an obstruction to preserve
disparaging services absent from a user computer. The additional system strategy is the lower-
level procedure defines how the firewall will necessarily go about confining admittance and
cleaning the facilities that were definitely in the higher-level programmed. Firewalls often
contrivance service admittance strategies that allow particular operator admittance from the
Internet to designate inside hosts, but this contact would be deciding only if essential and only if
it could be mutual with the progressive confirmation.
Document Page
8FIREWALL CONFIGURATION
Reference lists:
Balmer, M.L., Slack, E., De Gottardi, A., Lawson, M.A., Hapfelmeier, S., Miele, L., Grieco, A.,
Van Vlierberghe, H., Fahrner, R., Patuto, N. and Bernsmeier, C., 2014. The liver may act as a
firewall mediating mutualism between the host and its gut commensal microbiota. Science
translational medicine, 6(237), pp.237ra66-237ra66.
He, X., Chomsiri, T., Nanda, P. and Tan, Z., 2014. Improving cloud network security using the
Tree-Rule firewall. Future generation computer systems, 30, pp.116-126.
Selvi, V., Sankar, R. and Umarani, R., 2014. The design and implementation of on-line
examination using firewall security. IOSR Journal of Computer Engineering, 16(6), pp.20-24.
Allen, L., Heriyanto, T. and Ali, S., 2014. Kali Linux–Assuring security by penetration testing.
Packt Publishing Ltd.
Beggs, R.W., 2014. Mastering Kali Linux for advanced penetration testing. Packt Publishing
Ltd.
Hutchens, J., 2014. Kali Linux network scanning cookbook. Packt Publishing Ltd.
Document Page
9FIREWALL CONFIGURATION
Suh, M., Park, S.H., Lee, B. and Yang, S., 2014, February. Building firewall over the software-
defined network controller. In 16th International Conference on Advanced Communication
Technology (pp. 744-748). IEEE.
Javid, T., Riaz, T. and Rasheed, A., 2014, June. A layer2 firewall for software defined network.
In 2014 Conference on Information Assurance and Cyber Security (CIACS) (pp. 39-42). IEEE.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]