Section 3: iptables Firewall Configuration Step 1: From Netlab, access your Linux Server 2. You will...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Section 3: iptables Firewall Configuration Step 1: From Netlab, access your Linux Server 2. You will use this vm in this section to test connectivity over the network to your Linux Server 1. Login as student on Linux2, the password will be student. Step 2: From Linux2 use the ip addr command to determine the IP address of this machine. Do the same for Linux1. Question 3.1: What is the IP address of the network interface on Linux1? Question 3.2: What is the IP address of the network interface on Linux2? Step 3: From Linux2, verify that you can ping Linux1's IP address. Then use the curl command again, but instead of directing it at localhost, use the IP address of Linux1. You will see some response, like what you saw in in the previous section of this lab. Step 4: From Linux2, ssh to Linux1 as student. You can do this by using the following command: ssh student@X.X.X.X (replacing X.X.X.X with the Linux1 IP address). You will receive a security warning when you connect for the first time, this is normal. Take a screenshot showing that this worked successfully and paste it below. Step 5: Terminate your ssh session by typing exit. Then use the Netlab interface to move back over to Linux1. From Linux1 use the command sudo iptables -L to list all the firewall rules that are currently Step 6: Create your own set of iptables rules based on the criteria below. Use the lecture slides as a reference if needed to develop your rules. Apply them on your Linux Server 1 only. Craft rules for both the INPUT and OUTPUT chains to account for return traffic where necessary: 1. Deny all traffic to and from 34.87.95.12. 2. Deny all traffic to and from HTTP on your Linux1 server. 3. Deny all ICMP traffic to and from 192.168.150.0/24. 4. Permit SSH from the IP address of your Linux2 machine to Linux1 and permit the return traffic. Deny all other SSH traffic to and from your Linux 1 server. 5. 6. Permit DNS from your server to 8.8.8.8, also permit the return traffic. 7. lp. Question 3.5: What iptables command(s) did you use to meet criteria 1 from the list above? Question 3.6: What iptables command (s) did you use to meet criteria 2 from the list above? Question 3.7: What iptables command(s) did you use to meet criteria 3 from the list above? Question 3.8: What iptables command(s) did you use to meet criteria 4 from the list above? Question 3.9: What iptables command(s) did you use to meet criteria 5 from the list above? Question 3.10: What iptables command(s) did you use to meet criteria 6 from the list above? Question 3.11: What iptables command(s) did you use to meet criteria 7 from the list above? Step 7: With your rules applied on Linux1, use Netlab to access Linux Server 2 again. Try to use the curl command again as you did earlier in this section. It should no longer work. Question 3.12: Why can you no longer see Linux Server 1's webpage from Linux Server 2? Step 8: ssh from your Linux Server 2 machine to your Linux Server 1 machine again. If your rules are configured correctly, this will work. Once connected, run the command iptables -L. Include a screenshot showing both your ssh command and the iptables command output. Step 9: For the next step you will insert new rules into the existing iptables chains on Linux1. In order to do that you will need to know the line numbers of each of the configured rules in your iptables chains. Question 3.13: What iptables command can you use to view your rules with the line numbers included? Include a screenshot below of the output of the command you used to answer the previous question Step 10: Now you will insert rules into your existing rules, rather than just append to the end of the rules as in previous steps. Figure out what iptables flag can be used to insert a rule, then craft the commands to insert the following rules: 1. Permit HTTP traffic from the IP address of your Linux2 server O Insert this rule above your INPUT rule blocking all other HTTP traffic 2. Permit the return traffic to the IP address of your Linux2 server O Insert this rule above your OUTPUT rule blocking all other HTTP traffic Question 3.14: What iptables flag did you use to insert your rules? Question 3.15: What iptables command(s) did you use to meet criteria 1 from the list above? Question 3.16: What iptables command(s) did you use to meet criteria 2 from the list above? Include a screenshot below of the output of sudo iptables -L when you have all your rules applied. Step 11: With your rules applied on Linux1, use Netlab to access Linux2 again. Try to use the curl command again as you did earlier in this section. It should work this time. Question 3.17: Why does this work now after applying your new rules? Section 3: iptables Firewall Configuration Step 1: From Netlab, access your Linux Server 2. You will use this vm in this section to test connectivity over the network to your Linux Server 1. Login as student on Linux2, the password will be student. Step 2: From Linux2 use the ip addr command to determine the IP address of this machine. Do the same for Linux1. Question 3.1: What is the IP address of the network interface on Linux1? Question 3.2: What is the IP address of the network interface on Linux2? Step 3: From Linux2, verify that you can ping Linux1's IP address. Then use the curl command again, but instead of directing it at localhost, use the IP address of Linux1. You will see some response, like what you saw in in the previous section of this lab. Step 4: From Linux2, ssh to Linux1 as student. You can do this by using the following command: ssh student@X.X.X.X (replacing X.X.X.X with the Linux1 IP address). You will receive a security warning when you connect for the first time, this is normal. Take a screenshot showing that this worked successfully and paste it below. Step 5: Terminate your ssh session by typing exit. Then use the Netlab interface to move back over to Linux1. From Linux1 use the command sudo iptables -L to list all the firewall rules that are currently Step 6: Create your own set of iptables rules based on the criteria below. Use the lecture slides as a reference if needed to develop your rules. Apply them on your Linux Server 1 only. Craft rules for both the INPUT and OUTPUT chains to account for return traffic where necessary: 1. Deny all traffic to and from 34.87.95.12. 2. Deny all traffic to and from HTTP on your Linux1 server. 3. Deny all ICMP traffic to and from 192.168.150.0/24. 4. Permit SSH from the IP address of your Linux2 machine to Linux1 and permit the return traffic. Deny all other SSH traffic to and from your Linux 1 server. 5. 6. Permit DNS from your server to 8.8.8.8, also permit the return traffic. 7. lp. Question 3.5: What iptables command(s) did you use to meet criteria 1 from the list above? Question 3.6: What iptables command (s) did you use to meet criteria 2 from the list above? Question 3.7: What iptables command(s) did you use to meet criteria 3 from the list above? Question 3.8: What iptables command(s) did you use to meet criteria 4 from the list above? Question 3.9: What iptables command(s) did you use to meet criteria 5 from the list above? Question 3.10: What iptables command(s) did you use to meet criteria 6 from the list above? Question 3.11: What iptables command(s) did you use to meet criteria 7 from the list above? Step 7: With your rules applied on Linux1, use Netlab to access Linux Server 2 again. Try to use the curl command again as you did earlier in this section. It should no longer work. Question 3.12: Why can you no longer see Linux Server 1's webpage from Linux Server 2? Step 8: ssh from your Linux Server 2 machine to your Linux Server 1 machine again. If your rules are configured correctly, this will work. Once connected, run the command iptables -L. Include a screenshot showing both your ssh command and the iptables command output. Step 9: For the next step you will insert new rules into the existing iptables chains on Linux1. In order to do that you will need to know the line numbers of each of the configured rules in your iptables chains. Question 3.13: What iptables command can you use to view your rules with the line numbers included? Include a screenshot below of the output of the command you used to answer the previous question Step 10: Now you will insert rules into your existing rules, rather than just append to the end of the rules as in previous steps. Figure out what iptables flag can be used to insert a rule, then craft the commands to insert the following rules: 1. Permit HTTP traffic from the IP address of your Linux2 server O Insert this rule above your INPUT rule blocking all other HTTP traffic 2. Permit the return traffic to the IP address of your Linux2 server O Insert this rule above your OUTPUT rule blocking all other HTTP traffic Question 3.14: What iptables flag did you use to insert your rules? Question 3.15: What iptables command(s) did you use to meet criteria 1 from the list above? Question 3.16: What iptables command(s) did you use to meet criteria 2 from the list above? Include a screenshot below of the output of sudo iptables -L when you have all your rules applied. Step 11: With your rules applied on Linux1, use Netlab to access Linux2 again. Try to use the curl command again as you did earlier in this section. It should work this time. Question 3.17: Why does this work now after applying your new rules?
Expert Answer:
Related Book For
Posted Date:
Students also viewed these computer network questions
-
can someone solve this Modern workstations typically have memory systems that incorporate two or three levels of caching. Explain why they are designed like this. [4 marks] In order to investigate...
-
XYZ Co. It is currently trading at $5 per share and has announced a $0.50 per share dividend payable next year. Using historical information, one analyst estimates XYZ Co.'s dividend growth rate is...
-
Describe the standards that are applicable to the audit profession in the United States: What standards apply to the performance of audits? Who is responsible for setting these standards? What...
-
Can an electric field line have a kink in it?
-
Pattys Pumpkin Pies collected the following production information relating to Novembers baking operations: Requirements: Complete the first two steps in the process costing procedure: 1. Summarize...
-
The diameter of a brand of tennis balls is approximately normally distributed, with a mean of 2.63 inches and a standard deviation of 0.03 inch. If you select a random sample of nine tennis balls, a....
-
4.Indicate, by clicking on the relevant boxes, whether the following statements are true or false in relation to business valuation. The earnings yield method and the dividend growth model should...
-
Under Armour, Inc. is an American supplier of sportswear and casual apparel. Following are selected financial data for the company for the period 20092013. a. Calculate Under Armours annual...
-
2.18 The piston shown above is held in equilibrium by the pressure of the gas flowing through the pipe. The piston has a mass of 21 kg; p= 600 kPa; P = 170 kPa. Determine the presure of the gas in...
-
The Wayfair decision generally is viewed as overturning which prior case that seemed to require that a company needed to have a physical presence in a state befire that state could require the seller...
-
The following is based on a project management class Your task is to writ a reflective paper on the principles of project management that we have covered over the last eight weeks. View this as our...
-
Malath Insurance Company agreed with Saudi Re Reinsurance Company to buy a reinsurance program. This program includes ceding 70% of the sum insured in the quota share treaty and the retention limit...
-
Review any planning checklist for business messages. Which of these steps do you consider, and which do you not stop to think over as you write your message? If you do not use a checklist like this,...
-
Take me to the text Jessica Inc. provides you with the following budgeted information for two months in year 2 0 1 9 : March April Sales $ 5 1 5 , 0 0 0 $ 7 3 0 , 0 0 0 Manufacturing Costs 1 6 0 , 0...
-
Suppose we use approximately 1500 kWh of electricity per month, and we are considering purchasing a 5 kW rooftop solar panel array. Duke Energys residential electricity price is $0.10395 per kWh. The...
-
Use this circle graph to answer following Exercises. 1. What fraction of areas maintained by the National Park Service are designated as National Recreation Areas? 2. What fraction of areas...
-
Hopper Travel uses the contribution margin income statement internally. Hopper's second-quarter results are as follows: Hopper's relevant range is sales of between $100,000 and $640,000. Requirements...
-
Irvin Chemical Corporation has three divisions. Following is division information from the most recent year. For each of the three divisions, calculate sales margin, capital turnover, and return on...
-
The Frying Department of Ripple Chips had 110,000 partially completed units in work in process at the end of July. All of the direct materials had been added to these units, but the units were only...
-
Fine Furniture Ltd had a balance in its Work in Process Inventory account on 1 October 2019 of $13 600 made up of two jobs: Job 730, $6400; and Job 731, $7200. At the end of October, costs assigned...
-
Refer to the latest financial report of JB Hi-Fi Limited on its website, www.jbhifi.com.au, and answer the following questions. 1. Is it likely that JB Hi-Fi Limited would have to confront such...
-
Imelda Instruments Ltd manufactures two products: missile range instruments and space pressure gauges. During January, 53 range instruments and 360 pressure gauges were produced, and overhead costs...
Study smarter with the SolutionInn App