SEED Labs – Linux Firewall Exploration

Responsive Centered Red Button

Need Help with this Question or something similar to this? We got you! Just fill out the order form (follow the link below), and your paper will be assigned to an expert to help you ASAP.

QUESTION
 
 
two VMs, you should perform the following tasks:
SEED Labs – Linux Firewall Exploration Lab 2
• Prevent A from doing telnet to Machine B.
• Prevent B from doing telnet to Machine A.
• Prevent A from visiting an external web site. You can choose any web site that you like to block, but
keep in mind, some web servers have multiple IP addresses.
You can find the manual of iptables by typing “man iptables” or search it online. We list some
commonly used commands in the following:
// List all the rules in the filter table
$ sudo iptables -L
$ sudo iptables -L –line-numbers
// Delete all the rules in the filter table
$ sudo iptables -F
// Delete the 2nd rule in the INPUT chain of the filter table
$ sudo iptables -D INPUT 2
// Drop all the incoming packets that satisfy the
$ sudo iptables -A INPUT -j DROP
2.2 Task 2: Implementing a Simple Firewall
The firewall you used in the previous task is a packet filtering type of firewall. The main part of this type of
firewall is the filtering part, which inspects each incoming and outgoing packets, and enforces the firewall
policies set by the administrator. Since the packet processing is done within the kernel, the filtering must
also be done within the kernel. Therefore, it seems that implementing such a firewall requires us to modify
the Linux kernel. In the past, this had to be done by modifying and rebuilding the kernel. The modern
Linux operating systems provide several new mechanisms to facilitate the manipulation of packets without
rebuilding the kernel image. These two mechanisms are Loadable Kernel Module (LKM) and Netfilter.
LKM allows us to add a new module to the kernel at the runtime. This new module enables us to extend
the functionalities of the kernel, without rebuilding the kernel or even rebooting the computer. The packet
filtering part of a firewall can be implemented as an LKM. However, this is not enough. In order for the
filtering module to block incoming/outgoing packets, the module must be inserted into the packet processing
path. This cannot be easily done in the past before the Netfilter was introduced into the Linux.
Netfilter is designed to facilitate the manipulation of packets by authorized users. Netfilter
achieves this goal by implementing a number of hooks in the Linux kernel. These hooks are inserted into
various places, including the packet incoming and outgoing paths. If we want to manipulate the incoming
packets, we simply need to connect our own programs (within LKM) to the corresponding hooks. Once an
incoming packet arrives, our program will be invoked. Our program can decide whether this packet should
be blocked or not; moreover, we can also modify the packets in the program.
In this task, you need to use LKM and Netfilter to implement the packet filtering module. This
module will fetch the firewall policies from a data structure, and use the policies to decide whether packets
should be blocked or not. To make your life easier, so you can focus on the filtering part, the core of
firewalls, we allow you to hardcode your firewall policies in the program. You should support at least five
different rules, including the ones specified in the previous task. Guidelines on how to use Netfilter can
be found in Section 3. In addition, Chapter 14 (§14.4) of the SEED book provides more detailed explanation
on
 

Sample Solutions
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Phasellus hendrerit. Pellentesque aliquet nibh nec urna. In nisi neque, aliquet vel, dapibus id, mattis vel, nisi. Sed pretium, ligula sollicitudin laoreet viverra, tortor libero sodales leo, eget blandit nunc tortor eu nibh. Nullam mollis. Ut justo. Suspendisse potenti.

Get sample solution
Order Now

Sed egestas, ante et vulputate volutpat, eros pede semper est, vitae luctus metus libero eu augue. Morbi purus libero, faucibus adipiscing, commodo quis, gravida id, est. Sed lectus. Praesent elementum hendrerit tortor. Sed semper lorem at felis. Vestibulum volutpat, lacus a ultrices sagittis, mi neque euismod dui, eu pulvinar nunc sapien ornare nisl. Phasellus pede arcu, dapibus eu, fermentum et, dapibus sed, urna.

Morbi interdum mollis sapien. Sed ac risus. Phasellus lacinia, magna a ullamcorper laoreet, lectus arcu pulvinar risus, vitae facilisis libero dolor a purus. Sed vel lacus. Mauris nibh felis, adipiscing varius, adipiscing in, lacinia vel, tellus. Suspendisse ac urna. Etiam pellentesque mauris ut lectus. Nunc tellus ante, mattis eget, gravida vitae, ultricies ac, leo. Integer leo pede, ornare a, lacinia eu, vulputate vel, nisl.
Suspendisse mauris. Fusce accumsan mollis eros. Pellentesque a diam sit amet mi ullamcorper vehicula. Integer adipiscing risus a sem. Nullam quis massa sit amet nibh viverra malesuada. Nunc sem lacus, accumsan quis, faucibus non, congue vel, arcu. Ut scelerisque hendrerit tellus. Integer sagittis. Vivamus a mauris eget arcu gravida tristique. Nunc iaculis mi in ante. Vivamus imperdiet nibh feugiat est.
Ut convallis, sem sit amet interdum consectetuer, odio augue aliquam leo, nec dapibus tortor nibh sed augue. Integer eu magna sit amet metus fermentum posuere. Morbi sit amet nulla sed dolor elementum imperdiet. Quisque fermentum. Cum sociis natoque penatibus et magnis xdis parturient montes, nascetur ridiculus mus. Pellentesque adipiscing eros ut libero. Ut condimentum mi vel tellus. Suspendisse laoreet. Fusce ut est sed dolor gravida convallis. Morbi vitae ante. Vivamus ultrices luctus nunc. Suspendisse et dolor. Etiam dignissim. Proin malesuada adipiscing lacus. Donec metus. Curabitur gravida

How to create Testimonial Carousel using Bootstrap5

Clients' Reviews about Our Services