SlideShare a Scribd company logo
1 of 5
Lab #9:
Construct a Linux Host Firewall and Monitor for IP Traffic
Instructor Name:
Construct a Linux Host Firewall and Monitor for IP Traffic
Internal Firewall Policy Definition
Configure your “TargetUbuntu02” desktop Linux internal host
IP stateful firewall according to the following policy definition.
Test and validate your implementation after you configure it
based on the policy definition.
The following is your Ubuntu internal firewall policy
definition:
• Deny incoming traffic
• Deny the following specific applications:
• TFTP
• Telnet
• SNMP
• ICMP
• FTP
• Allow the following specific applications under “Advanced”
settings:
• SSH
• SMTP
• POP3
• HTTPS
• HTTP
Make a screen capture of the changes you made to the
configuration and paste it into the text document.
Use the File Transfer button t
to download the text fi le to your local computer and submit it
as part of your deliverables.
Lab Assessment Questions
Briefly explain how the Gufw internal Ubuntu host IP stateful
firewall can be used in a layered security strategy at the
workstation domain level.
Briefly explain how each of the Linux-based tools demonstrated
in this lab can be used to monitor bandwidth, protocol, and
network traffic information.
Given that the Ubuntu internal firewall is not installed by
default, should you enable this firewall if your organization
already has a firewall at your LAN-to-WAN domain’s Internet
ingress/egress point? Why or why not?
How do you block specific ports and IP ranges from
communicating via TCP/IP to and from your Ubuntu Target VM
using Gufw?
Other than Deny or Allow incoming connections, what other
options are available in Ubuntu’s internal firewall? Why would
they include any additional option?
What usefulness is there in monitoring IP traffic to and from an
individual workstation or server?
Explain both the information systems security practitioner and
hacker perspectives of using a security scanning application
against a protected or unprotected host.
How are you going to test if your internal firewall configuration
is working properly?
Define a test plan to test, verify, and monitor traffic on your
internal Ubuntu Target VM.
This is a two–part, real-world scenario question. Read the
REQUIREMENTS section. Then, based on the requirements,
answer PART A with a technical solution using the tools
demonstrated in this lab and answer PART B with a written
explanation and justification for your solution.
You must use at least two of the following Linux-based IP
monitor tools presented in this lab in your realworld example:
bmon, iftop, pktstat, iperf, and/or tcptrack.
Requirements:
A strategy is required to effectively monitor IP traffic on an
individual server as well as many servers on a “point in time” as
well as on an “over time” basis. There is also a requirement to
automate the alerting of potential issues based on changes in
network utilization.
Part A:
Give a real-world example of how you could meet this
requirement with the use of tools presented in this lab and the
use of any other available resources, such as scripts, alerts,
output formats, or scheduled tasks (i.e., cron jobs).
Part B:
Explain the usefulness and benefits of your real-world example
to an organization and support your reasoning with technical
facts and security in mind. Did you meet the requirements? Why
or why not?

More Related Content

Similar to Lab #9 Construct a Linux Host Firewall and Monitor for IP Tra.docx

Cisco Next-Generation IPS and how to install Firepower version 6.X.pptx
Cisco Next-Generation IPS and how to install Firepower version 6.X.pptxCisco Next-Generation IPS and how to install Firepower version 6.X.pptx
Cisco Next-Generation IPS and how to install Firepower version 6.X.pptxzachdwg
 
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docxSEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docxjeffreye3
 
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docxSEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docxedgar6wallace88877
 
[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and ITSite24x7
 
Describe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfDescribe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfjibinsh
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reportsShakib Ansaar
 
Survey Paper on Smart Surveillance System
Survey Paper on Smart Surveillance SystemSurvey Paper on Smart Surveillance System
Survey Paper on Smart Surveillance SystemIRJET Journal
 
DO-254 for dummies 7
DO-254 for dummies 7DO-254 for dummies 7
DO-254 for dummies 7DMAP
 
IPLOOK SMS product information
IPLOOK SMS product information IPLOOK SMS product information
IPLOOK SMS product information IPLOOK Networks
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docxhoney725342
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersITExamAnswers.net
 
Security Gateway CP R70
Security Gateway CP R70Security Gateway CP R70
Security Gateway CP R70dzihiro
 
Using Batfish for Network Analysis
Using Batfish for Network AnalysisUsing Batfish for Network Analysis
Using Batfish for Network AnalysisJoel W. King
 
Using Tetration for application security and policy enforcement in multi-vend...
Using Tetration for application security and policy enforcement in multi-vend...Using Tetration for application security and policy enforcement in multi-vend...
Using Tetration for application security and policy enforcement in multi-vend...Joel W. King
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxAngel Garcia
 

Similar to Lab #9 Construct a Linux Host Firewall and Monitor for IP Tra.docx (20)

Cisco Next-Generation IPS and how to install Firepower version 6.X.pptx
Cisco Next-Generation IPS and how to install Firepower version 6.X.pptxCisco Next-Generation IPS and how to install Firepower version 6.X.pptx
Cisco Next-Generation IPS and how to install Firepower version 6.X.pptx
 
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docxSEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
 
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docxSEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
 
Pankaj_Joshi_Resume
Pankaj_Joshi_ResumePankaj_Joshi_Resume
Pankaj_Joshi_Resume
 
[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT
 
ToTP
ToTPToTP
ToTP
 
Describe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfDescribe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdf
 
Enabling NFV features in kubernetes
Enabling NFV features in kubernetesEnabling NFV features in kubernetes
Enabling NFV features in kubernetes
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
Survey Paper on Smart Surveillance System
Survey Paper on Smart Surveillance SystemSurvey Paper on Smart Surveillance System
Survey Paper on Smart Surveillance System
 
DO-254 for dummies 7
DO-254 for dummies 7DO-254 for dummies 7
DO-254 for dummies 7
 
IPLOOK SMS product information
IPLOOK SMS product information IPLOOK SMS product information
IPLOOK SMS product information
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
 
Whatsup
WhatsupWhatsup
Whatsup
 
Whatsup
WhatsupWhatsup
Whatsup
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
Security Gateway CP R70
Security Gateway CP R70Security Gateway CP R70
Security Gateway CP R70
 
Using Batfish for Network Analysis
Using Batfish for Network AnalysisUsing Batfish for Network Analysis
Using Batfish for Network Analysis
 
Using Tetration for application security and policy enforcement in multi-vend...
Using Tetration for application security and policy enforcement in multi-vend...Using Tetration for application security and policy enforcement in multi-vend...
Using Tetration for application security and policy enforcement in multi-vend...
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 

More from jesseniasaddler

List and discuss five important criteria that a state must meet in.docx
List and discuss five important criteria that a state must meet in.docxList and discuss five important criteria that a state must meet in.docx
List and discuss five important criteria that a state must meet in.docxjesseniasaddler
 
List and define the five traits included in the Big Five theory of p.docx
List and define the five traits included in the Big Five theory of p.docxList and define the five traits included in the Big Five theory of p.docx
List and define the five traits included in the Big Five theory of p.docxjesseniasaddler
 
List and describe the six (6) parts of a speech.Describe.docx
List and describe the six (6) parts of a speech.Describe.docxList and describe the six (6) parts of a speech.Describe.docx
List and describe the six (6) parts of a speech.Describe.docxjesseniasaddler
 
List 2 characteristics of each period listed below1-2. Renais.docx
List 2 characteristics of each period listed below1-2. Renais.docxList 2 characteristics of each period listed below1-2. Renais.docx
List 2 characteristics of each period listed below1-2. Renais.docxjesseniasaddler
 
Linking or actionThe government opertaion many large parks.Many .docx
Linking or actionThe government opertaion many large parks.Many .docxLinking or actionThe government opertaion many large parks.Many .docx
Linking or actionThe government opertaion many large parks.Many .docxjesseniasaddler
 
Limit responses to less than one page each using 12 pt. Time News Ro.docx
Limit responses to less than one page each using 12 pt. Time News Ro.docxLimit responses to less than one page each using 12 pt. Time News Ro.docx
Limit responses to less than one page each using 12 pt. Time News Ro.docxjesseniasaddler
 
Limit responses to less than one page each using 12 pt. Time News .docx
Limit responses to less than one page each using 12 pt. Time News .docxLimit responses to less than one page each using 12 pt. Time News .docx
Limit responses to less than one page each using 12 pt. Time News .docxjesseniasaddler
 
Likewise with each new investigative finding there will dependably b.docx
Likewise with each new investigative finding there will dependably b.docxLikewise with each new investigative finding there will dependably b.docx
Likewise with each new investigative finding there will dependably b.docxjesseniasaddler
 
Lifelong Learning PlanIntroductionLife long learning is a concep.docx
Lifelong Learning PlanIntroductionLife long learning is a concep.docxLifelong Learning PlanIntroductionLife long learning is a concep.docx
Lifelong Learning PlanIntroductionLife long learning is a concep.docxjesseniasaddler
 
Library Research AssignmentYou are new member of internal affairs .docx
Library Research AssignmentYou are new member of internal affairs .docxLibrary Research AssignmentYou are new member of internal affairs .docx
Library Research AssignmentYou are new member of internal affairs .docxjesseniasaddler
 
Library Research AssignmentUse the library and other Web resources.docx
Library Research AssignmentUse the library and other Web resources.docxLibrary Research AssignmentUse the library and other Web resources.docx
Library Research AssignmentUse the library and other Web resources.docxjesseniasaddler
 
Let U = {8, 9, 10, 11, 12, 13, 14}, .docx
Let U = {8, 9, 10, 11, 12, 13, 14}, .docxLet U = {8, 9, 10, 11, 12, 13, 14}, .docx
Let U = {8, 9, 10, 11, 12, 13, 14}, .docxjesseniasaddler
 
Letter of CreditThe text describes problems exporters have with le.docx
Letter of CreditThe text describes problems exporters have with le.docxLetter of CreditThe text describes problems exporters have with le.docx
Letter of CreditThe text describes problems exporters have with le.docxjesseniasaddler
 
Lets start this discussion by sharing public observations. Spend ti.docx
Lets start this discussion by sharing public observations. Spend ti.docxLets start this discussion by sharing public observations. Spend ti.docx
Lets start this discussion by sharing public observations. Spend ti.docxjesseniasaddler
 
Lets look to the 20th century portion of the Modules for this Discu.docx
Lets look to the 20th century portion of the Modules for this Discu.docxLets look to the 20th century portion of the Modules for this Discu.docx
Lets look to the 20th century portion of the Modules for this Discu.docxjesseniasaddler
 
Leiningers Theory of Cultural Care Diversity and Universality.docx
Leiningers Theory of Cultural Care Diversity and Universality.docxLeiningers Theory of Cultural Care Diversity and Universality.docx
Leiningers Theory of Cultural Care Diversity and Universality.docxjesseniasaddler
 
Length PowerPoint presentation with 10 - 15 slides (not including.docx
Length PowerPoint presentation with 10 - 15 slides (not including.docxLength PowerPoint presentation with 10 - 15 slides (not including.docx
Length PowerPoint presentation with 10 - 15 slides (not including.docxjesseniasaddler
 
Length PowerPoint presentation with 15 slides (not including ti.docx
Length PowerPoint presentation with 15 slides (not including ti.docxLength PowerPoint presentation with 15 slides (not including ti.docx
Length PowerPoint presentation with 15 slides (not including ti.docxjesseniasaddler
 
Length is 3-4 pages not including References. references should be a.docx
Length is 3-4 pages not including References. references should be a.docxLength is 3-4 pages not including References. references should be a.docx
Length is 3-4 pages not including References. references should be a.docxjesseniasaddler
 
Length1,000 words maximumThere are five general ethical t.docx
Length1,000 words maximumThere are five general ethical t.docxLength1,000 words maximumThere are five general ethical t.docx
Length1,000 words maximumThere are five general ethical t.docxjesseniasaddler
 

More from jesseniasaddler (20)

List and discuss five important criteria that a state must meet in.docx
List and discuss five important criteria that a state must meet in.docxList and discuss five important criteria that a state must meet in.docx
List and discuss five important criteria that a state must meet in.docx
 
List and define the five traits included in the Big Five theory of p.docx
List and define the five traits included in the Big Five theory of p.docxList and define the five traits included in the Big Five theory of p.docx
List and define the five traits included in the Big Five theory of p.docx
 
List and describe the six (6) parts of a speech.Describe.docx
List and describe the six (6) parts of a speech.Describe.docxList and describe the six (6) parts of a speech.Describe.docx
List and describe the six (6) parts of a speech.Describe.docx
 
List 2 characteristics of each period listed below1-2. Renais.docx
List 2 characteristics of each period listed below1-2. Renais.docxList 2 characteristics of each period listed below1-2. Renais.docx
List 2 characteristics of each period listed below1-2. Renais.docx
 
Linking or actionThe government opertaion many large parks.Many .docx
Linking or actionThe government opertaion many large parks.Many .docxLinking or actionThe government opertaion many large parks.Many .docx
Linking or actionThe government opertaion many large parks.Many .docx
 
Limit responses to less than one page each using 12 pt. Time News Ro.docx
Limit responses to less than one page each using 12 pt. Time News Ro.docxLimit responses to less than one page each using 12 pt. Time News Ro.docx
Limit responses to less than one page each using 12 pt. Time News Ro.docx
 
Limit responses to less than one page each using 12 pt. Time News .docx
Limit responses to less than one page each using 12 pt. Time News .docxLimit responses to less than one page each using 12 pt. Time News .docx
Limit responses to less than one page each using 12 pt. Time News .docx
 
Likewise with each new investigative finding there will dependably b.docx
Likewise with each new investigative finding there will dependably b.docxLikewise with each new investigative finding there will dependably b.docx
Likewise with each new investigative finding there will dependably b.docx
 
Lifelong Learning PlanIntroductionLife long learning is a concep.docx
Lifelong Learning PlanIntroductionLife long learning is a concep.docxLifelong Learning PlanIntroductionLife long learning is a concep.docx
Lifelong Learning PlanIntroductionLife long learning is a concep.docx
 
Library Research AssignmentYou are new member of internal affairs .docx
Library Research AssignmentYou are new member of internal affairs .docxLibrary Research AssignmentYou are new member of internal affairs .docx
Library Research AssignmentYou are new member of internal affairs .docx
 
Library Research AssignmentUse the library and other Web resources.docx
Library Research AssignmentUse the library and other Web resources.docxLibrary Research AssignmentUse the library and other Web resources.docx
Library Research AssignmentUse the library and other Web resources.docx
 
Let U = {8, 9, 10, 11, 12, 13, 14}, .docx
Let U = {8, 9, 10, 11, 12, 13, 14}, .docxLet U = {8, 9, 10, 11, 12, 13, 14}, .docx
Let U = {8, 9, 10, 11, 12, 13, 14}, .docx
 
Letter of CreditThe text describes problems exporters have with le.docx
Letter of CreditThe text describes problems exporters have with le.docxLetter of CreditThe text describes problems exporters have with le.docx
Letter of CreditThe text describes problems exporters have with le.docx
 
Lets start this discussion by sharing public observations. Spend ti.docx
Lets start this discussion by sharing public observations. Spend ti.docxLets start this discussion by sharing public observations. Spend ti.docx
Lets start this discussion by sharing public observations. Spend ti.docx
 
Lets look to the 20th century portion of the Modules for this Discu.docx
Lets look to the 20th century portion of the Modules for this Discu.docxLets look to the 20th century portion of the Modules for this Discu.docx
Lets look to the 20th century portion of the Modules for this Discu.docx
 
Leiningers Theory of Cultural Care Diversity and Universality.docx
Leiningers Theory of Cultural Care Diversity and Universality.docxLeiningers Theory of Cultural Care Diversity and Universality.docx
Leiningers Theory of Cultural Care Diversity and Universality.docx
 
Length PowerPoint presentation with 10 - 15 slides (not including.docx
Length PowerPoint presentation with 10 - 15 slides (not including.docxLength PowerPoint presentation with 10 - 15 slides (not including.docx
Length PowerPoint presentation with 10 - 15 slides (not including.docx
 
Length PowerPoint presentation with 15 slides (not including ti.docx
Length PowerPoint presentation with 15 slides (not including ti.docxLength PowerPoint presentation with 15 slides (not including ti.docx
Length PowerPoint presentation with 15 slides (not including ti.docx
 
Length is 3-4 pages not including References. references should be a.docx
Length is 3-4 pages not including References. references should be a.docxLength is 3-4 pages not including References. references should be a.docx
Length is 3-4 pages not including References. references should be a.docx
 
Length1,000 words maximumThere are five general ethical t.docx
Length1,000 words maximumThere are five general ethical t.docxLength1,000 words maximumThere are five general ethical t.docx
Length1,000 words maximumThere are five general ethical t.docx
 

Recently uploaded

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Recently uploaded (20)

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 

Lab #9 Construct a Linux Host Firewall and Monitor for IP Tra.docx

  • 1. Lab #9: Construct a Linux Host Firewall and Monitor for IP Traffic Instructor Name: Construct a Linux Host Firewall and Monitor for IP Traffic Internal Firewall Policy Definition Configure your “TargetUbuntu02” desktop Linux internal host IP stateful firewall according to the following policy definition. Test and validate your implementation after you configure it based on the policy definition. The following is your Ubuntu internal firewall policy definition: • Deny incoming traffic • Deny the following specific applications:
  • 2. • TFTP • Telnet • SNMP • ICMP • FTP • Allow the following specific applications under “Advanced” settings: • SSH • SMTP • POP3 • HTTPS • HTTP Make a screen capture of the changes you made to the configuration and paste it into the text document. Use the File Transfer button t to download the text fi le to your local computer and submit it as part of your deliverables. Lab Assessment Questions
  • 3. Briefly explain how the Gufw internal Ubuntu host IP stateful firewall can be used in a layered security strategy at the workstation domain level. Briefly explain how each of the Linux-based tools demonstrated in this lab can be used to monitor bandwidth, protocol, and network traffic information. Given that the Ubuntu internal firewall is not installed by default, should you enable this firewall if your organization already has a firewall at your LAN-to-WAN domain’s Internet ingress/egress point? Why or why not? How do you block specific ports and IP ranges from communicating via TCP/IP to and from your Ubuntu Target VM using Gufw? Other than Deny or Allow incoming connections, what other options are available in Ubuntu’s internal firewall? Why would they include any additional option?
  • 4. What usefulness is there in monitoring IP traffic to and from an individual workstation or server? Explain both the information systems security practitioner and hacker perspectives of using a security scanning application against a protected or unprotected host. How are you going to test if your internal firewall configuration is working properly? Define a test plan to test, verify, and monitor traffic on your internal Ubuntu Target VM. This is a two–part, real-world scenario question. Read the REQUIREMENTS section. Then, based on the requirements, answer PART A with a technical solution using the tools demonstrated in this lab and answer PART B with a written explanation and justification for your solution. You must use at least two of the following Linux-based IP monitor tools presented in this lab in your realworld example: bmon, iftop, pktstat, iperf, and/or tcptrack.
  • 5. Requirements: A strategy is required to effectively monitor IP traffic on an individual server as well as many servers on a “point in time” as well as on an “over time” basis. There is also a requirement to automate the alerting of potential issues based on changes in network utilization. Part A: Give a real-world example of how you could meet this requirement with the use of tools presented in this lab and the use of any other available resources, such as scripts, alerts, output formats, or scheduled tasks (i.e., cron jobs). Part B: Explain the usefulness and benefits of your real-world example to an organization and support your reasoning with technical facts and security in mind. Did you meet the requirements? Why or why not?