Computer Question

Assignment Requirements

 

Please answer just the equations without doing the exercise.

Mini-assignment 8

 

 

Part 1

 

Packet filtering – firewalls – iptables

 

The Fedora packet-filtering firewall configuration file is

/etc/sysconfig/iptables-config and /etc/sysconfig/iptables

 

Create a backup copy of this file so that you can restore the original version at the end of the practical session.

 

Note that iptables is: (1) the name of the configuration file; (2) the name of the firewall software; (3) the fundamental firewall command; and (4) the name of the iptables daemon.

 

Investigate the /etc/sysconfig/iptables file and modify it according to the following requirements. Note that only root can edit this configuration file.

 

The iptables daemon must be restarted for changes to the configuration to take effect.

 

Iptables was actually superceded by firewalld – but this practical focuses on the the simple use of iptables and thus firewalld will need to be switched off.

 

service firewalld stop            ## as root

 

service iptables restart              ## as root

 

Initially the file containing rules does not exisiting , to create a empty rule book, issue the following command ;

 

service iptables save             ## as root

 

You should now find a new file created within /etc/sysconfig/iptables

 

Please note : In order for any firewall rules to be applied, the service will need to be restarted via ;

 

service iptables restart              ## as root

 

Required modifications to the iptables configuration

 

1. Accept icmp echo-requests only, and only from a colleague’s computer of specified IP address.

 

2. Allow ssh connections only from a colleague’s computer of specified IP address.

 

3. Change the default policy so that packets are dropped (“dropped silently”) rather than being rejected with a returned message.

 

 

Questions

 

What is meant by “stateless filtering” and “stateful filtering”?

 

Which is encountered first by an incoming packet – the firewall or tcp-wrappers?

 

As usual, record full details of your actions and answer all questions in your logbook.

 

 

 

 

 

Example of a firewall configuration file (/etc/sysconfig/iptables-config) for a single system (Redhat / Fedora) that uses iptables. Note that there will be probably be differences between this particular file and the corresponding files on different installations and for different versions of the operating system. The numbers in brackets – e.g. [8] – have been added for reference and are not part of the original file.

 

# Firewall configuration written by system-config-securitylevel

# Manual customization of this file is not recommended.

*filter

[1]    :INPUT ACCEPT [0:0]

[2]    :FORWARD ACCEPT [0:0]

[3]    :OUTPUT ACCEPT [0:0]

[4]    :RH-Firewall-1-INPUT – [0:0]

[5]    -A INPUT -j RH-Firewall-1-INPUT

[6]    -A FORWARD -j RH-Firewall-1-INPUT

[7]    -A RH-Firewall-1-INPUT -i lo -j ACCEPT

[8]    -A RH-Firewall-1-INPUT -p icmp –icmp-type any -j ACCEPT

[9]    -A RH-Firewall-1-INPUT -p 50 -j ACCEPT

[10]   -A RH-Firewall-1-INPUT -p 51 -j ACCEPT

[11]   -A RH-Firewall-1-INPUT -m state –state ESTABLISHED,RELATED -j ACCEPT

[12]   -A RH-Firewall-1-INPUT -m state –state NEW -m tcp -p tcp –dport 22 -j ACCEPT

[13]   -A RH-Firewall-1-INPUT -j REJECT –reject-with icmp-host-prohibited

[14]   COMMIT

 

Note that the above file is a customised Redhat / Fedora /etc/sysconfig/iptables-config file and would appear a little different if you were programming with iptables yourself. For example, you should understand that here the “iptables” command itself has been omitted: commands “-A …” should be understood to mean “iptables -A …”.

 

The filter table has “INPUT, “FORWARD”, and “OUTPUT” chains by default.

 

[5, 6]

Redhat / Fedora passes the “INPUT” and “FORWARD” chains to its customised chain RH-Firewall-1-INPUT.

 

[7]

ACCEPT everything on the lo interface – localhost, 127.0.0.1 (the internal network communications of the machine itself).

-A                            append to the chain

-i                              interface

-j                             jump to target, e.g. ACCEPT

 

[8]

ACCEPT protocol ICMP messages of any type. This will accept ping packets, for example.

-p                            protocol

 

[9,10]

ACCEPT IPv6-Crypt and IPV6-Auth protocols – encryption and authentication protocol for IPv6, as listed in /etc/protocols (protocol numbers 50, 51).

 

[11]

ACCEPT packets for ESTABLISHED and RELATED connections. This represents stateful inspection of packets.

-m                           match – in this case, match the state

–state                     the specification of the state, here ESTABLISHED and RELATED

 

[12]

ACCEPT NEW connections from outside on destination port 22 – i.e. ssh. Matches to state NEW and tcp. Protocol tcp. Note that this command creates an opening in the firewall.

–dport                    destination port

 

[13]

REJECT any packets that have continued this far and return a icmp-host-prohibited message.

 

 

 

 

Part 2

 

Packet “sniffing – wireshark (ethereal)

 

Investigate and use the software for packet “sniffing” that is called either “wireshark” or “ethereal” (the old name).

 

Is the software installed on your computer? If not, find a source of the software, download it, and install it. (Installation from RPM files will usually be easiest.)

 

Use your logbook to record all the details of the purpose and operation of wireshark (ethereal) that would be needed for you to subsequently write an introductory manual.

 

Use the man pages, Google, and exploration of the capabilities of the software to find all the information that you need.

 

Be sure that your notes for the introductory manual include the functions of the various sub-windows, the use of colouring-rules, explanations of technical terms such as “promiscuous”, “dissector”, etc. You might want to include screen-dumps in your logbook.

 

 

Order Now

http://Academicheroes.com/order/

The post Computer Question appeared first on Academicheroes.com.

 
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"

36123 – 1 – Page Within 6 Hrs

36123 Topic: SCI 207 Our Dependence upon the Environment

Number of Pages: 1 (Double Spaced)

Number of sources: 2

Writing Style: APA

Type of document: Essay

Academic Level:High School

Category:   Environmental Issues VIP Support: N/A

Language Style: English (U.S.)

Order Instructions: Attache

  • attachment

    36123.doc

 

“Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code “Newclient”

The post 36123 – 1 – Page Within 6 Hrs appeared first on Academicheroes.com.

 
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"

Positive reposnse to this post 150 words with reference due October 18 at 10:00 am

Youth suicide is the third leading cause of death for persons between 15-24 years of age, and almost 4,600 youth deaths each year are the result […]


Positive reposnse to this post 150 words with reference due October 18 at 10:00 am was first posted on July 15, 2019 at 5:03 pm.
©2019 "UK Best Essays". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at support@ukbestessays.com

 
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"

Critically Analyzing Counseling Literature

Assignment Requirements

 

Objectives
Week 1: Scholar Practitioner
Introduction
As a counseling student at Walden University, you have likely seen the phrase “Scholar Practitioner” in all of your courses. However, you may not have thought about why the two terms are paired together or what the implications are of having this philosophy as part of your counselor preparation experience. In order to become a scholar practitioner in counseling, you must learn to become a producer and a consumer of research. You must also learn to effectively conduct program evaluation in order to determine the effectiveness of your counseling-related programs. These skill sets will be central to your work as a practicing counselor. While learning about research and program evaluation may be somewhat anxiety-provoking, the end results will guide all that you do as a counselor.
The focus of this week is to give you an overview of the scholar practitioner model. Through this overview, you begin to explore the professional literature related to counseling and begin to critically analyze the research efforts that guide the world of practice.

Discussion – Week 1

Critically Analyzing Counseling Literature

As a scholar practitioner, it is important for you to continue to use professional journals and other research sources to guide your practice. Developing the skills to review, critically analyze, and discuss professional literature is essential for your development as a competent counselor. In some cases, counseling scholars review and summarize the professional literature for you in order to provide a synopsis of trends, misconceptions, and promising areas for future research.

In this Discussion, you review literature reviews constructed by counseling scholars. Also, you develop a conceptual understanding of the Scholar Practitioner Model and how professional literature plays a role in all that you do as a practicing counselor.

With these thoughts in mind:

Select an article from this week’s Learning Resources. Post by Day 4 a brief synopsis of the literature that was reviewed in your selected article. Explain the implications of the research, as represented in the literature review, to practice in the area represented.

Be sure to support your postings and responses with specific references to the Learning Resources.

Learning Outcomes
By the end of this week, you should be able to:
• Apply literature reviews to practice
• Analyze implications of the scholar-practitioner model for professional practice

Readings
• Course Introduction (located under Course Home in the left navigation bar)

• Course Text: Sheperis, C. J., Young, J. S., & Daniels, M. H. (2010). Counseling research: Quantitative, qualitative, and mixed methods. Upper Saddle River, NJ: Pearson Education, Inc.
o Chapter 1, “Contemporary Issues in Counseling Research”
o Chapter 2, “Getting Started”
o Chapter 3, “Reviewing the Literature”

• Article: D’Andrea, M., & Heckman, E. (2008). A 40-year review of multicultural counseling outcome research: Outlining a future research agenda for the multicultural counseling movement. Journal of Counseling and Development, 86(3), 356–363.
• Article: Duba, J. D., Kindsvatter, A., & Lara, T. (2008). Treating infidelity: Considering narratives of attachment. The Family Journal, 16, 293–299.

• Article: Hunter, S. V. (2006). Understanding the complexity of child sexual abuse: A review of the literature with implications for family counseling.The Family Journal, 14, 349–358.
• Article: Rayle, A. (2006). Mattering to others: Implications for the counseling relationship. Journal of Counseling & Development, 84(4), 483–487.
• Article: Smith, S., Reynolds, C., & Rovnak, A. (2009). A critical analysis of the social advocacy movement in counseling. Journal of Counseling & Development, 87(4), 483–491.
• Article: Zalaquett, C., & Stens, A. (2006). Psychosocial treatments for major depression and dysthymia in older adults: A review of the research literature. Journal of Counseling & Development, 84(2), 192–201.

 

Order Now

http://Academicheroes.com/order/

The post Critically Analyzing Counseling Literature appeared first on Academicheroes.com.

 
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"