F23 SPR100 A2 v1 (2)
.docx
keyboard_arrow_up
School
Seneca College *
*We aren’t endorsed by this school
Course
100
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
3
Uploaded by ElderLeopardMaster1065
SPR100
Assignments
Assignment 2 (10%): Network Traffic and Encryption
Overview:
In this assignment you are going to learn how to do some simple blocking of network traffic using a
firewall and demonstrate encryption and digital signatures.
Note:
The Ubuntu terminal prompt should be visible in all screenshots and match the format given in
Lab 3.
Objective:
1.
Do self-directed learning.
2.
Gain a better knowledge of:
Firewalls and some of their features
Encryption and digital signatures
Resources:
Data Packets and IP Addresses
IP Addresses
Data Packet
The Physical Network (LinkedIn Learning video)
Understanding Networks (LinkedIn Learning video)
Firewalls
Firewalls (Wikipedia)
Introduction to Firewalls (LinkedIn Learning video)
nftables (nftables.org)
Activities
Part 1: Firewalls
In this section of the assignment, you’ll be learning how to block some of the network traffic.
Part 1A: Firewall Setup – nftables
(2%)
Now you are going to setup the nftables firewall. The tasks you need to do are the following:
Check that ntftables is running. If it is not running start and run it. Once you have it running, do
the following:
Page 1 of 3
SPR100
Assignments
Execute the following command “systemctl status nftables”.
Take a screen shot of the terminal window showing the command and the output of the
command and name it nftables_status.jpg and insert it into your report under the heading
Nftables Status
Configure nftables:
Create an
inet
filter table
In the
inet
filter table
:
o
Add an output
chain
of type
filter
with hook type
output
priority
0
, policy
accept
o
Add an input
chain
of type
filter
with hook type
input
priority
0
, policy
accept
Do the following command: nft list table <your inet table name>
Take a screen shot of the terminal window
showing the command and the output of the
command and name it inet_table.jpg
Take a screen shot of the terminal window showing you have Internet connectivity by
doing the following command “ping 8.8.8.8” from the command-line
Insert both screenshots into your report under the heading
Firewall Setup
Part 1B: Firewall Filtering – Blocking Web Traffic (2%)
You are going to block the web traffic coming into your VM using the inet filter table firewall you have
just created in Part 1A. Insert a heading into your report
Firewall Filtering
.
The tasks you need to do are the following:
Start the web browser and load a web site from your Lab 1 submission. Take a screen shot that
includes the web browser with the page loaded and the terminal window showing the results of
the ‘nft list table <your inet table name>’ and save it as LoadedPage.jpg and insert it into your
report under the heading
Loaded Website.
Add a single firewall rule to either the input or output chains that block web traffic coming into
the Ubuntu VM.
Take a screen shot window showing the following results of the ‘nft list table
<your inet table name>’ and save it as FirewallRuleAdded.jpg and insert it into your report under
the heading
Firewall Rule Added – Web Blocking.
Start the web browser and load a different web site from your Lab 1 submission. If you have
added the firewall rule correctly, this website should not load. Take a screen shot showing that
shows the following:
The web browser open
with the URL visible should show that the page cannot load the
web.
Terminal window open showing the results of the ‘nft list table <your inet table name>’
Save the screenshot as WebTrafficBlocked.jpg and insert it into your report under the heading
Web Traffic Blocked.
Part 1C: Firewall Filtering – Blocking Ping Traffic (3%)
Building on the work in 1B, you are going to block ping traffic coming into your VM.
Before you
implement your rule take a screenshot that includes:
The IP address of the Ubuntu VM using a command-line command.
The Ubuntu VM being successfully pinged from your Host VM
Save it as SuccessfulPing.jpg and insert it into your report under the heading
Successful Ping.
Implement your rule and take a screenshot that shows the following:
The Ubuntu VM being unsuccessfully pinged from your Host VM
Terminal window open showing the results of the ‘nft list table <your inet table name>’
Save it as UnsuccessfulPing.jpg and insert it into your report under the heading
Unsuccessful Ping.
Note:
Your firewall should only block the specified traffic. All other traffic should be allowed.
Page 2 of 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help