Implementing Security in GNU/Linux
Implementing Security in GNU/Linux
CODE: 201494A_761
Unit 5
Step 6 - Implementing security in GNU/Linux Forum
Presented to:
Tutor
Delivered by:
Group: 22
The following document compiles the development of step 6, where the installation is carried out.
Endian tool, with which the services will be installed, configured, and managed according to
the selected theme.
Objectives
Table A
Module Function
Limit Limit: set maximum number
for a period of time
determined, specified as a
par<value>/<period>.
Limit-burst: sets a limit on
the number of packages that can
match with one rule at a time
State Allows state matches
State: Corresponds to a package with
the following connection states:
Established: The package matches with
other packets in a connection
established.
The matching package does not
can connect to a connection
known.
New: The matching package creates a
new connection or is part of a
unseen two-way connection
previously.
The matching package starts
a new related connection of
some form with a connection
existing.
Mac Allows the matching between
MAC addresses of hardware
Mac source: matches an address
MAC of the network interface card that
I sent the package, for example:
--mac-sour[Link]
Table B
Deny the
access to
Internet for the
device with IP
[Link]
Restrict the
access to the
application
Dropbox
URL of
download
3. Table C
Collaborative report
Expected product:
Allow HTTP services (Port 80) and FTP (Port 21) from the web server under Ubuntu Server.
Deny the ICMP protocol (Port 8 and port 30) to prevent pinging on the network. Test through
a console or terminal does not respond to the ping command towards an IP on the network.
Check the outgoing traffic, the creation of the rules.
4. Endian Installation
Image 1: Endian Installation
The IP to be used is selected (in this case it was replaced later in another installation)
The installation was done again and the IP [Link] was used.
5. Endian Configuration
Image 5: Endian Configuration
6. Allow HTTP services (Port 80) and FTP (Port 21) from the Web server under Ubuntu
Server.
Permission rules are created for the htp services with port 80 and FTP with port 21.
Image 17: Use of Endian
7. Deny the ICMP protocol (Port 8 and port 30) to prevent pinging on the network.
Try through a console or terminal the lack of response from the ping command to an IP of
the net.
Conclusions
It is important to carry out the installations in the correct order to avoid complications.
later.
In Endian installation, the network adapters must be configured first to avoid having
problems and that the client, server, and firewall can communicate with each other.
It is important to have the networks defined that are going to be worked on to configure them properly.
the firewall.
Bibliography
Admin. (February 22, 2013). Iptables Commands, Parameters, and Actions. Retrieved from:
[Link]
Alcalde, Alejandro. (Septiembre 21, 2017). 20 ejemplos de iptables para SysAdmins novatos.
Recovered from:[Link]
From light, Sergio. (September 22, 2012). Firewall configuration in Linux with IPtables.
Recovered from:[Link]
linux-con-iptables/
Saiz, Marcos. (January, 2020). How to Install and Configure Config Server Firewall (CSF) in
Ubuntu 18.04. Retrieved from:[Link]
Install and Configure Config Server Firewall (CSF) on Ubuntu 18.04
El Blog del Aminsitrador. (Noviembre 24, 2014). Instalacion y configuracion de Endian Firewall
in VirtualBox. [Video]. Retrieved from: [Link]
v=7FHg7HLRfJU&t=92s