Answered You can hire a professional tutor to get the answer.
Create a 5 pages page paper that discusses inbuilt linux and windows firewall. Linux operating system utilizes highly flexible IP tables. they are easy to use and are ideal for Linux novice users. IP
Create a 5 pages page paper that discusses inbuilt linux and windows firewall. Linux operating system utilizes highly flexible IP tables. they are easy to use and are ideal for Linux novice users. IP Tables is a firewall controlled by a command line and uses the policy chains from the user to block or allow traffic. When an incoming connection attempts to establish itself on the system, IP tables contain a list of rules to search for a match to tie it to. If the IP tables fail to find a rule, it performs the default action. IP tables are pre-installed on any Linux based operating system. To update and install, the user can retrieve the IP tables package by typing. Sudo apt-get installs IP tables. Linux also comes with a graphic user interface (GUI) for IP tables such as Firestarter. Using the command line requires caution from the user, primarily through the first few commands. To prevent lockout from SSH servers, the user should take notice when configuring rules for IP tables.
Types of Chains
IP tables use three types of chains. they are. input, output, and forward. Input. this chain controls the behaviors of all incoming connections. For instance, if a user attempts to SSH to a personal computer or a server with IP tables. His or her user’s Internet protocol address (IP) and port will be matched to a rule found in the input’s chain. Forward. used for incoming connections that are not delivered locally. Outputs. used for outgoing links like pinging other websites. IP tables will run a check on its output chain to discover the rules of the ping action and the site before allowing or denying any connection attempt.
Before configuring specific rules, the user must decide the default behavior of each of the three chains. To check what the IP tables policy chains are configured to do with the unmatched traffic, run IP tables –L command. The system should be configured to accept connections, for example, IP tables –input ACCEPT. This allows the user to direct the IP tables to deny specific parts or IP addresses while accepting other connections. If the user wishes to deny all links but manually select the ones to connect or allow, the default policy should be changed to DROP.