Securing system

Page 1

Securing system using IP Tables firewall

1. Denial of SSH access

Denial of SSH Access is done via the Kali distribution of Linux and the following commands are used to reject the ssh packet and the corresponding snapshot is as given below Initially, openssh server is installed using the command apt –get install openssh-server Once this packet is installed, status of the ssh server is tested using the command service ssh status If the ssh server is not running, this operation or command will return fail and the service is started using the command service ssh start (Lee, Kim, Woo, & Park, 2015) After this command, ssh server is started and the IP tables input ssh packets are rejected using the commands iptables –I INPUT –s any –p tcp –dport ssh –j REJECT and iptables –L INPUT –v 

Securing system using IP Tables firewall – $20.00


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.