Changes

Jump to: navigation, search

OPS335 Lab 3

58 bytes added, 17:54, 7 February 2017
Firewall rules update
Remember that you are supposed to have a working firewall on your '''vm1''' (and every other machine), but we will focus on our vm1 machine for now. A <u>working</u> firewall will block requests to ports that you didn't explicitly allow. This means that at this point, your DNS server, even though it's perfectly configured, is <u>'''inaccessible'''</u> to any other machine because iptables won't allow the requests to come in (the machine can communicate with itself using the rule that allows all traffic on the '''lo''' interface).
You will need to update the firewall on '''vm1''' to allow <u>incoming</u> connections to 'Perform the Following Steps:''port 53 for both UDP and TCP''' (i.e. the protocol and port that DNS uses). After you have updated your firewall, then save your iptables rules using whatever means worked for you in the iptables labs and add it to a shell script.
# You will need to update the firewall on '''vm1''' to allow <u>incoming</u> connections to '''port 53 for both UDP and TCP''' (i.e. the protocol and port that DNS uses).# After you have updated your firewall, then save your iptables rules using whatever means worked for you in the iptables labs and add it to a shell script. '''NOTE:''' You could just disable the firewall '''but that is a poor workaround! ''' You are expected to be able to handle configuration (such as this) at this point in this course.
13,420
edits

Navigation menu