Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Set up a stateless firewall on a VDI machine that accomplishes the following objectives:Investigate TCP flow control In this programming assignment, you will revise the
Set up a stateless firewall on a VDI machine that accomplishes the following objectives:Investigate TCP flow control
In this programming assignment, you will revise the provided Web client program to
demonstrate the working of TCP flow control.
Web Client Program
A functional Web client is provided with some error checking but very little documentation. This
Web client sends an HTTP GET request for a file to the server you developed in the previous
programming assignment, displays the response from the server, and stops execution.
Modify the Web client to throttle the Web server from sending the requested object at the
maximum possible rate. For this purpose, use socket options to set the receive buffer size to an
appropriate value and modify the client application from quickly reading the received data.
Catch possible errors and document your code thoroughly. Also, the client should exit gracefully
when a keyboard interrupt is received. Use the webserver you developed in the previous
programming assignment to test your client.
The format for running your Web client:
$ python
Webclient.py serverAddress serverPort filename
The format for running your Web server:
$ python
Webserver.py serverPort
Allows any critical traffic needed for your machine to function. The critical traffic includes
the TCP traffic to and from the VDI gateways check the Wireshark trace for the IP
addresses; they could be through and all traffic on the loopback
interface.
Allows web traffic to external servers with class A IP addresses at ports and
Allows secure shell connections from your machine to any machine at port
Allows secure shell connections from one of the Fox servers eg
foxcsutsarr.net to
your machine at port
Blocks all other TCP traffic.
Logs all blocked packets before dropping them. Use a custom label to easily extract the log
information generated by the firewall rules you created.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started