Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Set up a stateless firewall on a VDI machine that accomplishes the following objectives:Investigate TCP flow control In this programming assignment, you will revise the

Set up a stateless firewall on a VDI machine that accomplishes the following objectives:Investigate TCP flow control
In this programming assignment, you will revise the provided Web client program to
demonstrate the working of TCP flow control.
Web Client Program
A functional Web client is provided with some error checking but very little documentation. This
Web client sends an HTTP GET request for a file to the server you developed in the previous
programming assignment, displays the response from the server, and stops execution.
Modify the Web client to throttle the Web server from sending the requested object at the
maximum possible rate. For this purpose, use socket options to set the receive buffer size to an
appropriate value and modify the client application from quickly reading the received data.
Catch possible errors and document your code thoroughly. Also, the client should exit gracefully
when a keyboard interrupt (c) is received. Use the webserver you developed in the previous
programming assignment to test your client.
The format for running your Web client:
$ python3
Webclient.py serverAddress serverPort filename
The format for running your Web server:
$ python3
Webserver.py serverPort
Allows any critical traffic needed for your machine to function. The critical traffic includes
the TCP traffic to and from the VDI gateways (check the Wireshark trace for the IP
addresses; they could be 10.100.1.161 through 10.100.1.164) and all traffic on the loopback
interface.
Allows web traffic to external servers with class A IP addresses at ports 80 and 443.
Allows secure shell connections from your machine to any machine at port 22.
Allows secure shell connections from one of the Fox servers (e.g.,
fox02.cs.utsarr.net) to
your machine at port 22.
Blocks all other TCP traffic.
Logs all blocked packets before dropping them. Use a custom label to easily extract the log
information generated by the firewall rules you created.
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

Link public affairs strategy with organizational characteristics.

Answered: 1 week ago

Question

=+2. What level of impact will this tactic make on the key public?

Answered: 1 week ago