<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
      <title>014.01.60.Firewall Strategies - EmbLogic</title>
      <link>https://www.emblogic.com/forum/categories/014-01-60-firewall-strategies/feed.rss</link>
      <pubDate>Thu, 12 Mar 26 12:07:12 +0530</pubDate>
         <description>014.01.60.Firewall Strategies - EmbLogic</description>
   <language>en-CA</language>
   <atom:link href="/forum/discussions/feed.rss" rel="self" type="application/rss+xml" />
		<item>
			<title>5. Discuss the potential consequences and precautions mentioned regarding the execution of iptables</title>
			<link>https://www.emblogic.com/forum/discussion/1296/5-discuss-the-potential-consequences-and-precautions-mentioned-regarding-the-execution-of-iptables</link>
			<pubDate>Fri, 02 Feb 2024 15:43:06 +0530</pubDate>
			<dc:creator>pravjot</dc:creator>
			<guid isPermaLink="false">1296@/forum/discussions</guid>
			<description><![CDATA[<span style="font-family: Georgia, serif; color: #800000;"><span><b>014.01.60.</b></span></span><b>5. </b><span>Discuss the potential consequences and precautions mentioned regarding the execution of iptables commands, especially when configuring the INPUT chain, and why caution is advised when implementing these rules on a machine with remote access.</span>]]></description>
		</item>
		<item>
			<title>4.Explain steps involved in configuring iptables to allow ICMP traffic, particularly for ping</title>
			<link>https://www.emblogic.com/forum/discussion/1295/4-explain-steps-involved-in-configuring-iptables-to-allow-icmp-traffic-particularly-for-ping</link>
			<pubDate>Fri, 02 Feb 2024 15:42:29 +0530</pubDate>
			<dc:creator>pravjot</dc:creator>
			<guid isPermaLink="false">1295@/forum/discussions</guid>
			<description><![CDATA[<h3><span style="font-family: Georgia, serif; color: #800000;"><span>014.01.60.</span></span><span><span><span><strong>4. </strong></span><span>Explain the steps involved in configuring iptables to allow ICMP traffic, particularly for ping and other utilities, while maintaining a secure firewall setup.</span></span></span></h3><br />]]></description>
		</item>
		<item>
			<title>3. Why is it crucial to allow only trusted packets and deny everything else when configuring firewal</title>
			<link>https://www.emblogic.com/forum/discussion/1294/3-why-is-it-crucial-to-allow-only-trusted-packets-and-deny-everything-else-when-configuring-firewal</link>
			<pubDate>Fri, 02 Feb 2024 15:41:25 +0530</pubDate>
			<dc:creator>pravjot</dc:creator>
			<guid isPermaLink="false">1294@/forum/discussions</guid>
			<description><![CDATA[<h3><span style="font-family: Georgia, serif; color: #800000;"><span>014.01.60.</span></span><span><span><span><strong>3. </strong></span><span>Why is it crucial to allow only trusted packets and deny everything else when configuring firewall rules, and what potential security risks are associated with using a default policy of ACCEPT?</span></span></span></h3><br />]]></description>
		</item>
		<item>
			<title>2.firewall strategies,what are the two fundamental scenarios discussed for protecting machines</title>
			<link>https://www.emblogic.com/forum/discussion/1293/2-firewall-strategieswhat-are-the-two-fundamental-scenarios-discussed-for-protecting-machines</link>
			<pubDate>Fri, 02 Feb 2024 15:41:00 +0530</pubDate>
			<dc:creator>pravjot</dc:creator>
			<guid isPermaLink="false">1293@/forum/discussions</guid>
			<description><![CDATA[<h3><span style="font-family: Georgia, serif; color: #800000;"><span>014.01.60.</span></span><span><span><span><strong>2. </strong></span><span>In the context of firewall strategies, what are the two fundamental scenarios discussed for protecting machines, and how do the rules differ when protecting individual machines versus a network of machines?</span></span></span></h3><br />]]></description>
		</item>
		<item>
			<title>1. Enhancing the security of an individual machine by configuring firewall rules in the INPUT chain</title>
			<link>https://www.emblogic.com/forum/discussion/1292/1-enhancing-the-security-of-an-individual-machine-by-configuring-firewall-rules-in-the-input-chain</link>
			<pubDate>Fri, 02 Feb 2024 15:38:59 +0530</pubDate>
			<dc:creator>pravjot</dc:creator>
			<guid isPermaLink="false">1292@/forum/discussions</guid>
			<description><![CDATA[<h3><span style="font-family: Georgia, serif; color: #800000;"><span>014.01.60.</span></span><span><span><span><strong>1. </strong></span><span>How can you enhance the security of an individual machine by configuring firewall rules in the INPUT chain, and what is the significance of setting the policy to DROP?</span></span></span></h3><br />]]></description>
		</item>
		<item>
			<title>3.execution of iptables commands,configuring the INPUT chain</title>
			<link>https://www.emblogic.com/forum/discussion/1240/3-execution-of-iptables-commandsconfiguring-the-input-chain</link>
			<pubDate>Sun, 28 Jan 2024 22:52:37 +0530</pubDate>
			<dc:creator>pravjot</dc:creator>
			<guid isPermaLink="false">1240@/forum/discussions</guid>
			<description><![CDATA[<span style="font-family: Georgia, serif; color: #800000;"><span><b>014.01.60.</b></span></span><b>5. </b><span>Discuss the potential consequences and precautions mentioned regarding the execution of iptables commands, especially when configuring the INPUT chain, and why caution is advised when implementing these rules on a machine with remote access.</span>]]></description>
		</item>
		<item>
			<title>4. Explain the steps involved in configuring iptables to allow ICMP traffic</title>
			<link>https://www.emblogic.com/forum/discussion/1239/4-explain-the-steps-involved-in-configuring-iptables-to-allow-icmp-traffic</link>
			<pubDate>Sun, 28 Jan 2024 22:51:50 +0530</pubDate>
			<dc:creator>pravjot</dc:creator>
			<guid isPermaLink="false">1239@/forum/discussions</guid>
			<description><![CDATA[<h3><span style="font-family: Georgia, serif; color: #800000;"><span>014.01.60.</span></span><span><span><span><strong>4. </strong></span><span>Explain the steps involved in configuring iptables to allow ICMP traffic, particularly for ping and other utilities, while maintaining a secure firewall setup.</span></span></span></h3><br />]]></description>
		</item>
		<item>
			<title>3.allow only trusted packets and deny everything else when configuring firewall rules</title>
			<link>https://www.emblogic.com/forum/discussion/1238/3-allow-only-trusted-packets-and-deny-everything-else-when-configuring-firewall-rules</link>
			<pubDate>Sun, 28 Jan 2024 22:51:16 +0530</pubDate>
			<dc:creator>pravjot</dc:creator>
			<guid isPermaLink="false">1238@/forum/discussions</guid>
			<description><![CDATA[<h3><span style="font-family: Georgia, serif; color: #800000;"><span>014.01.60.</span></span><span><span><span><strong>3. </strong></span><span>Why is it crucial to allow only trusted packets and deny everything else when configuring firewall rules, and what potential security risks are associated with using a default policy of ACCEPT?</span></span></span></h3><br />]]></description>
		</item>
		<item>
			<title>2.firewall strategies for protecting machines,protecting individual machines vs nw of mcs</title>
			<link>https://www.emblogic.com/forum/discussion/1237/2-firewall-strategies-for-protecting-machinesprotecting-individual-machines-vs-nw-of-mcs</link>
			<pubDate>Sun, 28 Jan 2024 22:50:32 +0530</pubDate>
			<dc:creator>pravjot</dc:creator>
			<guid isPermaLink="false">1237@/forum/discussions</guid>
			<description><![CDATA[<h3><span style="font-family: Georgia, serif; color: #800000;"><span>014.01.60.2.</span></span><strong>&nbsp;</strong><span>In the context of firewall strategies, what are the two fundamental scenarios discussed for protecting machines, and how do the rules differ when protecting individual machines versus a network of machines?</span></h3><br />]]></description>
		</item>
		<item>
			<title>1.configuring firewall rules in the INPUT chain, setting the policy to DROP</title>
			<link>https://www.emblogic.com/forum/discussion/1236/1-configuring-firewall-rules-in-the-input-chain-setting-the-policy-to-drop</link>
			<pubDate>Sun, 28 Jan 2024 22:48:27 +0530</pubDate>
			<dc:creator>pravjot</dc:creator>
			<guid isPermaLink="false">1236@/forum/discussions</guid>
			<description><![CDATA[<span style="font-family: Arial, Verdana;"><span><b>014.01.60.1. How can you enhance the security of an individual machine by configuring firewall rules in the INPUT chain, and what is the significance of setting the policy to DROP?</b></span></span>]]></description>
		</item>
   </channel>
</rss>