Run the rule from exercise 8 using the direct option of firewall-cmd.
What will be an ideal response?
$ su -c 'firewall-cmd --direct --passthrough ipv4 --append FORWARD -p tcp --dport smtp \
--source 10.10.0.10 --jump DROP'
Computer Science & Information Technology
You might also like to view...
If you don't stop recording actions, Photoshop will record your steps for hours.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
In a lookup table, the number of the column which contains the return values is called the ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
Cost resources are resources consumed during the project
Indicate whether the statement is true or false
Computer Science & Information Technology
A botmaster uses Malware to hijack thousands of computers and control them remotely; the controlled computers are called_____
A. robots B. zombies C. worms D. Trojan horses
Computer Science & Information Technology