Run the rule from exercise 8 using the direct option of firewall-cmd.

What will be an ideal response?


$ su -c 'firewall-cmd --direct --passthrough ipv4 --append FORWARD -p tcp --dport smtp \
--source 10.10.0.10 --jump DROP'

Computer Science & Information Technology

You might also like to view...

If you don't stop recording actions, Photoshop will record your steps for hours.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In a lookup table, the number of the column which contains the return values is called the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Cost resources are resources consumed during the project

Indicate whether the statement is true or false

Computer Science & Information Technology

A botmaster uses Malware to hijack thousands of computers and control them remotely; the controlled computers are called_____

A. robots B. zombies C. worms D. Trojan horses

Computer Science & Information Technology