Consider a NAT device between a private and the public network. Suppose the private network uses addresses in the range 10.0.1.0-10.0.1.255, and suppose that the interface of the NAT device to the public network has IP address 128.143.136.80.
Write the iptables command so that the addresses in the private network are mapped to the public IP address 128.143.136.80.
What will be an ideal response?
```
iptables –t nat –A POSTROUTING –j SNAT --to 128.143.136.80 –s
10.0.1.0/24
```
You might also like to view...
Which JFrame constant indicates that the program should terminate when the window is closed by the user?
a. TERMINATE_ON_CLOSE. b. IMMEDIATELY_CLOSE. c. EXIT_ON_CLOSE. d. All of the above.
Asymmetric encryption transforms plaintext into __________ using one of two keys and an encryption algorithm.
Fill in the blank(s) with the appropriate word(s).
Why is it necessary to introduce some methods and documentation from plan-based approaches when scaling agile methods to larger projects that are developed by distributed development teams.
What will be an ideal response?
The ____________________ form layout places labels next to fields, and lists the fields in columns.
Fill in the blank(s) with the appropriate word(s).