Run the rule from exercise 8 using the direct option of firewall-cmd.
What will be an ideal response?
$ su -c 'firewall-cmd --direct --passthrough ipv4 --append FORWARD -p tcp --dport smtp \
--source 10.10.0.10 --jump DROP'
Computer Science & Information Technology
You might also like to view...
A company wants to prevent end users from plugging unapproved smartphones into PCs and transferring data. Which of the following would be the BEST control to implement?
A. MDM B. IDS C. DLP D. HIPS
Computer Science & Information Technology
An object of a subclass of ________ is used to manage the data flow between your program and the database.
a. DataFlow b. DatabaseContext c. DbContext d. EntityDataModel
Computer Science & Information Technology