Create a network Topology Setup in such a way so that System A can ping to two Systems ,System B and System C but both these systems should not be pinging each other without using any security rule e.g firewall etc.

SUMIT CHATTERJEE
3 min readJun 3, 2021

when we use networking platform to communicate , always keep one thing in our mind i.e security . There are different type tools and technology we use to secure our data and our system also, when we communicate over the network. But, Routing table isn’t any tool or technology still, using this Table somehow we can secure our system . If you perform this same task in your system then you will feel that using Routing table & Netmask concept how we can secure our device .

✅ To Perform this Task you need these stuff given below:-

  1. Three Host (A, B & C , host name )

2. Make sure , Host-only Adapter must be enable in each host

✅ Follow these steps to perform this task: -

Step 1:- Assign this IP address and Netmask to Host A using the command which is given below :

ifconfig enp0s3 192.168.56.1 netmask 255.255.255.248

Step2:- Add this Route in the route table of Host A

route add -net 192.168.56.0 netmask 255.255.255.248 enp0s3

Step 3:- Assign this IP address and Netmask to Host B using the command which is given below :

ifconfig enp0s3 192.168.56.4 netmask 255.255.255.248

Step 4:- Add this Route in the route table of Host B

route add -net 192.168.56.0 netmask 255.255.255.252 enp0s3

Step 5:- Assign this IP address and Netmask to Host C using the command which is given below :

ifconfig enp0s3 192.168.56.6 netmask 255.255.255.248

Step 6:- Add this Route in the route table of Host C

route add -net 192.168.56.0 netmask 255.255.255.252 enp0s3

✅ Now, Let’s see working or not…

In Host A,

You can see in the given below image , Host A can Ping Host B and Host C also.

In Host B,

You can see Host B can Ping only Host A, can’t ping Host C.

In Host C,

You can see Host C can Ping only Host A, can’t ping Host B.

Finally, done!!😊 Hope, This Article helped you a lot to solve this task and got an idea how routing table helps us to secure our system . Suppose, any Hacker is pinging your system , using this concept you can secure your system .

I will come up with a new article . If this article helped you then leave a comment 👍

--

--

SUMIT CHATTERJEE
0 Followers

RHCSA | AWS | OPENSHIFT | TERRAFORM | AI