783
edits
Line 165: | Line 165: | ||
=== 23 March === | === 23 March === | ||
==== Exercise V | ==== Exercise V: Kinetic firewall ==== | ||
* Note that -l in the instructions (e.g. infected -1) is not a numeric "1", but the small version of "L" | * Note that -l in the instructions (e.g. infected -1) is not a numeric "1", but the small version of "L" | ||
* Kinetic Firewall [https://dl.dropboxusercontent.com/u/1652374/SDN_Course/Exercises/kinetic.pdf Instructions], [https://dl.dropboxusercontent.com/u/1652374/SDN_Course/Exercises/kinetic_gardenwall.py Starting_Code] | * Kinetic Firewall [https://dl.dropboxusercontent.com/u/1652374/SDN_Course/Exercises/kinetic.pdf Instructions], [https://dl.dropboxusercontent.com/u/1652374/SDN_Course/Exercises/kinetic_gardenwall.py Starting_Code] | ||
==== Exercise VI: Pyretic Debugging ==== | ==== Exercise VI (Part A): Pyretic Debugging ==== | ||
[https://wiki.net.informatik.uni-goettingen.de/w/index.php?title=exercises_pyretic_debugging Exercise_Pyretic_Debugging] | [https://wiki.net.informatik.uni-goettingen.de/w/index.php?title=exercises_pyretic_debugging Exercise_Pyretic_Debugging] | ||
==== Exercise VI (Part B): Kinetic like firewall using pox ==== | ==== Exercise VI (Part B): Kinetic like firewall using pox ==== |
edits