The "outsider" on the left represents an attacker outside of the network you are administering. The "insider" on the right represents a computer inside the network you are tasked with protecting. Both terminals will respond to a subset of the commands associated with iptables, nmap, and ipconfig. For more details about the project please see the Thesis.
Below are a small set of commands to get you started:
Insider: Type ipconfig into the insider's terminal to learn what its IP address is.
Outsider: In the outsider terminal run nmap -p 80 [Insider IP address] to find out if port 80, which is commonly used by internet connections, is open.
Insider: Close port 80 by typing iptables -A INPUT -dport 80 -j DROP
Outsider: Run nmap -p 80 [Insider IP address] again to see if you have successfully closed the port.
Outsider: Change the outsider's IP so they can test from a different location. set ip 220.127.116.11, this is not a standard linux command, but is very handy for our WebApp.