configure a linux based firewall

  1. Compare and contrast firewalld’s zones and services to iptables chain rules.
  2. Recommend a specific firewall as your preference for deployment in an enterprise that requires the highest levelsof information security, and include your rationale for that preference. Please be sure to properly cite applicable resources.