Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Rely on IP chain established Linux firewall     - Oracle View index and use indexes Precautions (Database)

- BGP routers want to play it by CentOS (Linux)

- 3 tips Linux command (Linux)

- Docker command Detailed (Linux)

- Three kinds of implementation model of the Linux thread history (Programming)

- Spacewalk remove packages install the update (Linux)

- How to find an IP address through the command line (Linux)

- Linux check disk parameters trapping lack amendments (Linux)

- Java Concurrency - processes and threads (Programming)

- Tip: Use Cryptsetup U disk encryption (Linux)

- Shell Script: create a function and specify a directory for download (Programming)

- Linux Getting Started Tutorial: How to set up a static MAC address on VMware ESXi virtual machine (Mobile)

- Oracle 12C RAC optimizer_adaptive_features cause of data into overtime (Database)

- Ubuntu users how to install the latest Nvidia graphics drivers (Linux)

- Grading defense against Linux server attacks (Linux)

- GRUB2 boot Ubuntu Manual (Linux)

- LogStash log analysis display system (Linux)

- MongoDB simple replication configuration (Database)

- Linux using TCP-Wrapper Service Management (Linux)

- MySQL restart process can not be taken lightly (Database)

  Rely on IP chain established Linux firewall
  Add Date : 2018-11-21      
  Although the Linux operating system has many advantages, their safety is also high, but you should not resulting into a false sense of security, because the security of your Linux system still might be compromised. Now let us look at how to use the IP chain (IPchains) to create Linux system firewall to protect your system from damage.

Assume you already have some basic knowledge about the Internet. It should be said, familiar as IP address, type TCP port and network transmission of data, the vocabulary is very useful. To have a general understanding of the firewall is very necessary.


We need to establish a set of rules from such chains to enter the IP network path coming and going. Each rule is placed in one of the three chains, three chains are: Chain store input data input, storage and output chain transmission chain output data.

Each additional rule, we must start from the IP chain, and to add some or all of the following steps. Additional (Append), delete (Delete), insert (Insert) and replacement (Replace), these commands are usually followed after the initial IP chains command and directs the program should be added to the rules on which the command chain and how to add . Added to -A, -D, -I, or -R start, plus the name behind these chain letters (input or output chain chain).

When you want to use the Insert command, must be added to the command position, behind the chain name specific line numbers.

When you use the Replace command, you need to specify the line number to be replaced, use the Delete command, you must also specify the number of rows to be deleted.

When you use the Delete option, and then enter the number behind the line without any other content. As long as you type ipchains -L, you can find the role of command line number.
- 10 Best Swift Tutorial examples (Programming)
- MyCAT easy entry (Database)
- Three binary tree traversal (recursive, non-recursive traversal and Morris) (Programming)
- ORA-4031 error Solution (Database)
- Linux security configuration (Linux)
- Log4Net (Linux)
- 10 tips daily Docker (Server)
- Oracle table space is too large processing time (Database)
- Linux System Getting Started Tutorial: How to update outdated version of Ubuntu (Linux)
- To obtain installation package (RPM) under RHEL6 (Linux)
- Ubuntu 12.04 installation NVIDIA GTX750 graphics driver (Linux)
- Shell Script: create a function and specify a directory for download (Programming)
- How to view the Linux program or process used in the library (Linux)
- Installation Android IDE development tools, Android Studio 1.5 under Ubuntu (Linux)
- How to configure Apache Solr on Ubuntu 14/15 (Server)
- To install and deploy Java applications under CentOS 6.5 (Linux)
- Kali Linux resolve GPG error KEYEXPIRED 1425567400 (Linux)
- How to clean up your Ubuntu 14.10 / 14.04 / 13.10 system (Linux)
- Seven kinds of NIC binding mode Detail (Linux)
- Realize screen recording and playback via Linux command (Linux)
  CopyRight 2002-2020 newfreesoft.com, All Rights Reserved.