Home PC Games Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ Rely on IP chain established Linux firewall     - Increase Linux system security --chattr (Linux)

- MySQL password on those things you should know (Database)

- Linux / Raspberry Pi using the following command-line based web browser (Linux)

- Git build a team development environment operating drills (Linux)

- How do I switch from NetworkManager to systemd-network on Linux (Linux)

- The Definitive Guide to Linux NAT network connection (Linux)

- Ubuntu deploying Solr (4.4) to Tomcat (7.0.53) (Server)

- You need to know 12 Git High Command (Linux)

- To install network scanning and packet sniffer tool Nmap 7.00 under ubuntu (Linux)

- Oracle 11g creates virtual private directory RMAN-06004 ORA-00942 error handling (Database)

- Linux iostat command example explanation (Linux)

- Ubuntu set Swap Space Tutorial (Linux)

- Safe learning through self-extracting package to achieve invasion (Linux)

- Java Annotation Comments (Programming)

- Ubuntu study notes and related problem solving (Linux)

- MySQL service failed to start thinking of settlement under CentOS7 (Database)

- Ubuntu 14.04 Install WordPress on Nginx (Server)

- The Linux C truncate function clears the file notes (Programming)

- Executable file format Explanation under Linux (Linux)

- Workspace Go language and environment variables GOPATH (Linux)

 
         
  Rely on IP chain established Linux firewall
     
  Add Date : 2018-11-21      
         
         
         
  Although the Linux operating system has many advantages, their safety is also high, but you should not resulting into a false sense of security, because the security of your Linux system still might be compromised. Now let us look at how to use the IP chain (IPchains) to create Linux system firewall to protect your system from damage.

Assume you already have some basic knowledge about the Internet. It should be said, familiar as IP address, type TCP port and network transmission of data, the vocabulary is very useful. To have a general understanding of the firewall is very necessary.

Command:

We need to establish a set of rules from such chains to enter the IP network path coming and going. Each rule is placed in one of the three chains, three chains are: Chain store input data input, storage and output chain transmission chain output data.

Each additional rule, we must start from the IP chain, and to add some or all of the following steps. Additional (Append), delete (Delete), insert (Insert) and replacement (Replace), these commands are usually followed after the initial IP chains command and directs the program should be added to the rules on which the command chain and how to add . Added to -A, -D, -I, or -R start, plus the name behind these chain letters (input or output chain chain).

When you want to use the Insert command, must be added to the command position, behind the chain name specific line numbers.

When you use the Replace command, you need to specify the line number to be replaced, use the Delete command, you must also specify the number of rows to be deleted.

When you use the Delete option, and then enter the number behind the line without any other content. As long as you type ipchains -L, you can find the role of command line number.
     
         
         
         
  More:      
 
- JQuery implements the same content merge cells (Programming)
- Linux iptables: basic principles and rules (Linux)
- Git version rollback (Linux)
- Gitolite how to import other Git repositories (Server)
- About AWR More Description (Database)
- C ++ pointer of the (error-prone model) (Programming)
- To add the Oracle JDBC driver in Maven repository (Linux)
- On the PC goes heavy security watch your startup items (Linux)
- Ubuntu system safe and caution sudo su command (Linux)
- Linux commands with browsing and downloading files (Linux)
- MySQL partition summary (Database)
- Solve ORA-01012: not logged on (Database)
- VMware clone Linux find eth0 (Linux)
- Ubuntu Series Installation Docker (Linux)
- numpy and SciPy installation under Python for scientific computing package (Linux)
- Use install_updates upgrade GAMIT / GLOBK (Linux)
- Ubuntu 12.04 64bit Install Source Insight 3.5 and create desktop icons (Linux)
- Hazelcast integration with MongoDB (Database)
- Vim plugin installation YouCompleteMe (Linux)
- Oracle11g Trigger Debugging Record Error: PLS-00201: identifier SYS.DBMS_SYSTEM 'must be declared (Database)
     
           
     
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.