Home PC Games Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ Rely on IP chain established Linux firewall     - Linux Command - ps: a snapshot of the current process (Linux)

- VMware difference in three network connection (Linux)

- linux raid levels and concepts introduced (Linux)

- Linux5.8 installed phpMyAdmin was unable to issue related php-mcrypt (Database)

- Use lsof restore accidentally deleted log files or database (Linux)

- Analysis of Java reflection mechanism (Programming)

- Install Linux Mint 17: 20 things to do (Linux)

- Hyper-V virtual hard disk how to copy files to and attached to the virtual machine (Linux)

- Manually generate AWR reports (Database)

- How Linux system password security guarantee (Linux)

- Spring Data JPA @EnableJpaRepositories configuration in detail (Programming)

- Oracle create user authorization and in PLSQL (Database)

- MongoDB slice simple example (Database)

- Linux dd command make U disk boot disk (Linux)

- Linux Log Clear (Linux)

- Ubuntu 14.04 CodeBlocks configuration manually compile Boost 1.57.0 (Linux)

- C ++ CBitmap, HBitmap, Bitmap difference and contact (Programming)

- Java String type time compare the size (Programming)

- MySQL partition table Comments (Database)

- Defensive programming in PHP (Programming)

 
         
  Rely on IP chain established Linux firewall
     
  Add Date : 2018-11-21      
         
         
         
  Although the Linux operating system has many advantages, their safety is also high, but you should not resulting into a false sense of security, because the security of your Linux system still might be compromised. Now let us look at how to use the IP chain (IPchains) to create Linux system firewall to protect your system from damage.

Assume you already have some basic knowledge about the Internet. It should be said, familiar as IP address, type TCP port and network transmission of data, the vocabulary is very useful. To have a general understanding of the firewall is very necessary.

Command:

We need to establish a set of rules from such chains to enter the IP network path coming and going. Each rule is placed in one of the three chains, three chains are: Chain store input data input, storage and output chain transmission chain output data.

Each additional rule, we must start from the IP chain, and to add some or all of the following steps. Additional (Append), delete (Delete), insert (Insert) and replacement (Replace), these commands are usually followed after the initial IP chains command and directs the program should be added to the rules on which the command chain and how to add . Added to -A, -D, -I, or -R start, plus the name behind these chain letters (input or output chain chain).

When you want to use the Insert command, must be added to the command position, behind the chain name specific line numbers.

When you use the Replace command, you need to specify the line number to be replaced, use the Delete command, you must also specify the number of rows to be deleted.

When you use the Delete option, and then enter the number behind the line without any other content. As long as you type ipchains -L, you can find the role of command line number.
     
         
         
         
  More:      
 
- To install network scanning and packet sniffer tool Nmap 7.00 under ubuntu (Linux)
- Android to determine whether the device to open WIFI, GPRS data connection (Programming)
- How to Start a Linux application running in the background using the terminal mode (Linux)
- To solve the Mac in question invalid BASH under configuration environment variable (Linux)
- Upgrading to Debian 7.6 glibc 2.15 (Linux)
- Github Getting Started Basic Course (Linux)
- Git commands (Linux)
- Give your photos Instagram style filters plus program in ubuntu (Linux)
- How to install Linux Kernel 4.0 On CentOS 7 system (Linux)
- Java, boolean operators & =, | = ^ = use (Programming)
- Linux System Getting Started Tutorial: How to Force Change your password at next logon Linux (Linux)
- Oracle multi-user concurrency and transaction processing (Database)
- Zorin OS: Linux novice most personal desktop system should be used (Linux)
- Linux system security reinforcement (Linux)
- 14.04.3 Ubuntu configuration and successfully compiled source code Android 6.0 r1 (Programming)
- Hadoop 2.6.0 standalone configuration and pseudo-distributed configuration under Ubuntu 14.04 (Server)
- Remove old kernel on Ubuntu (Linux)
- How to add two-factor authentication for Linux systems SSH (Linux)
- Elaborate .NET Multithreading: Concepts (Programming)
- The SVN installation, configuration and start - up under Linux (CentOS 6.5) (Server)
     
           
     
  CopyRight 2002-2020 newfreesoft.com, All Rights Reserved.