Home PC Games Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ Rely on IP chain established Linux firewall     - PL / SQL data types (Database)

- Sqoop data export import command (Database)

- Difference in MySQL VARCHAR and CHAR data format (Database)

- Install Rubinius testing Ubuntu 14.04 native threads (Linux)

- Linux Powerful IDE - Geany configuration instructions (Linux)

- CentOS 5.5 kernel upgrade installation iftop (Linux)

- grep command output highlighted word (Linux)

- Oracle table space is too large processing time (Database)

- How Linux system password security guarantee (Linux)

- Dual system Linux (Ubuntu) into the Windows NTFS partition's mount error (Linux)

- Android application simulates the phone keypad (Programming)

- Linux Routine Task Scheduler (Linux)

- Linux file system (inode and block) (Linux)

- Experts teach you safety precautions Linux Sniffer (Linux)

- CentOS of NFS (Server)

- Linux operating system log system (Linux)

- You can not ignore the seven Git tips (Linux)

- FileZilla FTP && TLS connection settings of (Linux)

- How to query the role of Linux services (Linux)

- Linux System Getting Started Learning: hard disk partition, and to deal with traps (Linux)

 
         
  Rely on IP chain established Linux firewall
     
  Add Date : 2018-11-21      
         
         
         
  Although the Linux operating system has many advantages, their safety is also high, but you should not resulting into a false sense of security, because the security of your Linux system still might be compromised. Now let us look at how to use the IP chain (IPchains) to create Linux system firewall to protect your system from damage.

Assume you already have some basic knowledge about the Internet. It should be said, familiar as IP address, type TCP port and network transmission of data, the vocabulary is very useful. To have a general understanding of the firewall is very necessary.

Command:

We need to establish a set of rules from such chains to enter the IP network path coming and going. Each rule is placed in one of the three chains, three chains are: Chain store input data input, storage and output chain transmission chain output data.

Each additional rule, we must start from the IP chain, and to add some or all of the following steps. Additional (Append), delete (Delete), insert (Insert) and replacement (Replace), these commands are usually followed after the initial IP chains command and directs the program should be added to the rules on which the command chain and how to add . Added to -A, -D, -I, or -R start, plus the name behind these chain letters (input or output chain chain).

When you want to use the Insert command, must be added to the command position, behind the chain name specific line numbers.

When you use the Replace command, you need to specify the line number to be replaced, use the Delete command, you must also specify the number of rows to be deleted.

When you use the Delete option, and then enter the number behind the line without any other content. As long as you type ipchains -L, you can find the role of command line number.
     
         
         
         
  More:      
 
- Compile and install Memcached can not find GCC (Programming)
- Linux 101 hack book reading notes (Linux)
- Nginx high concurrency optimization ideas (Server)
- Vagrant failed to start, stuck in Waiting for VM to boot solution (Linux)
- MySQL high availability cluster fragmentation of deployment uses Fabric (Database)
- How to configure FirewallD in RHEL / CentOS 7 and Fedora in (Linux)
- Install the latest ATI / Nvidia graphics driver on Ubuntu (Linux)
- Android Fragment really fully resolve (Programming)
- Linux using DenyHosts prevents ssh cracks (Linux)
- Zabbix monitors Nginx status (Server)
- Sublime Text 3 (Linux)
- Java Concurrency - processes and threads (Programming)
- Git 2.5 increase in the working tree, triangle improved workflow performance (Linux)
- HttpClient Tutorial (Programming)
- Ubuntu user use PPA to install Uget 2.0.5 (Linux)
- Two network security scanning tools under ubuntu (Linux)
- Ubuntu 14.04 compile, install, configure, the latest development version GoldenDict (Linux)
- Ubuntu 14.04 to install file editor KKEdit 0.1.5 version (Linux)
- Linux system Iptables Firewall User Manual (Linux)
- Multipath configuration under Linux (Linux)
     
           
     
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.