Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Rely on IP chain established Linux firewall     - How to configure AWStats in Ubuntu Server (Server)

- Selection sort, insertion sort, and Shell sort (Programming)

- CentOS 6.5 installation and deployment SVN 1.8.10 (Linux)

- C ++ copy constructor (Programming)

- Ambari and Hadoop configuration, management and monitoring of the project Getting (Server)

- Based on OpenSSL for HTTPS service configuration (Server)

- zBackup: A versatile tool to remove duplicate backup (Linux)

- Nginx version information hidden or modified (Server)

- Shell commonly commands (Linux)

- Linux (RHEL5) general optimization system security (Linux)

- Linux system performance monitoring with Nmon (Linux)

- Linux shell script to adjust the Task Scheduler (Linux)

- Struts2 dynamic call DMI and error Solution (Programming)

- Build their own recursive DNS server (Server)

- Oracle 11g forget approach SYS and SYSTEM password (Database)

- Restore database fault encountered ORA-0600 (Database)

- Linux C programming and Shell Programming in the development of practical tools similarities summary (Programming)

- Use MD5 transform algorithm to prevent exhaustive decipher passwords (Linux)

- Github Getting Started Basic Course (Linux)

- Linux kernel to achieve soft RPS network to receive soft interrupt load balancing to distribute (Linux)

  Rely on IP chain established Linux firewall
  Add Date : 2018-11-21      
  Although the Linux operating system has many advantages, their safety is also high, but you should not resulting into a false sense of security, because the security of your Linux system still might be compromised. Now let us look at how to use the IP chain (IPchains) to create Linux system firewall to protect your system from damage.

Assume you already have some basic knowledge about the Internet. It should be said, familiar as IP address, type TCP port and network transmission of data, the vocabulary is very useful. To have a general understanding of the firewall is very necessary.


We need to establish a set of rules from such chains to enter the IP network path coming and going. Each rule is placed in one of the three chains, three chains are: Chain store input data input, storage and output chain transmission chain output data.

Each additional rule, we must start from the IP chain, and to add some or all of the following steps. Additional (Append), delete (Delete), insert (Insert) and replacement (Replace), these commands are usually followed after the initial IP chains command and directs the program should be added to the rules on which the command chain and how to add . Added to -A, -D, -I, or -R start, plus the name behind these chain letters (input or output chain chain).

When you want to use the Insert command, must be added to the command position, behind the chain name specific line numbers.

When you use the Replace command, you need to specify the line number to be replaced, use the Delete command, you must also specify the number of rows to be deleted.

When you use the Delete option, and then enter the number behind the line without any other content. As long as you type ipchains -L, you can find the role of command line number.
- BGP routers want to play it by CentOS (Linux)
- How to fix Not Enough Free Disk Space On / boot on Ubuntu (Linux)
- MongoDB3.0.x version of the user authorization profile (stand-alone environment) (Database)
- Unix / Linux commonly used to clean up disk space command (Linux)
- Installation of Ubuntu Make under Ubuntu 15.10 (Linux)
- Through eight skills to let you become a super Linux end-user (Linux)
- Java, extends and implements Usage (Programming)
- MySQL service failed to start thinking of settlement under CentOS7 (Database)
- The Definitive Guide to Linux NAT network connection (Linux)
- Analysis of Java exception (Programming)
- Ubuntu 14.04 / 12.04 subscribe users to install software Liferea 1.10.10 (Linux)
- PostgreSQL Stream Configuration (Database)
- Binary tree traversal recursive and non-recursive (cyclic) traversal achieve (Programming)
- C ++ inline functions (Programming)
- When Vim create Python scripts, vim autocomplete interpreter and encoding method (Programming)
- Setting Wetty do not need an account login command line operations (Linux)
- Using a proxy method under Linux terminal (Linux)
- Linux system security knowledge (Linux)
- How to query the role of Linux services (Linux)
- PostgreSQL 9.4.3 Installation and Configuration under CentOS 6.5 (Database)
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.