Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Rely on IP chain established Linux firewall     - To read the Linux ext3 / ext4 format partitions under Windows system software (Linux)

- RHEL6.4 one key installation Redmine (Linux)

- Java thread lifecycle (Programming)

- Enterprise Hadoop cluster architecture - Hadoop installation (Server)

- Linux file permissions and access modes (Linux)

- Go performed using iOS and Android programming (Programming)

- The Java utility, JavaMail (Programming)

- grep command usage (Linux)

- phpinfo (): like phpinfo as a Python script (Programming)

- Access clipboard content across multiple vim instances in a terminal (Linux)

- Performance comparison Fibonacci recursive and non-recursive (Programming)

- CentOS yum install LNMP PHP5.4 version (Server)

- Oracle 12c R2 new feature dbca command to create a standby database (Database)

- Windows7 / 8 / 8.1 hard drive to install Ubuntu 14.04 dual system (Linux)

- Linux process scheduling opportunity (Programming)

- 8 Docker knowledge you may not know (Server)

- VMware virtual machine to use bridged mode fast Internet access (Linux)

- PostgreSQL log classification and management (Database)

- CentOS directory structure Explanation (Linux)

- How to force Linux users to change the initial password the first time you log in (Linux)

  Rely on IP chain established Linux firewall
  Add Date : 2018-11-21      
  Although the Linux operating system has many advantages, their safety is also high, but you should not resulting into a false sense of security, because the security of your Linux system still might be compromised. Now let us look at how to use the IP chain (IPchains) to create Linux system firewall to protect your system from damage.

Assume you already have some basic knowledge about the Internet. It should be said, familiar as IP address, type TCP port and network transmission of data, the vocabulary is very useful. To have a general understanding of the firewall is very necessary.


We need to establish a set of rules from such chains to enter the IP network path coming and going. Each rule is placed in one of the three chains, three chains are: Chain store input data input, storage and output chain transmission chain output data.

Each additional rule, we must start from the IP chain, and to add some or all of the following steps. Additional (Append), delete (Delete), insert (Insert) and replacement (Replace), these commands are usually followed after the initial IP chains command and directs the program should be added to the rules on which the command chain and how to add . Added to -A, -D, -I, or -R start, plus the name behind these chain letters (input or output chain chain).

When you want to use the Insert command, must be added to the command position, behind the chain name specific line numbers.

When you use the Replace command, you need to specify the line number to be replaced, use the Delete command, you must also specify the number of rows to be deleted.

When you use the Delete option, and then enter the number behind the line without any other content. As long as you type ipchains -L, you can find the role of command line number.
- Oracle first Automated Installation Packages (Database)
- C language sorting instance (select, bubble, insert, binary, fast) (Programming)
- Python decorators to learn and practice the actual usage scenarios (Programming)
- Sniffer install applications in Linux supplement (Linux)
- 30 Practical Linux system administrators will learn the command (Linux)
- The formatted Linux hard drive and mount (Linux)
- What happens after the MySQL disk space is full (Database)
- Qt signals and slots mechanism (Programming)
- Using Linux stat command to view the files (Linux)
- Spring next ActiveMQ combat (Programming)
- Bash common several configuration files (Linux)
- C # Future: Method Contract (Programming)
- How to ensure that the Internet will not be attacked (Linux)
- Which file system is most suitable for your Linux system (Linux)
- QBit development of micro-services (Server)
- Java reflection Introduction (Programming)
- Teach you how to protect the security of Linux desktop (Linux)
- 24 Docker recommendations (Linux)
- Setting Squid successful anti-hotlinking (Linux)
- Usage logs Python library (Programming)
  CopyRight 2002-2020 newfreesoft.com, All Rights Reserved.