Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Rely on IP chain established Linux firewall     - Linux and Windows virtual machine shared folders ---- Linux install VMware tools (Linux)

- Let's Encrypt with semiautomatic into Nginx configuration https (Server)

- Java memory model subclasses (Programming)

- A step by step teach have to install multi-node cluster configuration Hadoop (Server)

- Use source packages compiled and installed GCC5.1 in Mac OS X 10.10.3 (Linux)

- Linux Learning --- disk partition / relational representation + mount (Linux)

- Upgrading to Debian 7.6 glibc 2.15 (Linux)

- Git Experience Sharing - Using a remote repository (Linux)

- Ubuntu How to install screen recording tool Simple Screen Recorder 0.3.1 (Linux)

- Nginx supports user multi-threaded downloads and resume broken (Server)

- Linux system security infrastructure Highlights (Linux)

- Linux boot process (Linux)

- Ubuntu 15.04 installed JDK and configured as the default JDK (Linux)

- Linux Mint 17.2 64 bit installation Docker and management software seagull (Linux)

- OpenDaylight Helium version installed (Linux)

- Depth understanding of the TCP protocol (Database)

- Fast Learning Clojure (Programming)

- Oracle Bug caused by the collection of AWR Snapshot fault (Database)

- CentOS Linux build SVN server (Server)

- Linux Powerful command Awk Introduction (Linux)

  Rely on IP chain established Linux firewall
  Add Date : 2018-11-21      
  Although the Linux operating system has many advantages, their safety is also high, but you should not resulting into a false sense of security, because the security of your Linux system still might be compromised. Now let us look at how to use the IP chain (IPchains) to create Linux system firewall to protect your system from damage.

Assume you already have some basic knowledge about the Internet. It should be said, familiar as IP address, type TCP port and network transmission of data, the vocabulary is very useful. To have a general understanding of the firewall is very necessary.


We need to establish a set of rules from such chains to enter the IP network path coming and going. Each rule is placed in one of the three chains, three chains are: Chain store input data input, storage and output chain transmission chain output data.

Each additional rule, we must start from the IP chain, and to add some or all of the following steps. Additional (Append), delete (Delete), insert (Insert) and replacement (Replace), these commands are usually followed after the initial IP chains command and directs the program should be added to the rules on which the command chain and how to add . Added to -A, -D, -I, or -R start, plus the name behind these chain letters (input or output chain chain).

When you want to use the Insert command, must be added to the command position, behind the chain name specific line numbers.

When you use the Replace command, you need to specify the line number to be replaced, use the Delete command, you must also specify the number of rows to be deleted.

When you use the Delete option, and then enter the number behind the line without any other content. As long as you type ipchains -L, you can find the role of command line number.
- Getting Started with Linux system to learn: how to check memory usage of Linux (Linux)
- C ++ Learning Notes: references (Programming)
- OpenVPN offsite interconnecting room availability and load balancing solution (Server)
- Use cmake to compile and install MySQL 5.5 (Database)
- Samba file sharing server set up (Server)
- Github inventory objects Algorithm (Linux)
- Java multithreading easy to confuse the concept (Programming)
- Linux (SUSE) mount NTFS mobile hard practice (Linux)
- Ambari and Hadoop configuration, management and monitoring of the project Getting (Server)
- Zabbix configure DataGuard monitoring (Database)
- Examples of testing and installation Mesos on CentOS (Linux)
- How to install CentOS 7.x in OpenERP (Odoo) (Linux)
- CentOS 6.5 three ways to configure the IP address (Linux)
- Installation of Python2.7.10 under CentOS 6.4 (Linux)
- Linux keyboard recording script (Linux)
- High-performance JavaScript DOM programming (Programming)
- Java polymorphism and exception handling (Programming)
- Linux iptables firewall and vsftpd to resolve the issue (Linux)
- VMware6 achieve nat Internet (Linux)
- Use GNU / Linux broadcasting of television programs (Linux)
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.