Home PC Games Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ Rely on IP chain established Linux firewall     - RHEL6 install Python and other packages from source (Linux)

- Win7 used Eclipse to connect the virtual machine in Ubuntu Hadoop2.4 (Server)

- Linux NIC configuration (Linux)

- Unable to solve the official version of Android Studio online update problem (Linux)

- File compression and packaging commands under Linux (Linux)

- QEMU image file used: qcow2 and raw (Linux)

- Android Studio Personalization (Linux)

- MySQL binlog group to submit XA (two-phase commit) (Database)

- To install Oracle Database Details and FAQ Summary under CentOS (Database)

- Oracle 11g DataGuard service to start automatically (Database)

- CentOS yum install LAMP (Server)

- Java garbage collection and heap memory layout (Programming)

- MongoDB query statistics grouping remove duplicate records (Database)

- 10 easy to use Linux utilities Recommended (Linux)

- grep, egrep and regular expressions (Linux)

- The best tools and techniques to find data on a Unix system (Linux)

- Linux, MySQL root privilege escalation another method (Linux)

- Install the latest development version of Wine on RedHat and Debian-based systems (Linux)

- CentOS7 set boot directly into the command line interface (Linux)

- Linux environment to configure Apache + Django + wsgi (Server)

 
         
  Rely on IP chain established Linux firewall
     
  Add Date : 2018-11-21      
         
         
         
  Although the Linux operating system has many advantages, their safety is also high, but you should not resulting into a false sense of security, because the security of your Linux system still might be compromised. Now let us look at how to use the IP chain (IPchains) to create Linux system firewall to protect your system from damage.

Assume you already have some basic knowledge about the Internet. It should be said, familiar as IP address, type TCP port and network transmission of data, the vocabulary is very useful. To have a general understanding of the firewall is very necessary.

Command:

We need to establish a set of rules from such chains to enter the IP network path coming and going. Each rule is placed in one of the three chains, three chains are: Chain store input data input, storage and output chain transmission chain output data.

Each additional rule, we must start from the IP chain, and to add some or all of the following steps. Additional (Append), delete (Delete), insert (Insert) and replacement (Replace), these commands are usually followed after the initial IP chains command and directs the program should be added to the rules on which the command chain and how to add . Added to -A, -D, -I, or -R start, plus the name behind these chain letters (input or output chain chain).

When you want to use the Insert command, must be added to the command position, behind the chain name specific line numbers.

When you use the Replace command, you need to specify the line number to be replaced, use the Delete command, you must also specify the number of rows to be deleted.

When you use the Delete option, and then enter the number behind the line without any other content. As long as you type ipchains -L, you can find the role of command line number.
     
         
         
         
  More:      
 
- Percona MySQL 5.6 semi-synchronous replication (Database)
- Mac OS X 10.9 build Nginx + MySQL + php-fpm environment (Server)
- Resolve the host via KVM console can not connect clients (Linux)
- Android source code compiled fatal error solutions (Programming)
- Ceph distributed storage system is installed on a CentOS 7.1 (Server)
- No password on Oracle and MySQL login (Database)
- Using packet capture libpcap be reconciliation package in Ubuntu 14.04 64 bits (Linux)
- The Sublime Text 3 configuration file (Linux)
- HTTP Client Hints Introduction (Server)
- ActiveMQ5.10.2 version configuration JMX (Linux)
- Erlang concurrency and foundation (Programming)
- To set up the printer use Nagios Monitoring Server (Server)
- How to allow users to access only a specific database (MSSQL) (Database)
- Use dump restore mode fast backup and recovery system FreeBSD (Linux)
- Linux RPM (Linux)
- The maximum subsequence algorithm and optimization problems (Programming)
- Install the latest Pinta graphics editing software on Ubuntu 14.04 (Linux)
- Install Java, Maven, Tomcat under Linux (Linux)
- C # socket udp broadcast (Programming)
- CentOS / RedHat system partition essential requirements and partition scheme (Linux)
     
           
     
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.