In the company, the fourth time to modify the "firewall rules", tidy up a bit.Note: The change on the command line is temporary and requires some action to keep the rule forever, making it always effective.========================1, the first step, first look at the server "firewall rules":Iptables-lIPTABLES-L-n//Plus one-n displays IP and ports in digital form and looks more comfortableiptables-l-N--line-n
To turn off the firewall:
Firewall can be used to restrict the use of some ports, can be through the Linux command relationship to it, the corresponding instructions:To view firewall information:#service iptables StatusYou can see the state of the firewall:To turn off the firewall
Firewalls can be divided into several different levels of security. In Linux, because there are many different firewall software to choose from, security can be low and high, the most complex software can provide almost impermeable protection capabilities. However, the Linux core itself builds a simple mechanism called "camouflage", which can withstand most attac
Open ports of Linux Firewall
I. Linux firewall configuration files and commands
1. RedHat Linux System
This type of system contains various derivatives and related versions of red hat, including RHEL, CentOS, and Fedrora.
Firewall
I. linux operating systems are divided into independent services and non-independent services. The independent service script is placed under etcinitd.
I. linux operating systems are divided into independent services and non-independent services.
The independent service script is placed under/etc/init. d.
Non-independent service scripts are placed under/etc/xinetd. Non-independent services are managed by
Article Title: How to Implement the Linux firewall to make remote office more secure. Linux is a technology channel of the IT lab in China. It includes desktop applications, Linux system management, kernel research, embedded systems, open source and other basic categories. Currently, Using VPN to achieve remote office
Communication between hosts cannot send messages to the other party. It turns out to be a problem with the Linux firewall-Linux Enterprise Application-Linux server application information. The following is a detailed description. On the Linux platform, a simple inter-host co
The Astaro security Linux firewall is used to manage data traffic between the internal network and the external network. Administrators can control each protocol, blocking or allowing access to any one of the internal networks, servers, services, and user groups. The firewall checks all online information (Baotou) as well as the application information (payload)
Article Title: describes how to set up a firewall in a Linux operating system. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
To modify the f
Article Title: Practical Tips: how to set up a Linux system firewall. Linux is a technology channel of the IT lab in China. Including desktop applications, Linux system management, kernel research, embedded systems, open-source, and other basic categories. To modify firewall
IptablesHelpLinuxCreateFirewallThe specific steps are as follows:
If you have just started to enable a firewall on Linux, I suggest you try such a tool, such as lokkit (which is available in operating systems such as Fedora, RedHat, and Ubuntu ). It can be used as a wizard to let you step by step through the firewall configuration process. To use this tool, run t
table has
ACCEPT, DROP, REJECT, LOG, MIRROR, QUEUE, REDIRECT, RETURN, and ULOG.
. When a rule falls on the ACCEPT, the packet matching the rule can continue to pass.
Both. DROP and REJECT discard their packages. DROP is discarded silently, and REJECT returns an ICMP error message.
. LOG provides a simple way to track the matching rules of packages. ULOG provides a wider range of LOG records.
. REDIRECT distributes packages to a proxy instead of directly passing them through.
You may use this fu
Linux iptable firewall block and open ports
Source: http://hi.baidu.com/zplllm/item/f910cb26b621db57c38d5983
Evaluation:
1, close all the INPUT FORWARD OUTPUT only to some ports open.
Here is the command implementation:
Iptables-p INPUT DROP
Iptables-p FORWARD DROP
Iptables-p OUTPUT DROP
Then use the command iptables-l-N to see if it's set up and look good to all DROP
This setting is OK, we are only
inside the network and accessing the internal network from the Internet before.
We feel that the previous firewall was used to filter some illegal data packets, or why is one of them called the Packet Filter Firewall? Since its development, it has been increasingly used to filter data packets, convert network addresses, and act as proxies. In Linux kernel 2.4, t
Source: modify the/etc/sysconfig/iptables file to modify the firewall configuration. if you want to open a port, add one to it. -ARH-Firewall-1-INPUT-mstate -- stateNEW-mtcp-ptcp -- the dport1521-jACCEPT is ready, where 1521 is to be opened
Source: Firewall settings
To modify the firewall configuration, you need to m
Vi/etc/sysconfig/iptables-A input-m state–state new-m tcp-p tcp–dport 80-j ACCEPT (allow 80 ports through the firewall)-A input-m state–state new-m tcp-p tcp–dport 3306-j ACCEPT (Allow 3306 ports through the firewall)Special tips:Many netizens add these two rules to the last line of the firewall configuration, causing the
. Firewall implementation in Linux kernel 2.4 netfilter that's it.
Take a look at the location of the firewall, my understanding is that either it is mounted on a single machine as a personal firewall, or it is installed on a single machine to provide a gateway for a LAN, and the latter is shown in the following illus
I. linux operating systems are divided into independent services and non-independent services.
The independent service script is placed under/etc/init. d.
Non-independent service scripts are placed under/etc/xinetd. Non-independent services are managed by the independent service xinetd. If the xinetd service is disabled, all services under it will end.
Service management commands:
Chkconfig service on | off | reset restart to close the service.
C
Currently, it is common to implement remote office via VPN. There are two main shortcomings of this method: first, to ensure that VPN users can access the Intranet at any time, the computers on the Intranet must be started up for a long time, resulting in a large amount of waste of resources. Second, after a user connects to a VPN, he can only use the remote computer as a member of the network neighbor to transmit data to each other. Using Linux to ac
Use the Linux Firewall created by IP link-Linux Enterprise Application-Linux server application information. The following is a detailed description. Although the Linux operating system has many advantages and its security is high, you should not generate a false sense of se
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.