Configuring a firewall and working with IPTables
In this recipe we will learn how to implement additional security measures by working with IPTables in order to configure the firewall.
By default, CentOS is made available with an extremely powerful firewall. More commonly known as IPTables, it is based on the use of IP addresses, protocols and ports, and provides you with the ability to manage all connection activity in and out of your server. Rules are based on chains (INPUT
, OUTPUT
, and FORWARD
) and you maintain the ability to ACCEPT
, DROP
, or REJECT
activity based on your criteria. IPTables will be the foundation of your server's security and for this reason, it is the purpose of this recipe to show you how to replace the pre-installed rule ...
Get CentOS 6 Linux Server Cookbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.