Chapter 6. Network Security
In this chapter, we will discuss the following:
- Managing the TCP/IP network
- Using Iptables to configure a firewall
- Blocking spoofed addresses
- Blocking incoming traffic
- Configuring and using the TCP Wrapper
Managing the TCP/IP network
When computers are connected to each other to form a network and exchange information and resources with each other, managing this network information becomes an important task for a system administrator.
Getting ready
Before we start making any changes to the TCP/IP configuration, make sure to create a backup of the Network Manager configuration file, using this command:
Also, create a backup of the ...
Get Practical Linux Security Cookbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.