Chapter 6. Network Security

In this chapter, we will discuss the following:

  • Managing the TCP/IP network
  • Using Iptables to configure a firewall
  • Blocking spoofed addresses
  • Blocking incoming traffic
  • Configuring and using the TCP Wrapper

Managing the TCP/IP network

When computers are connected to each other to form a network and exchange information and resources with each other, managing this network information becomes an important task for a system administrator.

Getting ready

Before we start making any changes to the TCP/IP configuration, make sure to create a backup of the Network Manager configuration file, using this command:

Getting ready

Also, create a backup of the ...

Get Practical Linux Security Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.