Chapter 24. Configuring a Firewall
IN THIS CHAPTER
- Selecting a Table and Command for IPTables
- Selecting IPTables Options
- Using IPTables Match Extensions
- Using IPTables Target Extensions
- Starting and Stopping the IPTables Service
- Saving the IPTables Rules
- IPTables Examples
- Enabling the Default Firewall
As an administrator in today’s world of networked computing and easy access to the Internet, security both internally and externally must be the first and last issue considered. Denying unauthorized access is the first step to keeping your system secure. The mechanism to prevent access to all or some network services on a system is called a firewall.
Every operating system allows for the implementation of a firewall differently. Red Hat Enterprise ...
Get Red Hat® Enterprise Linux® 5 Administration Unleashed now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.