Securing Your Server with iptables
Topics covered in this chapter:
- Understanding Firewalls
- Setting Up a Firewall with system-config-firewall
- Setting Up a Firewall with iptables
- Advanced iptables Configuration
- Configuring NAT
Red Hat Enterprise Linux is often used to offer services on the Internet. That means that unauthorized users will try to attack your server and get access to parts of the server that you don't want to be available to unauthorized users. To prevent this, you need to install a firewall. In this chapter you'll learn how to install a firewall on Red Hat Enterprise Linux, and thus protect valuable assets on your server.
Some administrators believe that if they offer only the services that are ...