Learn how to set up a Linux firewall using IPTables.
- The power of IP tables enables the deployment…of quite capable Linux firewall appliances.…While developing a fully configured Linux firewall…is out of scope for this course…it is useful to understand how this is done.…To support testing of such devices…we'll set up a firewall that will block all information…and connections except for web from anywhere.…And SSH management connections from our local network.…We'll also add some flood protection on income web traffic…and limit the number of concurrent SSH sessions per user.…
We'll divert any telnet connections to a honey pot…on 10 dot order two dot one nine nine.…We'll also keep a log of dropped connections…so we can analyze attack attempts.…Okay, let's start by setting up remote management.…We limit access to the local network…and limit the number of concurrent connections.…Now we'll allow http and https access…port 80 and 443.…
But we'll limit the traffic rate.…We'll divert telnet traffic to the honey pot.…We'll log any dropped packets.…And finally, we'll block any other input.…
Released
2/15/2017Note: Learning about ethical hacking for perimeter defenses is part of the Evading IDS, Firewalls, and Honeypots competency from the Certified Ethical Hacker (CEH) body of knowledge.
- Understanding firewalls
- Applying the basics of the Windows Firewall
- Using advanced features in the Windows Firewall
- Reviewing firewall logs
- Understanding Linux iptables
- Setting up an iptables firewall
- Managing rules with Firewall Builder
- Setting up a Cisco PIX firewall
- Creating a secure enclave
- Installing GNS3
- Understanding web application firewalls
- Protecting API services with the WSO2 gateway
- Running the Cowrie honeypot
- Detecting intrusions with Security Onion
Share this video
Embed this video
Video: Setting up an IPTable firewall