Learn about the basics of Linux IPTables.
- [Instructor] Linux provides a basic firewall capability…through the use of a program called IPTables.…IPTables is one of a set…of rule based firewall modules in Linux.…The others being IP6Tables, OPTables, and EBTables.…Let's check what rules we have set up…in the IPTables firewall in our Ubuntu system.…The command -L, tells IPTables to list its rules.…The -N switch requests numeric format.…
The -V means verbose,…so we get as much information as possible.…We can see that there are three sections listed,…all with no entries.…These are called the input, forward, and output chains.…The input chain contains the rules…controlling what addresses and ports can be used…for data coming in to the computer.…This provides protection against a bot, net, or hacker…trying to break in.…The forward chain provides rules…telling IPTables to take data coming in…and pass it straight through to output…on an outgoing address and port.…
This is used when we're just switching traffic.…The output chain has rules…controlling what addresses and ports data can be sent to.…
Released
2/15/2017Note: Learning about ethical hacking for perimeter defenses is part of the Evading IDS, Firewalls, and Honeypots competency from the Certified Ethical Hacker (CEH) body of knowledge.
- Understanding firewalls
- Applying the basics of the Windows Firewall
- Using advanced features in the Windows Firewall
- Reviewing firewall logs
- Understanding Linux iptables
- Setting up an iptables firewall
- Managing rules with Firewall Builder
- Setting up a Cisco PIX firewall
- Creating a secure enclave
- Installing GNS3
- Understanding web application firewalls
- Protecting API services with the WSO2 gateway
- Running the Cowrie honeypot
- Detecting intrusions with Security Onion
Share this video
Embed this video
Video: Understanding Linux IPTables