Skip to content

How To configure Ip Based Security In Redhat Enterprise Linux

Our Score
Click to rate this post!
[Total: 0 Average: 0]

In This Tutorial We Are Going To Laern How To Configure IP Based Security In redhat Enterprise Linux Rhel-4&5

Now In First I Will Tell You How To Check Or Flush The Firewall Of Filter,Nat,Mangle

Here Is The Command To Check The Firewall 

1. Filter

#iptables -t filter -L

2. Nat

#iptables -t Nat -L

3. Mangle

#iptables -t mangle -L

Now How To Flush The Firewall Of Filter,Nat,Mangle

1. Filter

#iptables -t filter -F

2. Nat

#iptables -t nat -F

3. Mangle

#iptables -t mangle -F

This IS How To Check And Flush The Firewall Of Filter,Nat,Mangle

Now I Will Tell You How To Configure Ip Based Security

Now If I Have To DROP The Services Of Iptables {Means The Firewall} For This Ip 1.0.0.1

Here Is The Command To Drop The Services Of Iptables For This Ip 1.0.0.1

#iptables -t filter -A INPUT -S 1.0.0.1 -j DROP

Now If I Have To Accept The Services Of Iptables {Means The Firewall} For This Ip 1.0.0.1

Here Is The Command To Accept The Services Of Iptables For This Ip 1.0.0.1

#iptables -t filter -A INPUT -S 1.0.0.1 -j ACCEPT

Now If I Block All The Network For Firewall

Here Is The Command To Block All The Network 

#iptables -A INPUT -j REJECT

#iptables -A OUTPUT -j REJECT

#iptables -A FORWARD -j REJECT


This Is All How To Configure Ip Based Security

Leave a Reply

Discount Offer

Now Get 67% Discount

On Cyber Security Training                                                       Notes  

Click here  To Purchase

%d bloggers like this: