Our Score
Click to rate this post!
[Total: 0 Average: 0]
In This Tutorial We Are Going To Laern How To Configure IP Based Security In redhat Enterprise Linux Rhel-4&5
Now In First I Will Tell You How To Check Or Flush The Firewall Of Filter,Nat,Mangle
Here Is The Command To Check The Firewall
1. Filter
#iptables -t filter -L
2. Nat
#iptables -t Nat -L
3. Mangle
#iptables -t mangle -L
Now How To Flush The Firewall Of Filter,Nat,Mangle
1. Filter
#iptables -t filter -F
2. Nat
#iptables -t nat -F
3. Mangle
#iptables -t mangle -F
This IS How To Check And Flush The Firewall Of Filter,Nat,Mangle
Now I Will Tell You How To Configure Ip Based Security
Now If I Have To DROP The Services Of Iptables {Means The Firewall} For This Ip 1.0.0.1
Here Is The Command To Drop The Services Of Iptables For This Ip 1.0.0.1
#iptables -t filter -A INPUT -S 1.0.0.1 -j DROP
Now If I Have To Accept The Services Of Iptables {Means The Firewall} For This Ip 1.0.0.1
Here Is The Command To Accept The Services Of Iptables For This Ip 1.0.0.1
#iptables -t filter -A INPUT -S 1.0.0.1 -j ACCEPT
Now If I Block All The Network For Firewall
Here Is The Command To Block All The Network
#iptables -A INPUT -j REJECT
#iptables -A OUTPUT -j REJECT
#iptables -A FORWARD -j REJECT
This Is All How To Configure Ip Based Security