Advertisements
Skip to content

How To configure Ip Based Security In Redhat Enterprise Linux

In This Tutorial We Are Going To Laern How To Configure IP Based Security In redhat Enterprise Linux Rhel-4&5

Now In First I Will Tell You How To Check Or Flush The Firewall Of Filter,Nat,Mangle

Here Is The Command To Check The Firewall 

1. Filter

#iptables -t filter -L

2. Nat

#iptables -t Nat -L

3. Mangle

#iptables -t mangle -L

Now How To Flush The Firewall Of Filter,Nat,Mangle

1. Filter

#iptables -t filter -F

2. Nat

#iptables -t nat -F

3. Mangle

#iptables -t mangle -F

This IS How To Check And Flush The Firewall Of Filter,Nat,Mangle

Now I Will Tell You How To Configure Ip Based Security

Now If I Have To DROP The Services Of Iptables {Means The Firewall} For This Ip 1.0.0.1

Here Is The Command To Drop The Services Of Iptables For This Ip 1.0.0.1

#iptables -t filter -A INPUT -S 1.0.0.1 -j DROP

Now If I Have To Accept The Services Of Iptables {Means The Firewall} For This Ip 1.0.0.1

Here Is The Command To Accept The Services Of Iptables For This Ip 1.0.0.1

#iptables -t filter -A INPUT -S 1.0.0.1 -j ACCEPT

Now If I Block All The Network For Firewall

Here Is The Command To Block All The Network 

#iptables -A INPUT -j REJECT

#iptables -A OUTPUT -j REJECT

#iptables -A FORWARD -j REJECT


This Is All How To Configure Ip Based Security

Advertisements

Leave a Reply

Discount Offer

Now Get 50% Discount

On Cyber Security Training                                                       Notes  

Click here  To Purchase

%d bloggers like this: