How To configure Ip Based Security In Redhat Enterprise Linux

In This Tutorial We Are Going To Laern How To Configure IP Based Security In redhat Enterprise Linux Rhel-4&5

Now In First I Will Tell You How To Check Or Flush The Firewall Of Filter,Nat,Mangle

Here Is The Command To Check The Firewall 

1. Filter

#iptables -t filter -L

2. Nat

#iptables -t Nat -L

3. Mangle

#iptables -t mangle -L

Now How To Flush The Firewall Of Filter,Nat,Mangle

1. Filter

#iptables -t filter -F

2. Nat

#iptables -t nat -F

3. Mangle

#iptables -t mangle -F

This IS How To Check And Flush The Firewall Of Filter,Nat,Mangle

Now I Will Tell You How To Configure Ip Based Security

Now If I Have To DROP The Services Of Iptables {Means The Firewall} For This Ip 1.0.0.1

Here Is The Command To Drop The Services Of Iptables For This Ip 1.0.0.1

#iptables -t filter -A INPUT -S 1.0.0.1 -j DROP

Now If I Have To Accept The Services Of Iptables {Means The Firewall} For This Ip 1.0.0.1

Here Is The Command To Accept The Services Of Iptables For This Ip 1.0.0.1

#iptables -t filter -A INPUT -S 1.0.0.1 -j ACCEPT

Now If I Block All The Network For Firewall

Here Is The Command To Block All The Network 

#iptables -A INPUT -j REJECT

#iptables -A OUTPUT -j REJECT

#iptables -A FORWARD -j REJECT


This Is All How To Configure Ip Based Security

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s