Unit 3 LINUX Firewall
Unit 3 LINUX Firewall
Linux OS, we must know that it is a system based on Unix-like.
Systems that are called Unix-like or Unix-based are designed to behave
and function similarly to the Unix OS. Linux OS comes under the open-
source family (code designed to be publicly accessible) and is based on
the Linux kernel. It was initially released on September 17, 1991, by
Linus Torvalds.
It has a modular design, which helps us with system customization
according to our needs. Linux is open-source software that has helped
in the growth and development of our developer community which is
contributing to the open-source community. It also offers a command
line interface for interacting with OS and also has a graphical interface
for users who are not used to working with the command line interface.
There is more than one Linux firewall option available. When we come
to drop down and research, we have a few popular names IPCop,
iptables, Shorewall, and UFW But one of the most popular
is the “iptables“ firewall.
Iptables Working:
Linux-based software that performs manipulation functions, packet
filtering, and NAT (network address translation) is known as Iptables.
With the help of Iptables which allows system administrators to control
incoming and outgoing traffic by setting up the rules.
When a packet is received in a Linux base system, it has to go through
the chains and tables in the iptables firewall. The most commonly used
tables are filter and nat but we have five predefined tables in iptables
(raw, nat, filter, security, and mangle).
Types of Tables
Types of Chains
Chain Rule: Rules that are described for a particular task. Subdivided
into three types:
1. INPUT: Filter incoming traffic in the local system.
2. OUTPUT: Filter Outgoing traffic for the local system.
3. FORWARD: Packets forwarded from one system to another go
throw it.
Configure a Firewall on Linux OS
We will be configuring iptables in our operating system.
To install iptables
sudo dnf install iptables
[CHECK]: This is to check and find a rule that matches the requirements of
-C the string.