Chapter 10

Securing Your Server with iptables

Topics covered in this chapter:

  • Understanding Firewalls
  • Setting Up a Firewall with system-config-firewall
  • Setting Up a Firewall with iptables
  • Advanced iptables Configuration
  • Configuring NAT

Red Hat Enterprise Linux is often used to offer services on the Internet. That means that unauthorized users will try to attack your server and get access to parts of the server that you don't want to be available to unauthorized users. To prevent this, you need to install a firewall. In this chapter you'll learn how to install a firewall on Red Hat Enterprise Linux, and thus protect valuable assets on your server.

Understanding Firewalls

Some administrators believe that if they offer only the services that are ...

Get Red Hat Enterprise Linux 6 Administration: Real World Skills for Red Hat Administrators now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.