Tux Machines

Creating Host-Based Firewall Rules w/ IPtables

Posted by Roy Schestowitz on Aug 01, 2023

Pi4J Operating System for Raspberry Pi
GNU/Hurd strikes back

Security policies and equipment shouldn't stop at the edge of your network. Neglecting host based mitigations goes against a key pillar to cyber security, Defense in Depth. What does this term mean? Defense in Depth is the idea of having multiple security elements in place to protect against a negative event.

Example of Defense in Depth: Having a network-based firewall on the edge of your network, host-based firewalls on your hosts, a network-based IDS, and antimalware software on your hosts.

In this post we will be using the Linux utility IPtables to create packet filtering rules with the Linux kernel firewall. Of course, using the Linux command line. Although if you would like to use a GUI there is a program called Firestarter.

Read on

↺ Read On: Austin Newton at medium.com
gemini.tuxmachines.org