Solved

linux firewall configuration

Posted on 2001-07-25
3
165 Views
Last Modified: 2013-11-16
How do you configure a linux firewall if you have a dsl line linked to a external modem and your Lan has two other machines in the network?
(steps would be fine enough)
0
Comment
Question by:shopno
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 51

Accepted Solution

by:
ahoffmann earned 50 total points
ID: 6321928
dependeing on kernel version (2.2.x, 2.4.x) use ipchains or iptables. Kernel must be enabled for pcketfiltering.
0
 
LVL 19

Expert Comment

by:jools
ID: 6322167
You would do better to understand the concepts first, check out the howto's and examples. http://www.linuxnewbie.org has some good examples.

There are tools to assist if you really can't be bothered with the finer details but an overview would be.

Make sure your system is networked OK and everything is working.

Identify you kernel rev (see ahoffmann's comment) and make sure the relevant modules are configured into the kernel.

Get a pen and paper and plan your website, what services you want to allow/deny.

Either use a utility to build your ruleset or start making your own remember that ORDER is IMPORTANT.

You've got a lot of reading to do so we may not hear from you for a while... :-)


Jools
0
 
LVL 19

Expert Comment

by:jools
ID: 6323854
Crikey, you sorted that one out quick!
0

Featured Post

IoT Devices - Fast, Cheap or Secure…Pick Two

The IoT market is growing at a rapid pace and manufacturers are under pressure to quickly provide new products. Can you be sure that your devices do what they're supposed to do, while still being secure?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
Ever wonder what it's like to get hit by ransomware? "Tom" gives you all the dirty details first-hand – and conveys the hard lessons his company learned in the aftermath.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

622 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question