Solved

iptable rules

Posted on 2003-10-23
1
449 Views
Last Modified: 2010-04-22
Hi there,

I am currently experimenting with iptables. I know that the INPUT chain is very
important to prevent malicious packets from entering the internal network; however, I do not see how the FORWARD and OUTPUT chain being able to provide any extra security.

e.g: even if all packets from the internal network are free to be forwarded across the network and out of the internal network... how will that affect security of the internal network?

Pls give me examples of scenarios where specifying the FORWARD and OUTPUT chains provide extra security?

OR in other words,

give me examples of scenarios where NOT specifying the FORWARD and OUTPUT chains lead to a security threat to the internal network.

Thanks a lot!

d_terano.
0
Comment
Question by:d_terano
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 6

Accepted Solution

by:
mbarbos earned 50 total points
ID: 9610119
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

​Being a Managed Services Provider (MSP) has presented you  with challenges in the past— and by meeting those challenges you’ve reaped the rewards of success.  In 2014, challenges and rewards remain; but as the Internet and business environment evol…
Hello EE, Today we will learn how to send all your network traffic through Tor which is useful to get around censorship and being tracked all together to a certain degree. This article assumes you will be using Linux, have a minimal knowledge of …
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question