How do I

Posted on 2005-04-27
Last Modified: 2010-04-22
These are part of an assignment that I have.  I am looking for answers to the following tasks.

1.  How do I enable the firewall in a linux machine

2.  Write the rule sets to block the network traffic

3.  Monitor the firewall logs

4.  Network address translation

5.  Start the firewall automatically at the system startup.

I think I know some of these but would feel better about them if I got some input from an expert!!  :)

Thank You,


Question by:Pres_Bush
    LVL 9

    Accepted Solution

    by: will answer your questions. The most common firewall on linux systems these days is iptables/netfilter (iptables is the userspace part, netfilter is the kernel part, but they're essentially the same thing.) You may also want to look through the O'Reilly book on iptables.

    What kind of assignment? Note that the E-E member agreement has things to say about helping students with assignments.
    LVL 1

    Expert Comment

    iptables the firewall thing in linux by default it only have CLI tool for controlling Firewall I suggest you to use the following like to download Firestarter a GUI front end to iptables

    I hope all other Qs can be answered by using this tool. It will do everything for you in GUI. Go ahead try it.

    LVL 8

    Expert Comment

    Linux uses iptables to implement firewall.

    1. chkconfig iptables on
    2. edit /etc/sysconfig/iptables
    or if you already set rukles
    /etc/rc.d/iptables save
    it will save rules to /etc/sysconfig/iptables and iptables service will load them when starts
    3. Use -j ULOG feature of iptables
    4. Use -j SNAT and -j DNAT features
    5. chkconfig (i wrote at 1.) enables autoloading iptables on 3,4,5 runlevel

    If you prefer to use GUI then go to use software.
    Use great FAQ also

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    ​Being a Managed Services Provider (MSP) has presented you  with challenges in the past— and by meeting those challenges you’ve reaped the rewards of success.  In 2014, challenges and rewards remain; but as the Internet and business environment evol…
    Hello EE, Today we will learn how to send all your network traffic through Tor which is useful to get around censorship and being tracked all together to a certain degree. This article assumes you will be using Linux, have a minimal knowledge of …
    In this sixth video of the Xpdf series, we discuss and demonstrate the PDFtoPNG utility, which converts a multi-page PDF file to separate color, grayscale, or monochrome PNG files, creating one PNG file for each page in the PDF. It does this via a c…
    Internet Business Fax to Email Made Easy - With eFax Corporate (, you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now