Configuring Netfilter/iptables with Shorewall

Setting the Table

Article from Issue 50/2005
Author(s):

When users think about their workstations at home, they often forget about security. But danger is out there,waiting to pounce on the unsuspecting. Shorewall helps everyday Linux users keep the intruders away.

The only way to make your system completely safe from attack is never to connect to the Internet. Whenever you open the door to go out, you open the door for a potential hacker to get it. Some users have the mistaken belief that intruders only attack high-profile sites and would not be interested in a personal home workstation. The truth is that every single computer on the Internet is in danger of attack – even computers with dial-up connections. In many cases, these attacks are blind, brute force attacks, where the attacker tries a long list of known security holes.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Shoreline Firewall 4.2.4 Includes IPv6 Variant

    The Shoreline Firewall product, also known as Shorewall, has arrived in its 4.2.4 version. The new release includes a configuration tool for IPv6 networks.

  • Firewalls Intro

    Firewalls are becoming evermore sophisticated. Luckily, the tools for managing firewalls are becoming simpler and more accessible for ordinary users

  • Firewall Logfile Analyzers

    Netfilter firewalls create highly detailed logfiles that nobody really wants to inspectmanually. Logfile analysis tools like IPtables Log Analyzer,Wallfire Wflogs,and FWlogwatch help administrators keep track of developments and filter for importantmessages.

  • Guarddog

    The KDE Guarddog program promises an easy Linux firewall setup with just a few clicks. Guarddog helps inexperienced users secure computers – and even whole networks – against attack.

  • Firewalld and OpenSnitch

    For maximum security, you'd better watch traffic in both directions. This hands-on workshop takes you through the steps of setting up firewalls for outgoing as well as incoming traffic.

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News