From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Set up an IPTables firewall

Set up an IPTables firewall

From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Start my 1-month free trial

Set up an IPTables firewall

- [Instructor] The power of IP tables enables the deployment of quite capable Linux firewall appliances. While developing a fully configured Linux firewall is out of scope for this course, it is useful to understand how this is done to support testing of such devices. We'll set up a firewall which will block all incoming connections except for web from anywhere and SSH management connections from our local network. We'll also add some flood protection on incoming web traffic and limit the number of concurrent SSH sessions per user. We'll divert any Telnet connections to a honeypot on 10.0.2.199. We'll also keep a log of dropped connections so we can analyze attack attempts. Okay, let's start by setting up remote management. We limit access to the local network and limit the number of concurrent connections. Now we'll allow HTTP and HTTPS access port 80 and 443 but we'll limit the traffic rate. We'll divert Telnet traffic to the honeypot. We'll log any dropped packets. And finally…

Contents