Home > linux, Security > Iptables – It’s a Perfect For Cheap Security!

Iptables – It’s a Perfect For Cheap Security!

http://it.megocollector.com/wp-content/uploads/2008/09/putty-disable-firewall.jpgIptables is also known as the user space utility which is a kind of program that needs to be operated by the root users, otherwise it may lack in the performance level. You can take Iptables as a service because this has not been considered as an essential binary. With this sort of approach with the Iptables, the location for such program will remain at the /user/sbin. In order to refer the components located at the kennel level Iptables can also be used. It’s the kennel level which has been termed as the x tables and also carries several codes that are the shared portion. These shared codes have been used by the basic four modules that are also representing the API which is in use for the extension purposes. Additionally x tables are also in use to represent the entire firewall structure in a hassle free manner.

This sort of addition is also allowing the system administrator to explain certain kind of tables that comprises of chains and certain rules that can treat the packets. These tables are linked with several packet processing. Packets can be processed by traversing the rules in chains. Rules in the chain can make the right call for go to or jump to other chain like option and this sort of facility can be repeated for your desired nesting. In case, the packet comes from machine (is made by the application running on the machine), it may go to OUTPUT chain.

The packet coming to machine traverses INPUT chain.

The packet now going somewhere makes use of FORWARD.


That is not how IPCHAINS works. The packet going somewhere do not see the INPUT with the iptables. In the same way, forwarded packet do not see OUTPUT chain with the iptables. In a few ways it makes iptables simpler to understand, however in case, you have ipchains stuck in the head, that makes it very confusing. One more major difference is iptables is very stateful; this is, that keeps track of every connection. You may look at the connections just by examining /proc or net ip_connact. Here is a bit from the machine:

You need ip_connact module having iptables understand relationship between control & data sides of ftp connection. In case, it makes not any sense now, you may want to read ftp section in Security or dslsecure.html.





  1. No comments yet.
  1. No trackbacks yet.