Firewalls are one of the core components of a network security implementation, are a vital component in protecting a computer system, or network of computers from external attack.
In a default Red Hat Enterprise Linux installation, a firewall exists between your computer or network and any untrusted networks.
Firewall Type
Method | Description | Advantages | Disadvantages |
---|---|---|---|
NAT | Network Address Translation (NAT) places private IP subnetworks behind one or a small pool of public IP addresses, masquerading all requests to one source rather than several. The Linux kernel has built-in NAT functionality through the Netfilter kernel subsystem. |
|
|
Packet Filter | A packet filtering firewall reads each data packet that passes through a LAN. It can read and process packets by header information and filters the packet based on sets of programmable rules implemented by the firewall administrator. The Linux kernel has built-in packet filtering functionality through the Netfilter kernel subsystem. |
|
|
Proxy | Proxy firewalls filter all requests of a certain protocol or type from LAN clients to a proxy machine, which then makes those requests to the Internet on behalf of the local client. A proxy machine acts as a buffer between malicious remote users and the internal network client machines. |
|
|
Enabling and Disabling the Firewall
- To start this application, either select System → Administration → Firewall from the panel, or type system-config-firewall at a shell prompt.
- Select one of the following options for the firewall:
- Disabled — Disabling the firewall provides complete access to your system and does no security checking. This should only be selected if you are running on a trusted network (not the Internet) or need to configure a custom firewall using the iptables command line tool.
- Enabled — This option configures the system to reject incoming connections that are not in response to outbound requests, such as DNS replies or DHCP requests. If access to services running on this machine is needed, you can choose to allow specific services through the firewall.
If you are connecting your system to the Internet, but do not plan to run a server, this is the safest choice.
Refer to: | redhat.com: Firewall |
techotopia.com: Basic RHEL 5 Firewall Configuration |
No comments:
Post a Comment