SlideShare a Scribd company logo
Linux Firewall
June 29 2014
Vinoth Sivasubramanian
Ganapathy Kannan
Agenda
 Introduction to Linux Firewalls
 Firewall Basics
 IP Tables
 Firewall Management
 Challenges and Solutions
Introduction
 Why Need a Firewall
 Improved Access Control at Network Layer and Transport Layer
 Better Detection Capabilities
 Why Linux Firewalls
 Open source  Low Cost
 Flexible  Can align with business and user need
 Continual improvement
What is a firewall?
 What is a firewall ???
A firewall is a device filtering traffic between 2 or more networks
based on predefined rules
IP Chains
 IP Chains
Loadable kernel module that performs packet filtering
Comes with most Linux distribution
No Port Forward
Concept of chain ( Input , Output and Forward)
IP Tables
 IP Tables
Loadable kernel module
Since kernel 2.4.x
Everything of IP Chains plus stateful inspection, improved matching and port
forward
More customized login
 Requires expertise and careful study of organization
IP Tables – Implementation – Command Line
 Open a terminal window ( Must be logged in as root ) typing
#iptables
iptables<version number: no command specified ( If IP tables
already installed)
 IF IP tables are not installed then follow the follow instructions to enable IP Tables
IP tables can be downloaded from http://www.nefilter.org
#tar –xvjf ./iptables-1.*.*.tar.bz2 –c/usr/src
#cd /usr/src/iptables-1.*.* ( to the directory it has created)
#/bin/sh –c make
#/bin/sh –c make install  to finish the install
Implementation of policies
Sample
#iptables –P INPUT/DROP/ACCEPT
#iptables –P OUTPUT/DROP/ACCEPT
#iptables –P FORWARD/DROP/ACCEPT
Implementation of policies
Implementing Rules
#iptables –A INPUT I eth0 –p tcp (–s 192.168.0.222) –dport 22 –j drop
A to append the rule at the bottom of specified chain
I to insert the rule at the top of the specfified chain
I income interface
P protocol
S incoming ip
Dport destination port
Sport source port
O outgoing interface
D destination ip
#service iptables save
Implementation of policies
Deleting rules
# iptables –D INPUT <number>
#iptables –D INPUT – i eth0 –p tcp dport 22 –j DROP
Implementation of policies using GUI
# system-config-firewall in command line
Or
System  Administration  Firewall in the Menu
Implementation of policies using GUI
Sample Snapshot
Typical Implementation
Internal LAN
DMZ Servers
Internal LAN Router Internet
Tools for Compiling IPTables
 www.fwbuilder.org  Online tool to help build Linux firewall rules ( Open source)
 fwlogwatch.inside-security.de/  Tool to analyse IP tables logs
 Challenges
 No clear visibility on flow of traffic , ports and services used in the
organization
 Solutions to them are documenting the ports, services being used in the
organization
 Does not do deep packet inspection to filter malicious traffic
Thank You
Q& A

More Related Content

PDF
Iptables presentation
PDF
Chapter 10 wireless hacking [compatibility mode]
PPTX
introduction of iptables in linux
PPT
Firewall
PPTX
Ip tables
PPTX
Iptables the Linux Firewall
PPT
Firewall Essentials
PPTX
IP tables and Filtering
Iptables presentation
Chapter 10 wireless hacking [compatibility mode]
introduction of iptables in linux
Firewall
Ip tables
Iptables the Linux Firewall
Firewall Essentials
IP tables and Filtering

What's hot (20)

PPT
Firewalls
PPTX
Firewall
PDF
Pertemuan 9 intrusion detection system
PPT
T C P I P Weaknesses And Solutions
PPTX
Firewall ( Cyber Security)
PPTX
Firewall vpn proxy
PPT
Iptables in linux
PPT
Barriers to TOR Research at UC Berkeley
PPT
Firewall - Network Defense in Depth Firewalls
PPT
Hacking Cisco
PDF
pfSense firewall workshop guide
PPT
I ptable
PDF
Firewall notes
PDF
CCA security answers chapter 2 test
PPTX
Network testing course
PDF
Chapter 6 firewall
PPT
Cisco Router As A Vpn Server
ODP
PPT
Anton Chuvakin on Honeypots
PPTX
Packet Sniffer
Firewalls
Firewall
Pertemuan 9 intrusion detection system
T C P I P Weaknesses And Solutions
Firewall ( Cyber Security)
Firewall vpn proxy
Iptables in linux
Barriers to TOR Research at UC Berkeley
Firewall - Network Defense in Depth Firewalls
Hacking Cisco
pfSense firewall workshop guide
I ptable
Firewall notes
CCA security answers chapter 2 test
Network testing course
Chapter 6 firewall
Cisco Router As A Vpn Server
Anton Chuvakin on Honeypots
Packet Sniffer
Ad

Viewers also liked (20)

PPT
Red de redes
PPTX
Firewall presentation
PDF
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
PDF
Firewall Presentation
PDF
RMI and CORBA Why both are valuable tools
PPTX
PPTX
Access control list
PPT
Samba server configuration
PPT
Corba introduction and simple example
PPT
Dcom vs. corba
PPT
Network Security
PPTX
Samba power point presentation
PDF
Common Object Request Broker Architecture - CORBA
PPT
Distributed objects & components of corba
PPT
Samba
PPTX
Cyberoam Firewall Presentation
PPT
Iptables
PPTX
Presentation on samba server
PPT
Samba server
PPTX
Corba concepts & corba architecture
Red de redes
Firewall presentation
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Firewall Presentation
RMI and CORBA Why both are valuable tools
Access control list
Samba server configuration
Corba introduction and simple example
Dcom vs. corba
Network Security
Samba power point presentation
Common Object Request Broker Architecture - CORBA
Distributed objects & components of corba
Samba
Cyberoam Firewall Presentation
Iptables
Presentation on samba server
Samba server
Corba concepts & corba architecture
Ad

Similar to Linux Firewall - NullCon Chennai Presentation (20)

PPTX
PDF
Iptables fundamentals
PPTX
Firewalls rules using iptables in linux
PDF
Firewall Facts
PPTX
Linux Firewall (Netfilter )and tools .pptx
PDF
IPTABLES_linux_Firewall_Administration (1).pdf
PDF
Linux firewall
ODP
Firewalld : A New Interface to Your Netfilter Stack
PDF
IP Tables Ip chains and filetring in system and network administartion
DOCX
Creating a firewall in UBUNTU
PPTX
Stupid iptables tricks
PDF
IP Tables Primer - Part 1
PDF
IPTables Primer - Part 1
PPTX
IP routing in linux
PPTX
types of firewalls ppt computer networks
PPTX
IP Tables And Filtering
PPTX
Linta
PPTX
Linta
PPT
IP tables
PPTX
Understanding Firewall by Ahmad Nauval Syahputra.pptx
Iptables fundamentals
Firewalls rules using iptables in linux
Firewall Facts
Linux Firewall (Netfilter )and tools .pptx
IPTABLES_linux_Firewall_Administration (1).pdf
Linux firewall
Firewalld : A New Interface to Your Netfilter Stack
IP Tables Ip chains and filetring in system and network administartion
Creating a firewall in UBUNTU
Stupid iptables tricks
IP Tables Primer - Part 1
IPTables Primer - Part 1
IP routing in linux
types of firewalls ppt computer networks
IP Tables And Filtering
Linta
Linta
IP tables
Understanding Firewall by Ahmad Nauval Syahputra.pptx

More from Vinoth Sivasubramanan (9)

PDF
The notorious nine_cloud_computing_top_threats_in_2013
PPTX
Business Continuity Management - Best Practice Across Industries
PDF
Storage Security Governance
PDF
Security kaizen cloud security
PDF
Security kaizen consumerization
PDF
PDF
Sivasubramanian Risk Management In The Web 2.0 Environment
DOC
3rd Annual CISO Round Table
PDF
4th Annual Corporate Governance Congress
The notorious nine_cloud_computing_top_threats_in_2013
Business Continuity Management - Best Practice Across Industries
Storage Security Governance
Security kaizen cloud security
Security kaizen consumerization
Sivasubramanian Risk Management In The Web 2.0 Environment
3rd Annual CISO Round Table
4th Annual Corporate Governance Congress

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Machine learning based COVID-19 study performance prediction
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Teaching material agriculture food technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Approach and Philosophy of On baking technology
Reach Out and Touch Someone: Haptics and Empathic Computing
Programs and apps: productivity, graphics, security and other tools
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Spectral efficient network and resource selection model in 5G networks
Machine learning based COVID-19 study performance prediction
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Unlocking AI with Model Context Protocol (MCP)
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Review of recent advances in non-invasive hemoglobin estimation
Empathic Computing: Creating Shared Understanding
Advanced methodologies resolving dimensionality complications for autism neur...
Mobile App Security Testing_ A Comprehensive Guide.pdf

Linux Firewall - NullCon Chennai Presentation

  • 1. Linux Firewall June 29 2014 Vinoth Sivasubramanian Ganapathy Kannan
  • 2. Agenda  Introduction to Linux Firewalls  Firewall Basics  IP Tables  Firewall Management  Challenges and Solutions
  • 3. Introduction  Why Need a Firewall  Improved Access Control at Network Layer and Transport Layer  Better Detection Capabilities  Why Linux Firewalls  Open source  Low Cost  Flexible  Can align with business and user need  Continual improvement
  • 4. What is a firewall?  What is a firewall ??? A firewall is a device filtering traffic between 2 or more networks based on predefined rules
  • 5. IP Chains  IP Chains Loadable kernel module that performs packet filtering Comes with most Linux distribution No Port Forward Concept of chain ( Input , Output and Forward)
  • 6. IP Tables  IP Tables Loadable kernel module Since kernel 2.4.x Everything of IP Chains plus stateful inspection, improved matching and port forward More customized login  Requires expertise and careful study of organization
  • 7. IP Tables – Implementation – Command Line  Open a terminal window ( Must be logged in as root ) typing #iptables iptables<version number: no command specified ( If IP tables already installed)  IF IP tables are not installed then follow the follow instructions to enable IP Tables IP tables can be downloaded from http://www.nefilter.org #tar –xvjf ./iptables-1.*.*.tar.bz2 –c/usr/src #cd /usr/src/iptables-1.*.* ( to the directory it has created) #/bin/sh –c make #/bin/sh –c make install  to finish the install
  • 8. Implementation of policies Sample #iptables –P INPUT/DROP/ACCEPT #iptables –P OUTPUT/DROP/ACCEPT #iptables –P FORWARD/DROP/ACCEPT
  • 9. Implementation of policies Implementing Rules #iptables –A INPUT I eth0 –p tcp (–s 192.168.0.222) –dport 22 –j drop A to append the rule at the bottom of specified chain I to insert the rule at the top of the specfified chain I income interface P protocol S incoming ip Dport destination port Sport source port O outgoing interface D destination ip #service iptables save
  • 10. Implementation of policies Deleting rules # iptables –D INPUT <number> #iptables –D INPUT – i eth0 –p tcp dport 22 –j DROP
  • 11. Implementation of policies using GUI # system-config-firewall in command line Or System  Administration  Firewall in the Menu
  • 12. Implementation of policies using GUI Sample Snapshot
  • 13. Typical Implementation Internal LAN DMZ Servers Internal LAN Router Internet
  • 14. Tools for Compiling IPTables  www.fwbuilder.org  Online tool to help build Linux firewall rules ( Open source)  fwlogwatch.inside-security.de/  Tool to analyse IP tables logs  Challenges  No clear visibility on flow of traffic , ports and services used in the organization  Solutions to them are documenting the ports, services being used in the organization  Does not do deep packet inspection to filter malicious traffic

Editor's Notes

  • #13: Fedora, Redhat
  • #14: Masquaredes all outgoing traffic Filter both incoming and outgoing traffic Port forward incoming traffic for your servers