Hide minor edits - Show changes to output
Changed lines 7-16 from:
Three Chains - INPUT, FORWARD AND OUTPUT - which are all part of the Filter table.'''
The target column lists the following actions - ACCEPT, REJECT and LOG
What is system-config-securitylevel? '''
system-config-securitylevel is a Fedora/Red Hat-specific graphics utility for easy configuration of firewall-rules end SELinux security settings.
system-config-securitylevel is a graphical user interface for setting basic firewall rules.
Changed lines 11-20 from:
system- config- securitylevel
Changed lines 23-24 from:
Run system- config-securitylevel and enable the firewall.
Changed line 35 from:
iptables - L - -line-numbers
Changed lines 38-39 from:
run '''iptables - L - -line-numbers''': this will list your current firewall rules with line numbers in front of them.
Changed line 42 from:
iptables -L -
Added lines 45-53:
Added lines 284-291:
Added lines 10-15:
Deleted lines 10-13:
Run system-config-securitylevel and enable the firewall.
run '''iptables -L --line-numbers''': this will list your current firewall rules with line numbers in front of them.
Changed line 13 from:
Added lines 16-29:
Changed lines 53-55 from:
Changed lines 67-68 from:
Added lines 89-92:
Changed lines 107-110 from:
Added lines 187-191:
Added line 8:
Changed lines 11-19 from:
run system-config-securitylevel and enable the firewall. If you' d like to run an ssh server, check "SSH" as a trusted service, for example -
run iptables -L --line-numbers: this will list your current firewall rules with
line numbers in front of them. We are interested in the ones in the RH
Firewall-1-INPUT chain ( list)
delete rule 3 (the one with ipv6-crypt as the protocol, also known as protocol number 50):
iptables -D RH-Firewall-1-INPUT 3
system-config-securitylevel and enable the firewall.
Added lines 1-242: