From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Unlock this course with a free trial
Join today to access over 24,300 courses taught by industry experts.
Building the nftables configuration, part 1 - Linux Tutorial
From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Building the nftables configuration, part 1
- Now, it's time to configure nftables. And what we're going to do is we're going to completely lock down the server so that no one can access it from outside and so that the server cannot access anything outside from itself. So let's get into it now. We'll go to our Debian server and we'll start configuring. Now, you can do all of your commands with nft, but it's a lot easier to use the nft interactive shell. And to get to that, you can type nft -i and that'll open up that nft shell. This way we don't have to type the nft command every time. We can just omit that. So the first thing we want to do is create a new table. I'm going to leave the table that we have here and create a wholly new one. The most secure table is the one that's going to take effect. So the most security is going to be the one that takes precedence. So let's start with the add table command. And if I was doing this just in the regular Bash shell, it would be nft add table. So again, we're omitting nft from this…
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
(Locked)
Learning objectives1m 34s
-
(Locked)
Introduction to nftables and the nft command2m 34s
-
(Locked)
nftables setup4m 5s
-
(Locked)
Tables > Chains > Rules2m 31s
-
(Locked)
Building the nftables configuration, part 18m 41s
-
(Locked)
Building the nftables configuration, part 28m 39s
-
Saving and restoring the nftables configurations8m 36s
-
(Locked)
Translating iptables to nftables7m 49s
-
(Locked)
-
-
-
-
-
-