From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment

Unlock this course with a free trial

Join today to access over 24,300 courses taught by industry experts.

Building the nftables configuration, part 1

Building the nftables configuration, part 1

- Now, it's time to configure nftables. And what we're going to do is we're going to completely lock down the server so that no one can access it from outside and so that the server cannot access anything outside from itself. So let's get into it now. We'll go to our Debian server and we'll start configuring. Now, you can do all of your commands with nft, but it's a lot easier to use the nft interactive shell. And to get to that, you can type nft -i and that'll open up that nft shell. This way we don't have to type the nft command every time. We can just omit that. So the first thing we want to do is create a new table. I'm going to leave the table that we have here and create a wholly new one. The most secure table is the one that's going to take effect. So the most security is going to be the one that takes precedence. So let's start with the add table command. And if I was doing this just in the regular Bash shell, it would be nft add table. So again, we're omitting nft from this…

Contents