From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Unlock this course with a free trial
Join today to access over 24,300 courses taught by industry experts.
Types of Linux-based firewalls - Linux Tutorial
From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Types of Linux-based firewalls
- Let's talk about the different types of firewalls you can install into your Linux server. First is UFW. This is the Uncomplicated Firewall. It's developed by Canonical, and they are the makers of the Ubuntu distro for Linux. It's easy to use, but it has some limited security, so you need to watch for that. The next one is firewalld. This is a fairly comprehensive firewall developed by Red Hat and designed for workstations and servers, though it can work for entire networks as well. And it's a front-end utility for nftables. And that brings us to nftables. That's today's sophisticated backend firewall. The older version was iptables. But today, it's a good idea to use nftables whenever possible. This works directly with the Linux kernel and it utilizes the nft front-end tool or userspace tool. It's designed for networks and servers. If you want true firewalling, go with nftables and nft, and we're going to be showing labs and demonstrating how these work for each of these firewalls…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Learning objectives1m 34s
-
(Locked)
Introduction to nftables and the nft command2m 34s
-
(Locked)
nftables setup4m 5s
-
(Locked)
Tables > Chains > Rules2m 31s
-
(Locked)
Building the nftables configuration, part 18m 41s
-
(Locked)
Building the nftables configuration, part 28m 39s
-
Saving and restoring the nftables configurations8m 36s
-
(Locked)
Translating iptables to nftables7m 49s
-
(Locked)
-
-
(Locked)
Learning objectives1m 18s
-
(Locked)
Review of SSH1m 47s
-
(Locked)
Using keys to connect via SSH12m 57s
-
(Locked)
The sshd_config file3m 19s
-
(Locked)
Modifying the default SSH port7m 32s
-
(Locked)
Disabling password-based SSH2m 57s
-
(Locked)
Disabling root login via SSH2m 32s
-
(Locked)
Exclusive SSH groups4m 37s
-
(Locked)
Authentication settings10m 6s
-
(Locked)
Terminating SSH connections, part 17m 45s
-
(Locked)
Terminating SSH connections, part 26m 51s
-
(Locked)