15
Masquerading and Firewalls
Whenever Linux is used in a networked environment, you can use the kernel functions
that allow the manipulation of network packets to maintain a separation between internal
and external network areas. The Linux netfilter framework provides the means to estab-
lish an effective firewall that keeps different networks apart. With the help of iptables—a
generic table structure for the definition of rule sets—precisely control the packets al-
lowed to pass a network interface. Such a packet filter can be set up quite easily with
the help of SuSEfirewall2 and the corresponding YaST module.
15.1 Packet Filtering with iptables
The components netfilter and iptables are responsible for the filtering and manipulation
of network packets as well as for network address translation (NAT). The filtering cri-
teria and any actions associated with them are stored in chains, which must be matched
one after another by individual network packets as they arrive. The chains to match are
stored in tables. The
iptables
command allows you to alter these tables and rule
sets.
The Linux kernel maintains three tables, each for a particular category of functions of
the packet filter:
filter
This table holds the bulk of the filter rules, because it implements the packet filtering
mechanism in the stricter sense, which determines whether packets are let through
(
ACCEPT
) or discarded (
DROP
), for example.
Masquerading and Firewalls
169
Summary of Contents for LINUX ENTERPRISE DESKTOP 11
Page 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Page 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Page 10: ......
Page 29: ...Part I Authentication...
Page 30: ......
Page 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Page 126: ......
Page 127: ...Part II Local Security...
Page 128: ......
Page 158: ......
Page 173: ...Part III Network Security...
Page 174: ......
Page 194: ......
Page 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Page 210: ......
Page 228: ......
Page 229: ...Part IV Confining Privileges with Novell AppArmor...
Page 230: ......
Page 274: ......
Page 300: ......
Page 328: ......
Page 340: ......
Page 342: ......
Page 386: ......
Page 387: ...Part V The Linux Audit Framework...
Page 388: ......