100 likes | 246 Views
NETWORK SECURITY USING IPTABLES. TOPICS OF DISCUSSION. NETWORK TRAFFIC IN PRESENT SCENARIO !! WHY WE NEED SECURITY ? TYPE OF ATTACKS & WAYS TO TACKLE IT IPTABLES : HOW & WHERE TO USE PRACTICAL APPLICATION LATEST DEVELOPMENTS & RESEARCH. NETWORK TRAFFIC & INTERNET USERS.
E N D
TOPICS OF DISCUSSION • NETWORK TRAFFIC IN PRESENT SCENARIO !! • WHY WE NEED SECURITY ? • TYPE OF ATTACKS & WAYS TO TACKLE IT • IPTABLES : HOW & WHERE TO USE • PRACTICAL APPLICATION • LATEST DEVELOPMENTS & RESEARCH
Network Security: An Overview • Any action that compromises the security of information. • four types of attack – 1. Interruption 2. Interception 3. Modification 4. Fabrication
TOOLS FOR SECURITY • CRYPTOGRAPHY (data) • KERBEROS (servers) • PGP ( E-mails) • IPSec (rout-net) • SSL (higher level) • FIREWALLS • IPTABLES
iptables is the name of the user space tool by which administrators create rules for the packet filtering and NAT modules Iptables is often used to refer to the entire infrastructure, including netfilter,connection tracking and NAT, as well as the tool itself. iptables is a standard part of all modern Linux distributions
Iptables where and how to use Iptable “Tables” • actually, multiple tables, each supporting several chains are used. • each table handles a different purpose (we cannot see these tables). • 1. filter table • 2. NAT table • 3. Mangle table
Iptables setup & loading • each Linux distribution takes different approach to manage firewall. • in Red-hat linux all rules are stored in the file - /etc/sysconfig/iptables • To turn on firewall ( as root) /sbin/service iptables on /sbin/service iptables save /sbin/service iptables load
Firewall policy to protect the firewall itself we want to restrict communication destined directly to the firewall very strictly. to do the above ……………. (in SSH ) iptables–A INPUT-s 192.168.50.0/24 -p tcp –dport 22 –j ACCEPT Iptables –A INPUT –j REJECT –reject-with icmp-hostprohibited
NOW LET US SEE …………………………. SOME PRACTICAL IMPLEMENTATION OF IPTABLES (HOW ONE CAN HACK THE NETWORK SECURITY) AND HOW IPTABLES ARE EFFECTIVE.