Where does RH-Firewall-1-INPUT fall into the scheme of things with IPTables
Linux - EnterpriseThis forum is for all items relating to using Linux in the Enterprise.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Where does RH-Firewall-1-INPUT fall into the scheme of things with IPTables
For RHEL IPTables, I'm trying to understand how RH-Firewall-1-INPUT works with the other chains of input, output and forward.
Found some info online that it is a user-defined custom chain that is used by input, output and forward chains, however that was vague and I'm not sure how it really works with the other chains in IPTables.
Was wondering if others had insight or could point me in the right direction.
These are chains that are not needed. As stated before RH was trying to be cleaver. Anything in RH-FIREWALL-1-INPUT can be moved to INPUT chain without issues. Same for RH-FORWARD-1-INPUT can be moved to FORWARD chain.
They dropped this in v6 because behind closed doors they realized it was stupid too.
Wait until you jump to v7 where they use a totally different firewall. Now you are going to have fun. But you can disable this one too and install iptables, as I have done.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.