LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Networking
User Name
Password
Linux - Networking This forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.

Notices


Reply
  Search this Thread
Old 12-14-2006, 07:49 AM   #1
Chocolate
LQ Newbie
 
Registered: Nov 2006
Posts: 23

Rep: Reputation: 15
Question firewall


hello every bady

Do you know how to close this command:

iptables -F
iptables -L

this command about firewall...

can you help us?

thank you
 
Old 12-14-2006, 07:54 AM   #2
acid_kewpie
Moderator
 
Registered: Jun 2001
Location: UK
Distribution: Gentoo, RHEL, Fedora, Centos
Posts: 43,417

Rep: Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985
"close this command"?? please explain in better detail what you actually want to achieve.
 
Old 12-18-2006, 06:15 AM   #3
Chocolate
LQ Newbie
 
Registered: Nov 2006
Posts: 23

Original Poster
Rep: Reputation: 15
Hello every body
I ment by my question that i have used this command to allow accessing of programs easily.
iptables -F
this command makes every harmful program ( while connecting to enternet for eg) enter my system easily since no firewalles are there

my q is how to undo that..
how to close such harmful accesses.


Thanks in advance

Last edited by Chocolate; 12-20-2006 at 03:16 AM.
 
Old 12-18-2006, 06:59 AM   #4
amitsharma_26
Member
 
Registered: Sep 2005
Location: New delhi
Distribution: RHEL 3.0/4.0
Posts: 777

Rep: Reputation: 31
iptables & further associated functions(like iptables -F) can only be run by a root user. So even if as you say that some program enters your system, the first thing it has to face is the authentication part or get the rights of some user to perfom any action at your box or if it came because of some flaw or exploit in some service; respective effective user rights will be passed on to this harmful program. This further clarifies one point that, access to an exploit of some service can only be avoided because of some special signatures which should be avail to us prior to the implementation of software IPS or hardware IPS or updating these packages for these exploits would be the most optimum.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
router billion 5102 has firewall and software firewall tests aus9 Linux - Security 6 12-31-2006 10:09 PM
using a router with firewall, local firewall waste? Michael_aust Linux - General 1 03-26-2006 08:02 AM
slackware's /etc/rc.d/rc.firewall equivalent ||| firewall script startup win32sux Debian 1 03-06-2004 09:15 PM
Firewall Builder sample firewall policy file ? (.xml) nuwanguy Linux - Networking 0 09-13-2003 12:32 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Networking

All times are GMT -5. The time now is 03:14 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration