Abstract:
The "firewall and network Security project" is designed to securing workstations and servers against local and remote intrusion, exploitation, and malicious activity. The project details the planning and the tools involved in creating a secured computing environment for the data center, workplace, and home. With proper administrative knowledge, vigilance, and tools, systems running Red Hat Linux or Fedora Core 2 can be both fully functional and secured from most common intrusion and exploit methods. Iptables is used to set up, maintain, and inspect the tables of IP packet filter rules in the Linux kernel. There are several different tables, which may be defined, and each table contains a number of built-in chains, and may contain user-defined chains. · Each chain is a list of rules, which can match a set of packets: each rule specifies what to do with a packet, which matches. This is called a 'target', which may be a jump to a user defined chain in the same table.