From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Tables > Chains > Rules - Linux Tutorial
From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Tables > Chains > Rules
- nftables works off of the tables chains rules concept, and this is common with firewalls. If we take a look at our Debian server here, we can run the nftlist rule set command, and this will show our tables, chains, and rules that we have for the system so far. If we press Enter for this, we'll see we have a table called Inet Filter. So here is our table, it's called Inet Filter, and then we have three chains: chain input, chain output and chain forward. And inside those we have policies. Then, if you wanted to have rules, the rules would go inside of these chains. So the concept here is that we have tables, and you can have multiple tables in nftables or in any firewall. And inside of that, you have chains. You can have one chain or multiple chains. And inside of those chains, you have rules. And we're going to show how to build out the tables, chains, and individual rules as we go through this lab. So definitely run a NFT list rule set on your computer now to take a look at what…
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
(Locked)
Learning objectives1m 34s
-
(Locked)
Introduction to nftables and the nft command2m 34s
-
(Locked)
nftables setup4m 5s
-
(Locked)
Tables > Chains > Rules2m 31s
-
(Locked)
Building the nftables configuration, part 18m 41s
-
(Locked)
Building the nftables configuration, part 28m 39s
-
Saving and restoring the nftables configurations8m 36s
-
(Locked)
Translating iptables to nftables7m 49s
-
(Locked)
-
-
-
-
-
-