From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Tables > Chains > Rules

Tables > Chains > Rules

- nftables works off of the tables chains rules concept, and this is common with firewalls. If we take a look at our Debian server here, we can run the nftlist rule set command, and this will show our tables, chains, and rules that we have for the system so far. If we press Enter for this, we'll see we have a table called Inet Filter. So here is our table, it's called Inet Filter, and then we have three chains: chain input, chain output and chain forward. And inside those we have policies. Then, if you wanted to have rules, the rules would go inside of these chains. So the concept here is that we have tables, and you can have multiple tables in nftables or in any firewall. And inside of that, you have chains. You can have one chain or multiple chains. And inside of those chains, you have rules. And we're going to show how to build out the tables, chains, and individual rules as we go through this lab. So definitely run a NFT list rule set on your computer now to take a look at what…

Contents