I amVineet, andintoday's video, we'lllearnabout a powerfulindextoolcalled I P Tables, whichisusedtocreate a quickandpowerfulfirewallforyoursystem I p table.
Inverysimpleterms, Itis a powerfultooltomanagenetworkpacketscomingdueandgoingoutoffyoursystemsothat I p tableyoucanblockoracceptortakeotheractionsonnetworktrafficbasedondifferentuserdefinedconditions.
Wewilldiscusswhattheseconditionsareandonthepossibleactionsthat I betablesupportindetailinthisvideo.
It's beenquite a whilethat I createdoneoftheseadvancedLynnextratutorials.
Inthefirstvideo, I'm goingtocoverthebasicconceptsoff I P tablesandtheninthesecondvideowilllookattheexactusagecommandsintaxandsomelivedemoon I'd betables.
OurdestinationaddressisinordertoroutethepacketinNaziat a verydirectaccessisnotpossible.
Notthirdisthemangletable.
Notthistableisusedtoontothe I P headersoffthepacket, forinstance, youcanadjustthetimetolivedetailvalueoffthebank.
Iteitherlengtheningorshortingthenumberoff.
Validnetworkhopesthatthepacketcancerstingnoother I beheaderscanbealteredinsimilarres.
Sothesewerethethreemaintables.
Theothertwoaredrawandsecuritytable.
Boththesestableshadjustonefunction.
Eachrawtableisbasicallyusedforconnectiontracking.
Itprovides a mechanismformarkingpackagetoviewpacketsaspartoffanongoingconnectionorsession.
SecuritytableisusedtosetinternalSCLennoxsecuritycontextmarksonpackagewhichwillaffecthowmessyLennoxorothersystemthatcaninterpret a ceilingexecutedcontexthandlethesepackets.
Butas I said, thesearenotthemaintables, andyoudonothavetoworrymuchaboutthesetwotables.
Orsothatwasallaboutthetables.
Next, hischains, notJane's, arelikepointsintheroadoff a bankitwhereyoucanapplyrules.
Forwardchainisappliedto a packetthatisforwardedtoyoursystemandoutputchainisappliedtothepacketoriginatedfromyoursystemandgoingoutfinally, bothstrokingisoppositeoffrerouting.
Noweachrulehasbasicallytocompetentmatchingcomponent, and a targetcompetentmatchingcompanyisdifferentconditionsavailabletodefineroutesoyoucanmatchbyprotocol, type, destinationorsource, addressdestinationorsosportinputoroutputinterfaceheaders, etceterathatthesecanbecombinedtocreate a reallycomplexrules.
It's nextisthetargetcomponentofthetargetcomponentistheactionthataretriggeredwhen a packetmeetsthematchingcriteriaOfferrule.