I'm Vineetandthisissecondpartoffmytwopartserieson I P tables, whichisthenexttooltocreatecustomfirewallinpartone, recoveredthebasicconceptbehindtheusageofhigh P tablesandinthisvideowillunderstandthecommandsintextsandcheckouthowtouse I p tableon a livesystem.
Soifyouhaven't watchedpartone, I highlyrecommendyoufirst.
Istheactioncompetentofftherule, whichwe'lllookindetailinthisvideo B r o d broughtistheprotocolOpthis i p optionsinandoutistheinputandoutputinthefacesourceanddestinationisthesource I p anddestination I p address.
Allright, sonowlet's lookatthisintextoffhigh P tablesindetail.
Forthesakeofunderstanding, I havedividedthisintextintofoursection.
Sothecommandis I p tables, dashLordChristieandthencablinggasoptionsandthennameofthechain.
Also, alltheoptionsinthissectionareusedinuppercase, soyouhave a for A pendingtheruleinthechain D todeletethechain I toinsertthatis 20 ThepacketandbuyItcounters P isforpolicyandisusedtorenamethechainwillusesomeoftheseoptionswhenwedothelivedemo.
Okay, nowlet's movetothethirdsection, whichisthematchingcomponentthatthisistheimportantpartwhereyougive a condition.
Iftheconditionistrue, taketheactionelsemovedtothenextruleinthechain, forexample, ifsource I p addressisse X y Z, thenrejectthepacketorifthedestinationportis, say, 22 thendropthepacket.
So, in a sense, thisprovidesthemainfunctionoff a firewalltofilterthan a drugtraffic.
Nowthere's a hugelistoffperimetersavailableformatching, anditwillnotbepossibleformetogothroughallofthem.
Nowhereyouusematchextensionandtheoptiontouseexplicitmatchesislowercaseandthedash M optiongivesyou a hugenumberofperimetersandyoucanmakereallycomplexfirewallbycombiningthese.
However, I'm notgoingtogooverontheseextensionstoe.
Keepthisvideoshortandsimple, butalltheexplicitextensionsareavailableinthewebsitethat I mentionedbefore.