Iptable is the building block of a framework inside the Linux Kernel. It is represented by a generic table structure for definition of rulesets. Each rule with an Iptable consists of a number of classifiers (iptable matches) and one connection action (iptable target). The security functions that can be achieved with Iptables are as follows:
1. Filter table
Its the default table i.e if you haven't defined your own one, you will be using the default. It has following built in chains:
2. NAT table
It has following built in chains:
3. Mangle Table
It is for specialized packet alteration. This alters QOS bits in TCP header. Quality of service (QOS) is a group of components that can differentiate traffic flows so that high priority traffic receives preferential treatment. Mangle table has following built in chains:
4. Raw table
It is used for configuration exemptions. It has following built in chains:
The following flowchart will help you better understand the flow using Iptables:
Rules contain a criteria and a target. If criteria is matched, it executes values mentioned in the target and if criteria is not matched, it moves to the next rule.
Target Values
Let's see some commands we use for Iptables:
544 videos|686 docs|263 tests
|
544 videos|686 docs|263 tests
|
|
Explore Courses for Bank Exams exam
|