Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Mastering Iptables Firewall

    Posted By: ELK1nG
    Mastering Iptables Firewall

    Mastering Iptables Firewall
    Last updated 10/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.27 GB | Duration: 6h 51m

    Handling Iptables Firewall in professional Way. All you need to know about Iptables Firewall

    What you'll learn
    Get in depth knowlegde of Linux Iptables Firewall
    Firewall Introduction, Types of Firewall, Direction of Firewall, What can be blocked/permitted, Lab Setup Details
    Working with INPUT Chain, Working with OUTPUT Chain, Working with FORWARD Chain, How to Block Layer 3 Traffic, How to Block Layer 4 Traffic
    How to Block Layer 2 Traffic, Handling ICMP Traffic, Using SNAT, Using DNAT, Setting Default Policy, Directional Filtering, Connection Tracking
    Allowing Different Services in Default DROP Policy, Using REJECT Target, Create Custom Chains
    Requirements
    Basic Linux and Networking Knowledge required
    Description
    Security is one of the main issue in IT Industry. We want some robust, flexible, affordable and Open Source based security solution. Iptables Firewall satisfy all these requirements. This course will start from basics and will slowly and slowly takes you into depth of FirewallFirewall is basically a system that prevents unauthorized communication.- to it (INPUT)- from it (OUTPUT)- through it (FORWARD)The Iptables firewall is open source, low cost (or you can say no cost at all) and highly flexible stateful firewall. To properly understand firewall, we will be discussing several different scenarios. You will be able to appreciate the power of Linux based Iptables firewall after going through different examples.

    Overview

    Section 1: Firewall Introduction

    Lecture 1 Introduction

    Section 2: What are the most important things about understanding and implementing Firewall

    Lecture 2 What are different types of Firewall available?

    Lecture 3 Why understanding direction of Firewall is most important thing?

    Lecture 4 What can be blocked/permitted by Firewall?

    Section 3: IPTables Firewall Lab Setup Details

    Lecture 5 Firewall Lab setup details - 1

    Lecture 6 Firewall Lab setup details - 2

    Lecture 7 Firewall Lab setup details - 3

    Lecture 8 Firewall Lab setup details - 4

    Section 4: What are different ports and services? How to access different services?

    Lecture 9 What are the ports used by well known servers? How to test connectivity?

    Lecture 10 How to test connectivity to servers. Testing routing functionality of firewall.

    Lecture 11 Verify Firewall Lab Setup Demo

    Section 5: How to block traffic based on Single IP, Particular Network or from Any IP

    Lecture 12 How to block traffic from single IP

    Lecture 13 How to block traffic from single IP Demo

    Lecture 14 How to block traffic from particular Network

    Lecture 15 Demo of how to block traffic from particular Network

    Lecture 16 How to block access from anywhere

    Lecture 17 Demo of how to block access from anywhere

    Section 6: How to block acces to various servers?

    Lecture 18 How to block access to Web Server?

    Lecture 19 Demo of how to block access to Web Server?

    Lecture 20 How to block access to mutiple servers (telnet, ssh) efficiently

    Lecture 21 Demo of How to block access to mutiple servers (telnet, ssh) efficiently

    Lecture 22 How to save firewall rules

    Lecture 23 How to save firewall rules Demo

    Lecture 24 How to restore firewall rules

    Lecture 25 How to restore firewall rules Demo

    Section 7: How to block ICMP traffic in INPUT Direction

    Lecture 26 How to block ICMP traffic in INPUT Direction

    Lecture 27 How to block ICMP traffic in INPUT Direction Demo

    Lecture 28 Identify and Rectify the problem associated with previous rule

    Lecture 29 Identify and Rectify the problem associated with previous rule Demo

    Lecture 30 How to use "echo-reply" ICMP packets

    Lecture 31 How to use "echo-reply" ICMP packets Demo

    Section 8: Block Ping in FORWARD Direction

    Lecture 32 How to block Ping in FORWARD Direction

    Lecture 33 How to block Ping in FORWARD Direction Demo

    Lecture 34 Block Ping in FORWARD Direction Task - 2

    Lecture 35 Identify problem with previous rule. Rectify the problem. Demo

    Section 9: Using OUTPUT Chain

    Lecture 36 A Particular User should not be allowed to "ssh" in OUTPUT Direction

    Lecture 37 Particular User should not be allowed to "ssh" in OUTPUT Direction Demo

    Lecture 38 How to block Ping from "firewall"

    Lecture 39 How to block Ping from "firewall" Demo

    Lecture 40 How To block web access from "firewall" in OUTPUT Direction Case 1

    Lecture 41 How To block web access from "firewall" in OUTPUT Direction Case 1 Demo

    Lecture 42 How to block web access to "firewall" without using INPUT rules - 1

    Lecture 43 How to block web access to "firewall" without using INPUT rules - 1 Demo

    Lecture 44 How to block web access to "firewall" without using INPUT rules - 2

    Lecture 45 How to block web access to "firewall" without using INPUT rules - 2 Demo

    Section 10: How to Use DNAT (Destination Network Address Translation)

    Lecture 46 Why DNAT. How to use DNAT.

    Lecture 47 Why DNAT. How to use DNAT Demo.

    Section 11: How to Use SNAT (Source Network Address Translation)

    Lecture 48 Why SNAT. How to use SNAT.

    Lecture 49 Why SNAT. How to use SNAT Demo.

    Section 12: How to perform MAC Address Based Filtering (Layer 2 Filtering)

    Lecture 50 How to filter based on MAC Address (Layer 2 Filtering)

    Lecture 51 How to filter based on MAC Address (Layer 2 Filtering) Demo

    Section 13: What is Directional Filtering. Why it is one of the most important concept.

    Lecture 52 What is Directional Filtering. Why understanding 3 way handshake is must.

    Lecture 53 Demo of Directional Filtering. How to use 3 way handshake.

    Section 14: What is Connection Tracking. Why to use connection tracking.

    Lecture 54 What happens when we do not use connection tracking.

    Lecture 55 What happens when we do not use connection tracking Demo

    Lecture 56 How to solve above problem using Connection Tracking.

    Lecture 57 How to solve above problem using Connection Tracking Demo.

    Lecture 58 Can the above problem be solved in better way ?

    Lecture 59 Can the above problem be solved in better way Demo.

    Section 15: What is Default Policy. How to change. What are different firewall approaches.

    Lecture 60 What is Default Policy. How to change it. What is allowed list and denied list.

    Lecture 61 How to view and change Default Policy Demo.

    Section 16: Allow access to services in default "DROP" Policy - 1

    Lecture 62 Allow access to "telnet" service when default policy is "DROP"

    Lecture 63 Allow access to "telnet" service when default policy is "DROP" Demo

    Section 17: Allow access to services in default "DROP" Policy - 2

    Lecture 64 Allow Services - 2

    Lecture 65 Allow Services - 2 Demo

    Section 18: Allow access to services in default "DROP" Policy - 3

    Lecture 66 Allow Services - 3 Task - 1

    Lecture 67 Allow Services - 3 Task - 1 Demo

    Lecture 68 Allow Services - 3 Task - 2

    Lecture 69 Allow Services - 3 Task - 2 Demo

    Section 19: Allow access to services in default "DROP" Policy - 4

    Lecture 70 Allow Services - 4

    Lecture 71 Allow Services - 4 Demo

    Section 20: Allow access to services in default "DROP" Policy - 5

    Lecture 72 Allow Services - 5

    Lecture 73 Allow Services - 5 Demo

    Section 21: Allow access to services in default "DROP" Policy - 6

    Lecture 74 Allow Services - 6

    Lecture 75 Allow Services - 6 Demo

    Section 22: How to use "REJECT" Target

    Lecture 76 Using "REJECT" Target Task - 1

    Lecture 77 Using "REJECT" Target Task - 1 Demo

    Lecture 78 Using "REJECT" Target Task - 2

    Lecture 79 Using "REJECT" Target Task - 2 Demo

    Lecture 80 Using "REJECT" Target Task - 3

    Lecture 81 Using "REJECT" Target Task - 3 Demo

    Lecture 82 Using "REJECT" Target Task - 4

    Lecture 83 Using "REJECT" Target Task - 4 Demo

    Lecture 84 Using "REJECT" Target Task - 5

    Lecture 85 Using "REJECT" Target Task - 5 Demo

    Lecture 86 Using "REJECT" Target Task - 6

    Lecture 87 Using "REJECT" Target Task - 6 Demo

    Section 23: How to create and use Custom Chains. Advantages of using custom chains.

    Lecture 88 Creating Custom Chain Task - 1

    Lecture 89 Creating Custom Chain Task - 1 Demo

    Lecture 90 Creating Custom Chain Task - 2

    Lecture 91 Creating Custom Chain Task - 2 Demo

    Section 24: What are Different Firewall Options available

    Lecture 92 Different Firewall Options - 1

    Lecture 93 Different Firewall Options - 2

    Lecture 94 Different Firewall Options - 3

    Lecture 95 Different Firewall Options - 4

    Lecture 96 Different Firewall Options - 5

    Lecture 97 Different Firewall Options - 6

    Section 25: (Optional) How We Setup the Lab For Iptables Firewall

    Lecture 98 (Optional) How To Setup Iptables Firewall System

    Lecture 99 (Optional) How To Setup c2 System

    Lecture 100 (Optional) How To Setup client11 System

    Lecture 101 (Optional) How To Setup client31 System

    Network Administrators,Security Professionals