Operation and Maintenance
Linux Operation and Maintenance
How to set up a basic firewall with iptables in Linux
How to set up a basic firewall with iptables in Linux
To configure the iptables firewall, first set the default policy, deny all inbound and forwarded traffic, and allow outbound traffic; 2. Then allow local loopback and established connection traffic; 3. Then open necessary service ports such as SSH, HTTP, HTTPS, etc.; 4. Optional configuration logs to record discarded packets; 5. Finally, save the rules to prevent restart loss, ensuring system security and not interrupting normal access.

Setting up a basic firewall with iptables in Linux helps protect your system by controlling incoming and outgoing network traffic. Here's how to configure a simple but effective firewall using iptables rules.
1. Understanding iptables Basics
iptables is a user-space utility program that allows you to configure the IP packet filter rules of the Linux kernel firewall. It works with chains: INPUT (incoming traffic), OUTPUT (outgoing traffic), and FORWARD (routed traffic).
By default, most systems have no restrictive rules, meaning all traffic is allowed. The goal is to set policies that deny unwanted traffic while allowing essential services.
2. Set Default Policies
Start by setting default policies to drop all incoming and forwarded traffic, while allowing outgoing traffic. Run these commands as root or with sudo:
iptables -P INPUT DROP iptables -P FORWARD DROP iptables -P OUTPUT ACCEPT
This means only responses to your outgoing connections will be allowed in unless explicitly permitted.
3. Allow Loopback and Established Connections
You need to allow loopback traffic (used by local services) and traffic that belongs to existing connections:
iptables -A INPUT -i lo -j ACCEPT iptables -A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
The first rule allows all traffic on the loopback interface. The second permits responses to connections initiated from your machine.
4.Allow Essential Services
Open ports for services you use. For example, to allow SSH (port 22), HTTP (80), and HTTPS (443):
iptables -A INPUT -p tcp --dport 22 -j ACCEPT iptables -A INPUT -p tcp --dport 80 -j ACCEPT iptables -A INPUT -p tcp --dport 443 -j ACCEPT
Adjust these based on what you need. If you're running a web server, keep 80 and 443 open. For remote access via SSH, ensure port 22 is accessible.
5. Optional: Log Dropped Packets
To help with troubleshooting, log packets that get dropped:
iptables -A INPUT -j LOG --log-prefix "IPTables-Dropped: " iptables -A INPUT -j DROP
This logs dropped packets to /var/log/kern.log or /var/log/messages , depending on your system.
6. Save the Rules
Rules are lost after reboot unless saved. On Debian/Ubuntu:
iptables-save > /etc/iptables/rules.v4
On CentOS/RHEL, use:
service iptables save
Or manually save with:
iptables-save > /etc/iptables/rules.conf
And restore at boot with iptables-restore .
Basically, this setup gives you a secure baseline. You can expand it as needed for other ports or protocols. Just remember to test connectivity after applying rules so you don't lock yourself out.
The above is the detailed content of How to set up a basic firewall with iptables in Linux. For more information, please follow other related articles on the PHP Chinese website!
Hot AI Tools
Undress AI Tool
Undress images for free
AI Clothes Remover
Online AI tool for removing clothes from photos.
Undresser.AI Undress
AI-powered app for creating realistic nude photos
ArtGPT
AI image generator for creative art from text prompts.
Stock Market GPT
AI powered investment research for smarter decisions
Hot Article
Popular tool
Notepad++7.3.1
Easy-to-use and free code editor
SublimeText3 Chinese version
Chinese version, very easy to use
Zend Studio 13.0.1
Powerful PHP integrated development environment
Dreamweaver CS6
Visual web development tools
SublimeText3 Mac version
God-level code editing software (SublimeText3)
Hot Topics
20518
7
13631
4
How to manage software packages using Dnf and Rpm in Linux?
Mar 07, 2026 am 01:50 AM
dnfinstall prompts packagenotfound because it queries the enabled warehouse rather than the local installation status; rpm-q queries the local RPM database, and the scopes of the two are different.
How to monitor system performance and resources in Linux? (Top & Htop)
Mar 06, 2026 am 01:04 AM
The total top CPU usage is not 100% because it is calculated based on a single core, and the maximum is 800% for an 8-core system; the htop terminal size error needs to be fixed with eval$(resize); the real memory pressure is available rather than used; top command line truncation can be solved with the -c parameter.
How to setup file sharing using Samba on Linux? (SMB Protocol)
Mar 13, 2026 am 12:33 AM
The main reason why Windows cannot see the Samba share is that the firewall blocks UDP137–139/TCP445 or NetBIOS name resolution fails; it is necessary to confirm that the workgroup is consistent, the interfaces are configured correctly, the file permissions match forceuser/forcegroup, and set doscharset=UTF-8 to solve Chinese garbled characters.
How to extend a Logical Volume (LVM) in Linux without downtime?
Mar 13, 2026 am 12:53 AM
Logical volumes and file systems can be expanded online. You need to expand the LV first and then the file system. It is recommended to use lvextend-r for automatic synchronization adjustment, but you must ensure that the LVM and file system tool versions are compatible.
How to check open ports and listening services in Linux? (Netstat & SS)
Mar 10, 2026 am 01:08 AM
Netstat displays fewer LISTEN ports than ss because it does not display process information by default that non-root users do not have access to; ss can read all listening sockets by default without process names, and sudonetstat-tulpn is required to display them completely.
How to set up SSH key authentication on Linux? (Passwordless Login)
Mar 11, 2026 am 12:46 AM
It is recommended to use ssh-keygen-ted25519 to generate a key pair, because it is faster, more secure, and has a shorter key than the default RSA; it is necessary to strictly set the ~/.ssh directory permissions to 700 and authorized_keys to 600, and use ssh-v to confirm whether the client is Offering public key and whether the server rejects it.
How to format disk partitions using the command line in Linux?
Mar 15, 2026 am 12:01 AM
When fdisk is stuck at the Command prompt, it is normally waiting for input. Enter q to exit safely; you must umount before mkfs, otherwise it may fail silently; partedmkpart does not support the specified file system type, and mkfs needs to be executed separately.
How to configure a static IP address on Linux? (Netplan & NetworkManager)
Mar 14, 2026 am 12:02 AM
Netplan reports "InvalidYAML" when configuring a static IP due to indentation errors, missing spaces after colons, or mixed tabs; gateway4 has been deprecated and routes to:default must be used instead; NetworkManager needs to be modified before down/up takes effect; the renderer field is used to determine the backend during coexistence; incorrect DNS configuration will cause ping to succeed but curl to fail.





