Our Scenarios
System Security Hardening, Systems Administration

IPtables on CentOS 7


This scenario is an introduction to controlling network traffic using iptables on CentOS 7. It will walk you through configuration and application of iptables rule sets and provide examples of ways they are commonly used.

Disclaimer! This scenario is based on content from: https://www.linode.com/docs/security/firewalls/control-network-traffic-with-iptables/

Based on the original content, we have improved on it as shown: 1. Availed virtual environments to test the commands and configurations. 2. Mapped the network configuration to allow easy access. 3. Provided practical examples of the configurations that you will play around with.

What you will learn

After completing the scenario, participants will be able to configure iptables rule sets. Specifically, this scenario addresses the following competencies: - iptables command - Default tables - Basic iptables options - Inserting, replacing and deleting iptables rule sets - Viewing iptables rule sets - Configuring iptables (blocking and allowing traffic, white listing and black listing) - Deploying iptables rule sets - Verifying iptables rule sets

Scenario Pre-requisites / recommendations

This scenario requires basic knowledge in Linux operating systems.

Technical Details

  • This scenario uses two Virtual Machine with CentOS 7 that will enable you to test the commands and configurations.The two servers and both have iptables installed.
  • All packages have been installed for you but not configured as the VMs don't have internet access, any install commands shown are for reference purposes only and should not be run.
  • All commands are run as root.