Visible to the public Research on Setting of Two Firewall Rules Based on Ubuntu Linux System

TitleResearch on Setting of Two Firewall Rules Based on Ubuntu Linux System
Publication TypeConference Paper
Year of Publication2022
AuthorsMa, Limei, Zhao, Dongmei
Conference Name2022 International Conference on Computer Network, Electronic and Automation (ICCNEA)
Keywordscomposability, compositionality, Filtering, firewall, Firewalls (computing), Image edge detection, IP networks, Iptable, Linux, Linux Operating System Security, Logic gates, Metrics, pubcrawl, resilience, Resiliency, Software, Tcp\_Wrappers, Ubuntu Linux System
Abstract"Security first" is the most concerned issue of Linux administrators. Security refers to the integrity of data. The authentication security and integrity of data are higher than the privacy security of data. Firewall is used to realize the function of access control under Linux. It is divided into hardware or software firewall. No matter in which network, the firewall must work at the edge of the network. Our task is to define how the firewall works. This is the firewall's policies and rules, so that it can detect the IP and data in and out of the network. At present, there are three or four layers of firewalls on the market, which are called network layer firewalls, and seven layers of firewalls, which are actually the gateway of the agent layer. But for the seven layer firewall, no matter what your source port or target port, source address or target address is, it will check all your things. Therefore, the seven layer firewall is more secure, but it brings lower efficiency. Therefore, the usual firewall schemes on the market are a combination of the two. And because we all need to access from the port controlled by the firewall, the work efficiency of the firewall has become the most important control of how much data users can access. This paper introduces two types of firewalls iptables and TCP\_Wrappers. What are the differences between the use policies, rules and structures of the two firewalls? This is the problem to be discussed in this paper.
NotesISSN: 2770-7695
DOI10.1109/ICCNEA57056.2022.00048
Citation Keyma_research_2022