- Practical Network Scanning
- Ajay Singh Chauhan
- 110字
- 2022-07-12 10:43:14
System firewall configuration
To restrict traffic based on firewall rules, traffic should only be allowed into ports that need to be open for services. For example, secure web servers will need to provide access to TCP port 443 to most users, but they do not need Remote Desktop Protocol (RDP) or Secure Shell (SSH) management access from all source IPs.
For Windows, you can configure new inbound and outbound rules using advanced security options:

For Linux, sudo iptables -L lists your current rules in iptables. If you have just set up your server, you will have no rules and the output should be similar to the following screenshot:

推薦閱讀
- 攻守道:企業數字業務安全風險與防范
- Mobile Forensics Cookbook
- 大型互聯網企業安全架構
- INSTANT Burp Suite Starter
- Mastering Kali Linux for Advanced Penetration Testing
- Computer Forensics with FTK
- CTF那些事兒
- 網絡安全應急響應實戰
- 華為防火墻實戰指南
- 持續集成:軟件質量改進和風險降低之道
- Kali Linux高級滲透測試(原書第4版)
- Mastering Python for Networking and Security
- 網絡空間安全:拒絕服務攻擊檢測與防御
- 信息內容安全管理及應用
- 網絡攻防實戰研究:MySQL數據庫安全