- Practical Network Scanning
- Ajay Singh Chauhan
- 110字
- 2022-07-12 10:43:14
System firewall configuration
To restrict traffic based on firewall rules, traffic should only be allowed into ports that need to be open for services. For example, secure web servers will need to provide access to TCP port 443 to most users, but they do not need Remote Desktop Protocol (RDP) or Secure Shell (SSH) management access from all source IPs.
For Windows, you can configure new inbound and outbound rules using advanced security options:

For Linux, sudo iptables -L lists your current rules in iptables. If you have just set up your server, you will have no rules and the output should be similar to the following screenshot:

推薦閱讀
- 為你護航:網(wǎng)絡(luò)空間安全科普讀本(第2版)
- Wireshark 2 Quick Start Guide
- 移動APT:威脅情報分析與數(shù)據(jù)防護
- CTF競賽權(quán)威指南(Pwn篇)
- ARM匯編與逆向工程:藍狐卷·基礎(chǔ)知識
- Building a Home Security System with BeagleBone
- 數(shù)據(jù)安全架構(gòu)設(shè)計與實戰(zhàn)
- 白話零信任
- Learn Azure Sentinel
- 信息系統(tǒng)安全等級化保護原理與實踐
- 一本書讀透金融科技安全
- CPK通向賽博安全之路:理論與實踐CPK Solution to Cyber Security:Theory and Practice
- Hands-On Bug Hunting for Penetration Testers
- 網(wǎng)絡(luò)安全設(shè)計
- 網(wǎng)站入侵與腳本技術(shù)快速防殺