18.7. Additional Resources
Refer to the following sources for additional information on packet filtering with
iptables.
- Security Guide; Red Hat, Inc — Contains a chapter about the role of firewalls within an overall security strategy as well as strategies for constructing firewall rules.
- System Administrators Guide; Red Hat, Inc — Contains a chapter about configuring firewalls using Security Level Configuration Tool.
18.7.1. Installed Documentation Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
man iptables— Contains a description ofiptablesas well as a comprehensive list of targets, options, and match extensions.