Home > Store

Linux Firewalls: Enhancing Security with nftables and Beyond, 4th Edition

Register your product to gain access to bonus material or receive a coupon.

Linux Firewalls: Enhancing Security with nftables and Beyond, 4th Edition

eBook (Watermarked)

  • Sorry, this book is no longer in print.
  • Includes EPUB, MOBI, and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    MOBI MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Not for Sale


  • Copyright 2015
  • Dimensions: 7" x 9-1/8"
  • Edition: 4th
  • eBook (Watermarked)
  • ISBN-10: 0-13-400017-X
  • ISBN-13: 978-0-13-400017-6

The Definitive Guide to Building Firewalls with Linux

As the security challenges facing Linux system and network administrators have grown, the security tools and techniques available to them have improved dramatically. In Linux® Firewalls, Fourth Edition, long-time Linux security expert Steve Suehring has revamped his definitive Linux firewall guide to cover the important advances in Linux security.

An indispensable working resource for every Linux administrator concerned with security, this guide presents comprehensive coverage of both iptables and nftables. Building on the solid networking and firewalling foundation in previous editions, it also adds coverage of modern tools and techniques for detecting exploits and intrusions, and much more.

Distribution neutral throughout, this edition is fully updated for today’s Linux kernels, and includes current code examples and support scripts for Red Hat/Fedora, Ubuntu, and Debian implementations. If you’re a Linux professional, it will help you establish an understanding of security for any Linux system, and for networks of all sizes, from home to enterprise.

Inside, you’ll find just what you need to

  • Install, configure, and update a Linux firewall running either iptables or nftables
  • Migrate to nftables, or take advantage of the latest iptables enhancements
  • Manage complex multiple firewall configurations
  • Create, debug, and optimize firewall rules
  • Use Samhain and other tools to protect filesystem integrity, monitor networks, and detect intrusions
  • Harden systems against port scanning and other attacks
  • Uncover exploits such as rootkits and backdoors with chkrootkit

Sample Content

Table of Contents

Preface         xix

About the Author         xxi

Part I: Packet Filtering and Basic Security Measures 1

Chapter 1: Preliminary Concepts Underlying Packet-Filtering Firewalls         3

The OSI Networking Model   5

The Internet Protocol   7

Transport Mechanisms   14

Don’t Forget Address Resolution Protocol   17

Hostnames and IP Addresses   18

Routing: Getting a Packet from Here to There   19

Service Ports: The Door to the Programs on Your System   19

Summary   23

Chapter 2: Packet-Filtering Concepts         25

A Packet-Filtering Firewall   26

Choosing a Default Packet-Filtering Policy   29

Rejecting versus Denying a Packet   31

Filtering Incoming Packets   31

Filtering Outgoing Packets   46

Private versus Public Network Services   49

Summary   50

Chapter 3: iptables : The Legacy Linux Firewall Administration Program         51

Differences between IPFW and Netfilter Firewall Mechanisms   51

Basic iptables Syntax   54

iptables Features   55

Iptables Syntax   61

Summary   82

Chapter 4: nftables : The Linux Firewall Administration Program         83

nftables Features   84

nftables Syntax   85

Summary   93

Chapter 5: Building and Installing a Standalone Firewall         95

The Linux Firewall Administration Programs   96

Initializing the Firewall   99

Protecting Services on Assigned Unprivileged Ports   112

Enabling Basic, Required Internet Services   117

Enabling Common TCP Services   122

Enabling Common UDP Services   134

Logging Dropped Incoming Packets   138

Logging Dropped Outgoing Packets   138

Installing the Firewall   139

Summary   141

Part II: Advanced Issues, Multiple Firewalls, and Perimeter Networks       143

Chapter 6:  Firewall Optimization         145

Rule Organization   145

User-Defined Chains   148

Optimized Examples   151

What Did Optimization Buy?   176

Summary   177

Chapter 7:  Packet Forwarding         179

The Limitations of a Standalone Firewall   179

Basic Gateway Firewall Setups   181

LAN Security Issues   182

Configuration Options for a Trusted Home LAN   183

Configuration Options for a Larger or Less Trusted LAN   188

Summary   195

Chapter 8:  NAT–Network Address Translation         197

The Conceptual Background of NAT   197

NAT Semantics with iptables and nftables   201

Examples of SNAT and Private LANs   206

Examples of DNAT, LANs, and Proxies   209

Summary   210

Chapter 9: Debugging the Firewall Rules          211

General Firewall Development Tips   211

Listing the Firewall Rules   213

Interpreting the System Logs   217

Checking for Open Ports   223

Summary   227

Chapter 10: Virtual Private Networks         229

Overview of Virtual Private Networks   229

VPN Protocols   229

Linux and VPN Products   232

VPN and Firewalls   233

Summary   234

Part III: Beyond iptables  and nftables          235

Chapter 11: Intrusion Detection and Response         237

Detecting Intrusions   237

Symptoms Suggesting That the System Might Be Compromised   238

What to Do If Your System Is Compromised   241

Incident Reporting   243

Summary   247

Chapter 12:  Intrusion Detection Tools         249

Intrusion Detection Toolkit: Network Tools   249

Rootkit Checkers   251

Filesystem Integrity   255

Log Monitoring   256

How to Not Become Compromised   257

Summary   261

Chapter 13:  Network Monitoring and Attack Detection         263

Listening to the Ether   263

TCPDump: A Simple Overview   265

Using TCPDump to Capture Specific Protocols   272

Automated Intrusion Monitoring with Snort   286

Monitoring with ARPWatch   291

Summary   293

Chapter 14:  Filesystem Integrity         295

Filesystem Integrity Defined   295

Installing AIDE   296

Configuring AIDE   297

Monitoring AIDE for Bad Things   301

Cleaning Up the AIDE Database   302

Changing the Output of the AIDE Report   303

Defining Macros in AIDE   306

The Types of AIDE Checks   307

Summary   310

Part IV: Appendices         311

Appendix A:  Security Resources         313

Security Information Sources   313

Reference Papers and FAQs   314

Appendix B:  Firewall Examples and Support Scripts         315

iptables Firewall for a Standalone System from Chapter 5    315

nftables Firewall for a Standalone System from Chapter 5    328

Optimized  iptables Firewall from Chapter 6   332

nftables Firewall from Chapter 6    345

Appendix C: Glossary         351

Appendix D: GNU Free Documentation License         363

0. Preamble   363

1. Applicability and Definitions   363

2. Verbatim Copying   365

3. Copying in Quantity   365

4. Modifications   366

5. Combining Documents   367

6. Collections of Documents   368

7. Aggregation with Independent Works   368

8. Translation   368

9. Termination   369

10. Future Revisions of this License   369

11. Relicensing   370

Index         371


Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.


Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.


If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.


This site is not directed to children under the age of 13.


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020