Course contentsShow
Security
Lesson 439 of 3,05210. Network Security - Firewalls and SegmentationPro lesson

iptables Actions and Targets

Using ACCEPT, DROP, REJECT, LOG, and custom chains to control packet disposition and create modular rulesets.

This lesson is for subscribers

You've completed the free preview. Subscribe to unlock every lesson in every course.