In the previous post, we’ve talked about how to Secure Linux Server Using Hardening Best Practices and some people ask me about firewall section which was a brief introduction about iptables firewall. Today we will discuss in detail the Linux iptables firewall and how to secure our servers traffic using that awesome tool.
Source: RJCLIP Repairs Ethernet RJ45 Clips in Seconds (CNXSoft – Embedded Systems News)
netstat is a useful tool for checking your network configuration and activity. It is in fact a collection of several tools lumped together.
So if ipv6 is not supported on your network infrastructure, it might be useful to disable it all together. Why ? It can cause issues like delayed domain lookups, un-necessary attempts to connect to ipv6 addresses causing delay in network connection etc.
Source: How to disable Ipv6 on Ubuntu, Linux Mint, Debian (BinaryTides)
(This is also applicable to a Raspberry Pi running Raspbian, or some other Debian derivative such as RasPBX)
Powered by radios in trees, homegrown network serves 50 houses on Orcas Island.
Ever wanted to mount remote file systems locally over secure shell? If so, SSHfs may be just what you’re looking for. Here’s how to set it up on Linux.
Source: How to Use SSHFS to Mount Remote Filesystem on Linux (Make Tech Easier)
OpenMediaVault is a Debian based special purpose Linux Distribution to build a Network Attached Storage (NAS) System. It provides an easy to use web-based interface, Multilanguage support, Volume Management, Monitoring and a plugin system to extend it with LDAP, Bittorrent, and iSCSI capabilities. This tutorial describes the installation and configuration of OpenMediaVault.
Source: Build your own NAS with OpenMediaVault – Howtoforge
Teemip – A Free and Open Source IP Managment Tool
FTP is a standardized network protocol and probably the quickest as well as easiest option available when a large chunk of data is to be transferred, from one host to another, over a TCP-based network. FTP defines a client-server architecture which uses two separate ‘well-known’ ports, for data (port no. 20, used for data transfer) and control (port no. 21, used for authentication) connections, in order to establish connectivity between the server and the client.