-
Products
JBoss Enterprise Middleware
Red Hat JBoss Fuse Developer Studio Portfolio Edition Web Framework Kit Application Platform Web Server Data Grid Portal Platform Red Hat JBoss A-MQ SOA Platform Business Rules Management System (BRMS) Data Services Platform Messaging JBoss Operations Network JBoss Community or JBoss enterprise -
Solutions
Migration Center
Migrate to Red Hat Enterprise Linux Migration Center Systems management Upgrading to Red Hat Enterprise Linux JBoss Enterprise Middleware IBM AIX to Red Hat Enterprise Linux HP-UX to Red Hat Enterprise Linux Solaris to Red Hat Enterprise Linux UNIX to Red Hat Enterprise Linux Start a conversation with Red Hat Migration services -
Training
Courses and training paths
Popular and new courses JBoss Middleware Administration curriculum Core System Administration curriculum JBoss Middleware Development curriculum Advanced System Administration curriculum Linux Development curriculum Cloud Computing and Virtualization curriculum Cloud Computing, Virtualization, and Storage curriculum
Security: Firewall
Restrict access to systems from networks
A first line of defense for a computing system is to secure its network connection. Limiting access to necessary services, such as a web server or email Internet Message Access Protocol (IMAP) server, removes any risk of vulnerabilities in other services.
The many forms of firewalls
Firewalls take many forms, from hardware appliances that intercept all network traffic before allowing sanctioned traffic to pass to a gateway machine, to software approaches that work at different layers of the communication stack (for example, the application level or the application-agnostic transport level).
Easy firewall configuration
Red Hat® Enterprise Linux® includes an easy-to-use Firewall Configuration GUI tool that can implement basic firewall profiles. It's built on top of iptables, which is built into the Linux kernel. The powerful iptables can be configured directly, bypassing the GUI, to solve complex requirements.
Security support and updates
Learn more
-
Firewall Configuration GUI tool: Create basic firewalls with an easy-to-use GUI.
-
IPTables: Create complex firewalls by accessing the kernel-based firewall system directly.
-
Squid: A web proxy that can control which information may be accessed.











