Creating Host-Based Firewall Rules w/ IPtables
Security policies and equipment shouldn't stop at the edge of your network. Neglecting host based mitigations goes against a key pillar to cyber security, Defense in Depth. What does this term mean? Defense in Depth is the idea of having multiple security elements in place to protect against a negative event.
Example of Defense in Depth: Having a network-based firewall on the edge of your network, host-based firewalls on your hosts, a network-based IDS, and antimalware software on your hosts.
In this post we will be using the Linux utility IPtables to create packet filtering rules with the Linux kernel firewall. Of course, using the Linux command line. Although if you would like to use a GUI there is a program called Firestarter.