answersLogoWhite

0


Best Answer

system-config-firewall (FEDORA) or system-config-securitylevel (RHEL), "that is where you build you firewall"

the netfilter component is a set of tables that hold rules that the kernel uses to control network packet filtering. "Fedora and RedHat Enterprise Linux... fifth edition"

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is the name of the kernel component that uses the iptables rules to filter network traffic?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Which two characteristic of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter Choose two?

*ports*protocols


A network technician must reduce the amount of broadcast traffic on the network while maintaining full connectivity between all different network segments Which device should the administrator deploy?

This device is called a ROUTER. Routers are by default configured to not pass the broadcast traffic to another networks to which it connects. But by some means it could be also a SWITCH - sometimes it can be configured to filter different type of network traffic.


How does a router filter traffic?

FGBGFGG


What is the simplest component in a filter circuit called?

capacitor


What is a network filter used for?

A personal network filter used to restrict access to particular Internet resources from a local computer.


Which blood component do the kidney's filter?

Red blood cells


Which is not a basic component of the compression refrigeration cycle?

suction filter


What Are The Disadvantages of repeater?

It can't filter network traffic. Data, sometimes referredto as bits, arriving at one port of a repeater gets senout to other port Data gets passed along by a repeater to all other LANsegments of a network regardless of whether it needs to go there or not


Which city was the first to use the computerized traffic filter?

london


What kind of traffic is a bridge and switch unable to filter?

boardcast


Where is the air filter on Renault traffic?

In the engine under the bonnet


Which defensive measures can you take to mitigate the possibility that your network could be used in this type of attack?

1. Filter packets leaving your network with source addresses that do not originate inside your network. 2. Filter packets entering your network with a broadcast address for a destination