Managing IPtables

The administration tool for managing IP packet filtering for the Linux operating system is known as iptables. With ztC Edge systems, the task of working with iptables has been simplified and streamlined. Using the IPtables Security page, you can set up, maintain, and inspect the various filter table chains and their underlying rules. You have access to the three main chains (INPUT, OUTPUT, and FORWARD) for applying the packet-filtering rules you need. With ztC Edge systems, the rules are applied to the host operating system on each physical machine (PM), to both IPv4 and IPv6 packets, and the rules remain persistent after rebooting.

When you insert a rule, you specify a chain (INPUT, OUTPUT, or FORWARD) and a Rule ID. When processing inbound packets, the kernel applies the rules associated with the INPUT chain, and when processing outbound packets, the kernel applies the rules associated with the OUTPUT chain. The kernel applies the rules associated with the FORWARD chain when processing received inbound packets that must be routed to another host. Rules are applied in order of the Rule ID. (A Rule ID is similar to a row ID, where, for example, Rule ID 1 equals row 1.) Instead of creating rules, however, you can load default settings for the rules.

The IPtables Security page displays a separate table for each of the three chains and their associated rules. The rules, if they exist for a particular chain, are sorted by Rule ID. Columns display the network name, type of network, protocol, and other information. If necessary, use the scroll-bar on the right side of the page to view all of the rules and the scroll-bar at the bottom to view all of the columns. For more information on iptables functionality, see the Linux manual (man) pages for iptables.

You can, optionally, enable the rules to apply to the guest operating systems, in addition to the host. By default, rules apply only to the host operating system, but not to guest operating systems. When you enable rules to also apply to guests, all existing rules, imported rules, and additional newly inserted rules also apply to all guest operating systems (that is, for rules based on the same business network that has been allocated to the guest).

Notes:  
  1. For information on the ports that ztC Edge software uses, see System Requirements Overview.
  2. For additional information on ztC Edge TCP and UDP ports, access the Knowledge Base to search for the article TCP and UDP ports used by ztC Edge (KB0014311). See Accessing Knowledge Base Articles.

To manage IPtables, first, enable IPtables security, if you have not already done so.

Rules are applied only to the host, by default. You can, though, apply rules to guests as well as the host.

Continue, as appropriate, by inserting a new rule, removing a rule, loading default settings, importing rules, or exporting rules.

Related Topics

The Preferences Page

The ztC Edge Console

Security Hardening