Linux security administration On a Linux system, which tool can be used to configure a packet-filtering firewall on legacy kernels (prior to iptables/nftables)?

Difficulty: Easy

Correct Answer: ipchains

Explanation:


Introduction / Context:
A firewall on Linux controls inbound and outbound network traffic by filtering packets based on rules. Over the years, Linux has offered several frameworks: ipfwadm (very old), ipchains (Linux 2.2 era), iptables (Linux 2.4+), and modern nftables. Understanding which command configures which framework is essential for system administration, historical troubleshooting, and certification exams.


Given Data / Assumptions:

  • The question refers to “set up a firewall” on legacy Linux systems.
  • Options include various networking tools and one known firewall utility.
  • Context implies pre-iptables kernels where ipchains was standard.


Concept / Approach:
In legacy (Linux 2.2) systems, ipchains managed rules for packet filtering and Network Address Translation. It predates iptables (netfilter in Linux 2.4) and nftables (newer kernels). Tools like netstat and route report or adjust sockets and routing tables, but they do not create filtering rules. Therefore, choosing the firewall-specific utility is the correct approach.


Step-by-Step Solution:
Identify which option is a firewall rule manager: ipchains.Exclude reporting/config tools that are not firewalls (netstat, route).Exclude unrelated commands (trace is not a standard Linux firewall tool).Select ipchains as the correct historical firewall configuration command.


Verification / Alternative check:
On legacy systems: running ipchains -L lists chain rules. On newer systems, iptables or nftables are used instead, confirming the historical nature of ipchains.


Why Other Options Are Wrong:
netstat: displays sockets, routing, and interface statistics; it does not filter traffic.route: edits the kernel routing table; not a firewall.trace: not a standard Linux firewall utility; possibly confuses with traceroute.


Common Pitfalls:

  • Mixing up ipchains with iptables/nftables across kernel versions.
  • Assuming route changes secure a system; routing and filtering are separate.
  • Forgetting to persist firewall rules across reboots with appropriate scripts.


Final Answer:
ipchains

More Questions from Linux

Discussion & Comments

No comments yet. Be the first to comment!
Join Discussion