⚓ Shipwreck Ex

Firewall Configuration

Master firewall rules, packet filtering, and network security best practices through interactive CLI labs

Start Lab Learn Rules

Understanding Firewalls

Packet Filtering

Basic filtering based on source/destination IP, ports, and protocol

Stateful Inspection

Tracks active connections and evaluates traffic in context

Application Layer

Analyzes traffic content for specific applications and services

Network Flow

Firewall Diagram

Firewall CLI Terminal

root@firewall:~ #
$ iptables -L -n -v
Chain INPUT (policy ACCEPT 3k packets, 720K bytes) pkts bytes target prot opt in out ...
$ ufw status
Status: active
Commands will execute on a simulated firewall environment

Network Traffic Filtering

Network Filtering Diagram

Visual representation of firewall packet filtering operations

Rule Configuration

Allow HTTP

                        ufw allow 80/tcp "Allow HTTP"
                    

Block SSH

                        iptables -A INPUT -p tcp --dport 22 -j DROP
                    

Rate Limit

                        ufw limit 80/tcp "Rate Limit HTTP"
                    
```