


Debian mail server firewall configuration tips
Apr 13, 2025 am 11:42 AMConfiguring a Debian mail server's firewall is an important step in ensuring server security. The following are several commonly used firewall configuration methods, including the use of iptables and firewalld.
Configure a firewall using iptables
- Install iptables (if not already installed):
sudo apt-get update sudo apt-get install iptables
- Check the current iptables rules :
sudo iptables -L
- Configure iptables rules : Edit the /etc/iptables.rules file and add necessary rules. For example, allow mail service ports such as SMTP (port 25), IMAP (port 143), and POP3 (port 110):
*filter :INPUT ACCEPT [0:0] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [0:0] -A INPUT -p tcp --dport 25 -j ACCEPT -A INPUT -p tcp --dport 143 -j ACCEPT -A INPUT -p tcp --dport 110 -j ACCEPT -A INPUT -j LOG --log-prefix "iptables denied: " --log-level 4 -A INPUT -j REJECT --reject-with icmp-host-prohibited COMMIT
- Save rules :
sudo iptables-save > /etc/iptables.rules
- Loading rules :
sudo iptables-restore <ol start="6"><li> <strong>Set up power-on and start</strong> :</li></ol><pre class="brush:php;toolbar:false"> sudo sh -c 'echo "/sbin/iptables-restore /etc/network/if-pre-up.d/iptables' sudo chmod x /etc/network/if-pre-up.d/iptables
Configure a firewall with firewalld
- Install firewalld (if not already installed):
sudo apt-get update sudo apt-get install firewalld
- Start and enable the firewalld service :
sudo systemctl start firewalld sudo systemctl enable firewalld
- Configure firewalld rules : Edit the /etc/firewalld/zones file and define different regions and rules. For example, create a zone called public and allow SMTP, IMAP, and POP3 ports:
*filter :public - [0:0] :public6 - [0:0] :work - [0:0] :internal - [0:0] :external - [0:0] :dmz - [0:0] :trusted - [0:0] # Allow traffic on ports 25, 143, and 110 for mail services -A public -p tcp --dport 25 -j ACCEPT -A public -p tcp --dport 143 -j ACCEPT -A public -p tcp --dport 110 -j ACCEPT
- Application rules :
sudo firewall-cmd --reload
- Set up power-on : Firewalld's rules are usually loaded automatically at startup, but you can ensure that the rules are restored at system startup by editing the /etc/network/if-pre-up.d/firewalld file:
#!/bin/sh /sbin/firewall-cmd --restore <h3>Things to note</h3>
- Regularly update rules : Check and update firewall rules regularly based on the actual usage of the mail server.
- Monitoring and logging : Enable logging to monitor firewall activity, promptly detect and respond to potential security threats.
- Security : Ensure that firewall rules do not block necessary mail service traffic while limiting unnecessary external access.
Through the above steps, you can effectively configure the Debian mail server's firewall to protect the server from unauthorized access and potential security threats.
The above is the detailed content of Debian mail server firewall configuration tips. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Ethereum is a decentralized application platform based on smart contracts, and its native token ETH can be obtained in a variety of ways. 1. Register an account through centralized platforms such as Binance and Ouyiok, complete KYC certification and purchase ETH with stablecoins; 2. Connect to digital storage through decentralized platforms, and directly exchange ETH with stablecoins or other tokens; 3. Participate in network pledge, and you can choose independent pledge (requires 32 ETH), liquid pledge services or one-click pledge on the centralized platform to obtain rewards; 4. Earn ETH by providing services to Web3 projects, completing tasks or obtaining airdrops. It is recommended that beginners start from mainstream centralized platforms, gradually transition to decentralized methods, and always attach importance to asset security and independent research, to

The most suitable tools for querying stablecoin markets in 2025 are: 1. Binance, with authoritative data and rich trading pairs, and integrated TradingView charts suitable for technical analysis; 2. Ouyi, with clear interface and strong functional integration, and supports one-stop operation of Web3 accounts and DeFi; 3. CoinMarketCap, with many currencies, and the stablecoin sector can view market value rankings and deans; 4. CoinGecko, with comprehensive data dimensions, provides trust scores and community activity indicators, and has a neutral position; 5. Huobi (HTX), with stable market conditions and friendly operations, suitable for mainstream asset inquiries; 6. Gate.io, with the fastest collection of new coins and niche currencies, and is the first choice for projects to explore potential; 7. Tra

The real use of battle royale in the dual currency system has not yet happened. Conclusion In August 2023, the MakerDAO ecological lending protocol Spark gave an annualized return of $DAI8%. Then Sun Chi entered in batches, investing a total of 230,000 $stETH, accounting for more than 15% of Spark's deposits, forcing MakerDAO to make an emergency proposal to lower the interest rate to 5%. MakerDAO's original intention was to "subsidize" the usage rate of $DAI, almost becoming Justin Sun's Solo Yield. July 2025, Ethe

What is Treehouse(TREE)? How does Treehouse (TREE) work? Treehouse Products tETHDOR - Decentralized Quotation Rate GoNuts Points System Treehouse Highlights TREE Tokens and Token Economics Overview of the Third Quarter of 2025 Roadmap Development Team, Investors and Partners Treehouse Founding Team Investment Fund Partner Summary As DeFi continues to expand, the demand for fixed income products is growing, and its role is similar to the role of bonds in traditional financial markets. However, building on blockchain

Table of Contents Crypto Market Panoramic Nugget Popular Token VINEVine (114.79%, Circular Market Value of US$144 million) ZORAZora (16.46%, Circular Market Value of US$290 million) NAVXNAVIProtocol (10.36%, Circular Market Value of US$35.7624 million) Alpha interprets the NFT sales on Ethereum chain in the past seven days, and CryptoPunks ranked first in the decentralized prover network Succinct launched the Succinct Foundation, which may be the token TGE

A verbal battle about the value of "creator tokens" swept across the crypto social circle. Base and Solana's two major public chain helmsmans had a rare head-on confrontation, and a fierce debate around ZORA and Pump.fun instantly ignited the discussion craze on CryptoTwitter. Where did this gunpowder-filled confrontation come from? Let's find out. Controversy broke out: The fuse of Sterling Crispin's attack on Zora was DelComplex researcher Sterling Crispin publicly bombarded Zora on social platforms. Zora is a social protocol on the Base chain, focusing on tokenizing user homepage and content

Directory What is Zircuit How to operate Zircuit Main features of Zircuit Hybrid architecture AI security EVM compatibility security Native bridge Zircuit points Zircuit staking What is Zircuit Token (ZRC) Zircuit (ZRC) Coin Price Prediction How to buy ZRC Coin? Conclusion In recent years, the niche market of the Layer2 blockchain platform that provides services to the Ethereum (ETH) Layer1 network has flourished, mainly due to network congestion, high handling fees and poor scalability. Many of these platforms use up-volume technology, multiple transaction batches processed off-chain

The failure to register a Binance account is mainly caused by regional IP blockade, network abnormalities, KYC authentication failure, account duplication, device compatibility issues and system maintenance. 1. Use unrestricted regional nodes to ensure network stability; 2. Submit clear and complete certificate information and match nationality; 3. Register with unbound email address; 4. Clean the browser cache or replace the device; 5. Avoid maintenance periods and pay attention to the official announcement; 6. After registration, you can immediately enable 2FA, address whitelist and anti-phishing code, which can complete registration within 10 minutes and improve security by more than 90%, and finally build a compliance and security closed loop.
