BCE-C712 Linux System Administration

0 of 74 lessons complete (0%)

TCP/IP Firewall and IP Masquerade

Port Forwarding

You don’t have access to this lesson

Please register or sign in to access the course content.

Port forwarding is a networking technique that allows incoming network traffic on a specific port to be redirected or forwarded to a device or service within a private network. It is commonly used to enable external access to services or applications hosted on devices within a local network. Here’s a more detailed explanation:

How Port Forwarding Works:

  1. Port Numbers:
    • In computer networking, services use specific port numbers to communicate. For example, HTTP uses port 80, HTTPS uses port 443, and so on.
  2. Local Network:
    • In a local network, devices have private IP addresses (e.g., 192.168.1.x) assigned by the router.
  3. Public IP Address:
    • The router also has a public IP address, which is visible on the internet. This is the address that external devices use to communicate with your network.
  4. Routing Incoming Traffic:
    • When an external device on the internet tries to access a service hosted on your network, it sends a request to your public IP address and a specific port number.
    • The router receives this request and checks its port forwarding rules to determine where to send the incoming traffic.
    • If there’s a port forwarding rule that matches the requested port, the router forwards the incoming traffic to the specified device on the private network.

Use Cases for Port Forwarding:

  1. Web Servers:
    • Port forwarding is used to host websites or web applications from a private network. For example, you can host a website on your local server and make it accessible from the internet.
  2. Remote Desktop Access:
    • It allows you to access your computer remotely. You can forward the necessary port for remote desktop services.
  3. Gaming:
    • Gamers use port forwarding to improve online gaming experiences by opening specific ports for gaming services.
  4. Security Cameras and IoT Devices:
    • Port forwarding enables remote access to IP cameras, smart home devices, or any device that provides a service over the network.

Security Considerations:

  • When setting up port forwarding, it’s important to consider security. Opening ports to the internet can expose your network to potential threats.
  • Always use strong passwords, keep software up to date, and consider additional security measures like VPNs or firewall rules.

In summary, port forwarding is a powerful networking tool that allows external devices to access specific services or applications hosted on devices within a private network. It’s a critical technique for scenarios where you need to make services accessible from the internet while maintaining control over network security.

Forwarding a Port in CentOS:

Step 1: Install iptables (if not already installed):

sudo yum install iptables-services

Step 2: Enable and start the iptables service:

sudo systemctl enable iptables sudo systemctl start iptables

Step 3: Add a port forwarding rule:

For example, let’s forward incoming traffic on port 80 to a local web server at

sudo iptables -t nat -A PREROUTING -p tcp --dport 80 -j DNAT --to-destination sudo iptables -A FORWARD -p tcp -d --dport 80 -j ACCEPT

Step 4: Save the rules (to make them persistent after reboot):

sudo service iptables save

Forwarding a Port in Ubuntu:

Step 1: Install iptables-persistent (if not already installed):

sudo apt-get update sudo apt-get install iptables-persistent

Step 2: Add a port forwarding rule:

Using the same example as above (forwarding port 80 to

sudo iptables -t nat -A PREROUTING -p tcp --dport 80 -j DNAT --to-destination sudo iptables -A FORWARD -p tcp -d --dport 80 -j ACCEPT

Step 3: Save the rules (to make them persistent after reboot):

sudo iptables-save > /etc/iptables/rules.v4

Please note that these steps outline how to forward a specific port using iptables. Keep in mind that if you’re using a different firewall management tool or have additional security measures in place, the process may differ. Always refer to your specific system’s documentation for the most accurate instructions.