This report delves into the practical application of IPTable firewalls for securing Linux systems. It begins by outlining the configuration of IPTable rules to address specific security requirements, including rejecting and allowing SSH connections, denying ping requests, blocking and allowing traffic on port 80, and controlling inbound and outbound traffic. The report provides step-by-step instructions and terminal commands, along with screenshots demonstrating the effects of each rule. Following the configuration section, the report transitions into a discussion of the advantages and disadvantages of firewalls and IPTable, followed by an explanation of the role and significance of circuit relay firewalls in securing communications, with a focus on the SOCKS package as defined in RFC1928. The report concludes with a summary of the key findings and their implications for system security.