Article Title: Using Linux iptables for proxy server and firewall configuration (2 ). Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
5. cache proxy squid
1) Installation Package
Squid-2.5.STABLE1-2
2) Main configuration file
accessed through the extranet IP.To turn on NAT:Global (outside) 1 interfaceNat (inside) 1 192.168.3.0 255.255.255.0Do port mapping:static (inside,outside) TCP interface 192.168.3.222 3389 netmask 255.255.255.255To do access control for an external network port:Access-list outside_access Extended permit IP any anyAccess-group Outside_access in Interface OutsideThe above directive realizes, the external network user accesses the internal terminal through the public network IP, but the intranet u
MIP is a one-to-one bidirectional address translation (conversion) process. Generally, there are several public IP addresses and several servers that provide network services externally (servers use private IP addresses). To enable Internet users to access these servers, A one-to-one MIP ing (MIP) between public IP addresses and private IP addresses of servers can be established on the firewall at the egress of the Internet, and access control of serv
Although Aliyun launched the Cloud Shield service, but it is always safer to add a layer of firewall, the following is my Aliyun VPS on the process of configuring the firewall, currently only configure input. Both output and ForWord are accept rules.
First, check the Iptables service status
First check the status of the Iptables service
[Root@woxplife ~]# service iptables statusIptables:firewall is not r
XP system command line configuration firewall hint error what to do
Because the WinXP firewall blocks the restore daemon process, you need to manually add the restore daemon process to the firewall rules to see the client on the master side. But a lot of friends. The system prompts syntax error when using commands to
Cisco Firewall ASA Configuration case
Topology map
Requirements: Through Cisco Firewall ASA use intranet users can access the external network and the server in the DMZ, the server in the DMZ can be published to the network, for the extranet user access
A The use of Cisco analog firewalls
Because we do not have real equipment, we use a virtual system using
This article mainly introduces the firewall security configuration for CISCO router IOS, and describes the NAT conversion function. I believe you have read this article to understand CISCO router IOS.
Network security technologies include authentication and authorization, data encryption, access control, and security audit. The following types of security gateway services are provided: address translation,
Step 1 of Cisco ASA firewall VPN configuration: Create an address pool. To remotely access the client, you need to assign an IP address during logon. Therefore, we also need to create a DHCP address pool for these clients. However, if you have a DHCP server, you can also use a DHCP server. QUANMA-T (config) # ip local pool vpnpool 192.168.10.100-192.168.10.199 mask 255.255.255.0 Step 2: Create IKE Phase 1.
Iptables provides packet filtering, which separates network address translation (NAT) from other packets. The two most common purposes of iptables are to provide support for firewalls and NAT. Manual configuration of Iptables is challenging for beginners, but Iptables provides wizard and other tools to help beginners. Run the following command to view the configured rules: iptables-L
IptablesPacket filtering, network address translation (NAT), and oth
.$ csrutil Enable--without FSYou can then modify the /System/Library/LaunchDaemons/com.apple.pfctl.plist file to implement the boot-enabled configuration.Add a row to the Plist file -e as follows:string>Pfctlstring>string>-Estring>string>-Fstring>string>/etc/pf.confstring>Reference:https://www.v2ex.com/t/191810Http://man.linuxde.net/pfctlHttp://www.jianshu.com/p/6052831a8e91 (The above sections are transferred from this article)http://www.jianshu.com/p/427337c95a4aUse PF for port forwarding and
Tags: art inf boot nic/etc/off http install sysconfig YumObjective:Just finished learning how to configure Linux IP and firewallCome to summarize.Get ready:To be installed:SetupBody:Install the base packageYum Groupinstall "Base"SetupSelect a secondAfter entering the space to close the firewallThen ok->yes back to the main interfaceSelect a thirdFirst entry, select NICConfigure IPCd/etc/sysconfig/network-scripts after editing the configuration fileTur
Note: Ubuntu/debian cannot use this method1. Open IptablesVi/etc/sysconfig/iptables2. Add firewall rulesRule reference: http://www.cnblogs.com/EasonJim/p/6847874.html#Firewall configuration written by System-config-firewall# Manual Customization of this file is notRecommended.*filter: INPUTACCEPT [0:0] : FORWARDACCEPT
Configure with/etc/sysconfig/iptables-A input-m state–state new-m tcp-p tcp–dport 80-j ACCEPT (allow 80 ports through the firewall)-A input-m state–state new-m tcp-p tcp–dport 3306-j ACCEPT (Allow 3306 ports through the firewall)(22 ports are added by default when the system is loaded and other ports can be configured in their format)Special Note: Many netizens add these two rules to the last line of the
In the previous installment and use example of the Iptables firewall Configuration tool Shorewall, we described how to install and use the Shorewall tool for firewall configuration, and in this article we will give you an example of some of its advanced components.
Introduction of Advanced Components
1, params
This
configuration GatewaySecurity-level 0 Configuring the interface's security level (range is 0-100)Interface G2 Entry PortNameif name of the DMZ configuration interfaceIP address 192.168.30.254 255..255.255.0 configuration GatewaySecurity-level 50 Configuring the interface's security level (range is 0-100)Write an ACL so that Client2 can access Server3Access list
1, the external network for 1 fixed IP, do NAT let intranet share Internet.G0: External network port: 192.168.0.4/24Extranet Gateway: 192.168.0.1G2: Intranet port (Gateway of intranet): 172.16.0.1/24Only key commands are listed below:Interface GigabitEthernet0Nameif outside//designated external network port is outsideSecurity-level 10//Security level manually modified to 10, or it can be the default of 0IP address 192.168.0.4 255.255.255.0Interface GigabitEthernet2Nameif inside//designated intra
1. Configure NAT translation for a public network address poolNat (inside) 1 10.0.0.0 255.255.255.0Global (Outside) 1 222.172.200.20-222.172.200.30//This command may not work? And the TAB key is not complete, but no tube, according to lose can.OrGlobal (outside) 1 222.172.200.202, the public network only 1 fixed IP NAT conversionNat (inside) 1 10.0.0.0 255.255.255.0Global (Outside) 1 222.172.200.68//Designated public network address is a network segment3, Pat conversion, suitable for non-fixed I
First two instructions clear the default rule:Iptables-fIptables-xIptables-zAdd a rule to the input chain: 22-Port TCP connection:Iptables-a input-p TCP--dport 22-j ACCEPTThen three instructions set the rule:Iptables-p INPUT DROP #在INPUT链之外的都丢弃Iptables-p OUTPUT ACCEPT #在OUTPUT之外的都允许链接Iptables-p FORWARD DROPTo view the rules:Iptables-l-NSave rule to file:Iptables-save >~/iptablesinfoRecovery rule:Iptables-restore >~/iptablesinfoLinux firewall
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.