If your iptables basic knowledge is not yet known, it is recommended to take a look first.Start ConfigurationLet's configure a firewall for the filter table.(1) Check the setting of this institution in Iptables[email protected] ~]# iptables-l-NChain
With this tutorial, make sure you can use Linux native. If you are using SSH remote, and can not directly operate the machine, then we recommend you cautious, cautious, and then cautious!With Iptables We can configure a dynamic firewall for our
If your iptables basic knowledge is not yet known, it is recommended to take a look first.Start ConfigurationLet's configure a firewall for the filter table.(1) Check the setting of this institution in Iptables[email protected] ~]# iptables-l-NChain
#头两行是注释说明 # Firewall configuration written by System-config-securitylevel # Manual customization to this file is not recom
Mended. #使用filter表 *filter #下面四条内容定义了内建的INPUT, Forwaard, ACCEPT chain, also created a new chain called Rh-firewall-1-input:
For more information about IPTABLES configuration in linux-general Linux technology-Linux technology and application information, see the following. Simple Application of IPTABLES:
Iptables-a input-p tcp-s 10.1.2.187-j ACCEPT
Add 10.1.2.187 to the
Article Title: linuxiptables port firewall rules. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Configure
Reprinted from: http://jiujiang.blog.sohu.com/97911176.html
If you do not know the basic knowledge about iptables, we recommend that you first check it out.
Start Configuration
Let's configure a filter table firewall.
(1) view the settings of
This article describes the detailed steps for configuring the firewall in linux, that is, how to use the iptables command. For more information, see
In this tutorial, make sure that you can use the linux host. If you are using an ssh remote
Common ports on Linux serversFtp:20 ssh:22 http:80 telnet:23 rsync:873 svn:3690pop3:110 smtp:25 dns:53 mysql:3306 nfs:111If your iptables basic knowledge is not yet known, it is recommended to take a look first.Start configurationLet's configure a
Objective:If your iptables basic knowledge is not yet known, it is recommended to take a look first.It took me nearly 1 months to write this article. Look for information, do your own experiments, I hope to help you. If there is incomplete and
Linux under Iptables configuration detailedIf your iptables basic knowledge is not yet known, it is recommended to take a look first.Start configurationLet's configure a firewall for the filter table.(1) Check the setting of this institution in
Linux under Iptables configuration detailed-A rh-firewall-1-input-p tcp-m State--state new-m TCP--dport 24000-j ACCEPT-A rh-firewall-1-input-s 121.10.120.24-p tcp-m tcp--dport 18612-j ACCEPTIf your iptables basic knowledge is not yet known, it is
If your iptables basic knowledge is not yet known, it is recommended to take a look first.Start configurationLet's configure a firewall for the filter table.(1) Check the setting of this institution in Iptables[ROOT@TP ~]# iptables-l-NChain INPUT
Introduction: A Good article about the Linux firewall iptables configuration, Linux firewall configuration is critical, this involves the server security, security is not absolute, but iptables with good can eliminate most of the gray temptation.
Transfer from http://www.cnblogs.com/JemBai/archive/2009/03/19/1416364.htmlIf your iptables basic knowledge is not yet known, it is recommended to take a look first.Start ConfigurationLet's configure a firewall for the filter table.(1) Check the
If your iptables basic knowledge is not yet known, it is recommended to take a look first. Start configuration Let's configure a firewall for the filter table. (1) Check the setting of this institution in Iptables [ROOT@TP ~]# iptables-l-NChain
Start ConfigurationLet's configure a firewall for the filter table.(1) Check the setting of this institution in Iptables[Email protected] ~]# iptables-l-NChain INPUT (Policy ACCEPT)Target Prot opt source destinationChain FORWARD (Policy
If your iptables basic knowledge is not yet known, it is recommended to take a look first.Start ConfigurationLet's configure a firewall for the filter table.(1) Check the setting of this institution in Iptables[email protected] ~]# iptables-l-NChain
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.