Netfilter/iptables is an IP information packet filtering system integrated with the latest Linux kernel version 2.4.x. If the Linux system is connected to the Internet or LAN, server, or a proxy server connected to the LAN and Internet, the system facilitates better control of IP packet filtering and firewall configuration on the Linux system. Mugdha Vairagade will introduce the netfilter/iptables system, h
========================================================== =
========================================================== =
Common iptables firewall configuration problems:
Author: kenduest)
Last Updated: 8/18/2006
========================================================== =========================================================== =
Title List project: (generally, the firewall configuration problem on the local machine)
1. How can I query my current
From: http://blog.csdn.net/jixiuffff/article/details/5879547
[C-sharp] View plaincopy
# Five checkpoints prerouting, forward postrouting Input Output
# A data packet enters my machine from prerouting. It has two destinations. One is to access the applications on my machine through input.ProgramAfter output, postrouting
# The other direction is to direct the forward postrouting to another machine. That is to say, my machine only acts as a route and data packets are routed to othe
The default script only enables ports 80, and 22 of the conventional web server.
# Vi default_firewall.sh#! /Bin/bash######################################## ################################### File: default_firewall.sh# Description:# Language: GNU Bourne-Again SHell# Version: 1.0# Date: 2010-6-23# Corp.: c1gstudio.com# Author: c1g# WWW: http://blog.c1gstudio.com### END INIT INFO######################################## #######################################
Kubernetes version number of this analysis: v1.2.1-beta.0.
The Kube-proxy component in Kubernetes is responsible for maintaining firewall rules and routing rules on node nodes, kube-proxy two implementations, one through Iptables, the other through userspace, Using Iptables as a first choice in 1.2 can dramatically improve performance, and here's how the Kube-proxy component operates
Here are my iptables settings.
Copy Code code as follows:
*filter
: INPUT DROP [0:0]
: FORWARD ACCEPT [0:0]
: OUTPUT ACCEPT [49,061:9,992,130]
-A input-i lo-j ACCEPT does not open a lot of services can not be used, open loopback address
-A input-p icmp-j ACCEPT allows ICMP packets to pass, which means allowing others to ping themselves
-A input-m state--state related,established-j ACCEPT
-A input-p tcp-m tcp--dport 21-j AC
A useful iptables script for IPCop (written by a friend), do not remember which one is written, please mail (ayihu@qq.com) under the Tell me:
#!/bin/sh## Firewall Starting Firewall## chkconfig:2345 98 01# description:setting Firewall########################################################################### Set parameters##########################################################################INNER_NET=192.168.0.0/24 # LAN LAN free setfwall_ip=192.16
This section describes iptables concepts and usage instructions in iptables, which must be case sensitive. The main syntax differences between ipchains and iptables are as follows: 1. in ipchains, for example, the input chain uses lower-case chains. in iptables, use upper-case INPUT instead. 2. in
IptablesGetting start
"
IN_ETH_IP = "10.10.11.110"
# Set the IP address segment of the firewall internal server
# Internal ip range
SERVER_IP = "10.10.11.0/24"
1. the system initializes the configuration file for ip packet forwarding. if the input value is 0, it indicates no forwarding. 1. enable the forwarding function. in this case, the value needs to be initialized to 0.
# Disable forwarding
Echo 0>/proc/sys/net/ipv4/ip_forward
# Initialization
IptablesRule list.
# Reset default policies
Linux under Iptables configuration detailed-A rh-firewall-1-input-p tcp-m State--state new-m TCP--dport 24000-j ACCEPT-A rh-firewall-1-input-s 121.10.120.24-p tcp-m tcp--dport 18612-j ACCEPTIf your iptables basic knowledge is not yet known, it is recommended to take a look first.Start ConfigurationLet's configure a firewall for the filter table.(1) Check the setting of this institution in
A few days ago the micro-demon tribe was once again subjected to attacks by individual ulterior motives, by the way to recharge their own electricity, a review of the common Linux firewall iptables some of the content, but helpless online many of the tutorials are more cumbersome, in the concise learning purposes, the micro-demon for everyone to eliminate a lot of redundant content, Extract as many of the best part of the written, and common learning,
The method for starting and stopping iptables depends on the Linux release version in use. you can view the documentation of the Linux version in use. In RedHat, start iptables with: # serviceiptablesstart. generally, iptables is already included in the Linux release. you can run iptables -- version to check whether ip
Iptables-1.1.9 Guide (Classic) (4)-Linux Enterprise Application-Linux server application information, which is described below. The meaning of [UNREPLIED] is the same as that in the previous section. It indicates that the number is transmitted only in one direction, that is, no response is received. Next, there are three new fields, namely the Source and Destination Address of the response packet. Note that the type and code change with the response p
Iptables is commonly used on Linux firewall software, the following to everyone to say iptables installation, clear iptables rules, iptables only open the designated port, iptables shield designated IP, IP segment and unblock, Remove basic applications such as
1. Install iptables Firewall
How do I know if the system has iptables? Perform iptables-v if shown as:
Iptables v1.3.5
The instructions have been installed iptables.If you do not install iptables, you need to install it first, execute:
Yum Install
The main 2 basic practical applications, mainly related to the ban Ping (IPv4) and the prohibition of UDP, that is, the use of the server to prevent hackers to outsource DDoS attack content.
First, if there is no iptables prohibit ping
echo 1 >/proc/sys/net/ipv4/icmp_echo_igore_all #开启echo 0 >/proc/sys/net/ipv4/icmp_echo_igore_all #关闭Second, the use of iptables rules to ban ping
It is necessary to configure the Iptables firewall under CentOS. Let's learn how to configure!
Set up firewalls in Linux, take CentOS as an example, and open the Iptables configuration file:
Default
Vi/etc/sysconfig/iptablesQuery for open 80 ports through the/etc/init.d/iptables status command if there are no two ways to handle:
1. Modify the Vi/etc/sysconfig
/modprobe. d/vsftpd. conf
Alias ip_conntrack ip_conntrack_ftp ip_nat_ftp -- load the FTP Module
Vim/etc/rc. Local
/Sbin/modprobe ip_conntract -- boot Module/Sbin/modprobe ip_conntrack_ftp/Sbin/modprobe ip_nat_ftp
4. Port Filtering
Vim/etc/sysconfig/iptables
-A input-p tcp-M multiport -- dport 20, 21-M state -- state new-J accept -- enable port 20 and port 21-A input-p tcp-M state -- state n
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.