I'm using Fedora 14.
1. View the Port:/etc/init.d/iptables status iptables firewall is already open
[[email protected] ~]#/etc/rc.d/init.d/iptables status or service iptables status
Table:filter
Chain INPUT (Policy ACCEPT)
Num Target prot opt source destination
1 ACCEPT TCP--0.0.0.0/0 0.0.0.0/0 TCP dpt:3306
Chain FORWARD (Policy ACCEPT)
Num Target prot opt source destination
Chain OUTPUT (Policy ACCEPT)
Num Target prot opt source destination
2. Turn on TCP 8080port
/sbin/iptables-i input-p TCP--dport 8080-j ACCEPT
/etc/rc.d/init.d/iptables Save or service iptables save #保存配置/etc/rc.d/init.d/iptables Restart or service iptables Resta RT #重新启动服务
[[email protected] ~]#/sbin/iptables-i input-p TCP--dport 8080-j ACCEPT
[Email protected] ~]#/etc/rc.d/init.d/iptables Save
iptables:saving firewall rules to/etc/sysconfig/iptables:[OK]
[Email protected] ~]#/etc/rc.d/init.d/iptables restart
iptables:flushing firewall rules: [OK]
Iptables:setting chains to Policy Accept:filter [OK]
iptables:unloading modules: [OK]
iptables:applying firewall rules: [OK]
[[Email protected] ~]# service iptables status
Table:filter
Chain INPUT (Policy ACCEPT)
Num Target prot opt source destination
1 ACCEPT TCP--0.0.0.0/0 0.0.0.0/0 TCP dpt:8080
2 ACCEPT TCP--0.0.0.0/0 0.0.0.0/0 TCP dpt:3306
3. Delete chain input to specify Rule 1;
[[email protected] ~]# iptables-d INPUT 1
[[Email protected] ~]# service iptables status
Table:filter
Chain INPUT (Policy ACCEPT)
Num Target prot opt source destination
1 ACCEPT TCP--0.0.0.0/0 0.0.0.0/0 TCP dpt:3306
Chain FORWARD (Policy ACCEPT)
Num Target prot opt source destination
Chain OUTPUT (Policy ACCEPT)
Num Target prot opt source destination
4.Reject specify port;
[[email protected] ~]#/sbin/iptables-i input-p TCP--dport 8080-j REJECT
[[Email protected] ~]# service iptables status
Table:filter
Chain INPUT (Policy ACCEPT)
Num Target prot opt source destination
1 REJECT TCP--0.0.0.0/0 0.0.0.0/0 TCP dpt:8080 reject-with icmp-port-unreachable
2 ACCEPT TCP--0.0.0.0/0 0.0.0.0/0 TCP dpt:3306
Chain FORWARD (Policy ACCEPT)
Num Target prot opt source destination
Chain OUTPUT (Policy ACCEPT)
Num Target prot opt source destination
Many other rules can be tested.
Http://www.2cto.com/os/201304/201164.html
Linux iptables firewall release the relevant port to reject the relevant port and view the opened port