Use iptables firewall to shield qq and msn

Iptables shields QQ and MSN. the current environment is as follows: intranet network segment: 192.168.10.0/24; Gateway: 192.168.10.254 (in the building property area); therefore, you can build your own gateway internally, configure the iptables

Manage iptables firewall logs

As mentioned in the Iptables manual, the LOGtarget is used to record packet-related information. This information may be invalid, so it can be used for debugging. LOG will return details about the package, such as most of the IP header and other

How to configure destination NAT using iptables

Destination NAT changes the destination IP address of the data packet. when a data packet from the Internet accesses the public IP address of the network interface of the NAT server, the NAT server converts the destination address of these packets

Precautions for system O & M monitoring

At present, many enterprise information systems have their own monitoring platforms and monitoring methods. no matter which method is used to achieve real-time monitoring of the system and fault alarms, there are only two methods used: centralized

How to add swap virtual memory in LinuxVPS and VM

I want to install oracle10g in the virtual machine and find that the default swap space does not meet the minimum requirement. because the physical memory I allocate is 1 GB, 2 GB swap space is required as required, by default, only 1 GB of swap

How to set FQDN and Hostname in Linux server

In the past, we had to set up the email system. Currently, the complete FQDN name must be set for Puppet. Different operating systems are different. View [root @ rdo ~] # Hostnamewww [root @ rdo ~] # Hostname-fwww.server110.com to achieve this

How to Open pop3 and smtp ports in iptables firewall

Iptable-AINPUT-ptcp-dIP -- dport25-jACCEPTiptable-AINPUT-ptcp-dIP -- dport110-jACCEPT1, how do I close all ports? IPTABLES-AINPUT-DPROT1-65535-JDROP2 in the specified port that needs to be opened? (For example: 22) IPTABLES-AINPUT Iptable-a input-p

How to use tcpdump

Tcpdump adopts the command line method. its command format is: tcpdump [-adeflnNOpqStvx] [-c quantity] [-F file name] [-I network interface] [-r file name] [-ssnaplen] [-T type] [-w file name] [expression] tcpdump option introduction-a converts the

Use the source Command in Linux

Recently, Cainiao is learning shell programming. it seems that it is too late. it is just a matter of time for BS to start programming. In the process of learning shell programming, I encountered a very mentally retarded problem. I had consulted

Problems encountered during nagios installation and solutions

When nagios is installed in the source code, the following Error occurs: Couldnotopencommandfile '/usr/local/nagios/var/rw/nagios. cmd' forupdate! Thenitmeansthatthepermissionsonthefolderaremessedup. Don't 'tbotherse 1. an error occurred while

How to set up shared internet access for dual NICs in Linux

I. network extension structure: Server: two network card settings: eth1: 192.168.99.26 mask: 255.255.255.0 Gateway: 192.168.99.133 # connect with Inte. Net to connect the vro to the Internet. Eth0: 192.168.0.1 mask: 255.255.255.0 # Subnet segment of

Instructions on using iptables firewall settings commands

Iptables-Fiptables-Xiptables-F-tmangleiptables-tmangle-Xiptables-F-tnatiptables-tnat-X first, clear the three tables and the self-built rules. Iptables-PINPUTDROPiptables-POUTPUTDROPiptables-PFORWAR Iptables-FIptables-XIptables-F-t mangleIptables-t

Obtain the current Unix timestamp in different programming languages

The Unix timestamp (Unixepoch, Unixtime, POSIXtime, or Unixtimestamp) is the number of seconds elapsed since January 1, January 1, 1970 (midnight UTC/GMT), regardless of the leap second. The UNIX timestamp 0 follows the ISO8601 standard: 1970-01-01T0

Analyze HTTP requests using tcpdump

Advertisement: The akcms I wrote is flexible, small, fast, and serverless. You are welcome to try it out with your Webmaster. tcpdump is a tool for intercepting and analyzing network data packets in Linux. it has great reference value for optimizing

Debian system quick building pptpVPN

This is a short tutorial to quickly build an available VPN. This article does not cover the normal use of VPN. this short tutorial is based on the following hardware conditions: a VPS with DebianGNU/Linux5.0 installed. of course, in theory, all *

Capture Android data packets using tcpdump

I. Preparation: 1. the Android phone requires the root permission first. One way to check whether the root permission is obtained: Install and enable the terminal simulator (which can be obtained through channels such as the Android Market ). On the

How to use iptables for port forwarding in Linux

We have a computer with two Nics. eth0 is connected to the Internet, and the ip address is 1.2.3.4. eth1 is connected to the intranet, and the ip address is 1Array2. 168.0.1. now we need to forward the IP packet sent to Port 81 of port 1.2.3.4 to IP

Configure iptables proxy for Internet access in Linux

In linux, iptables proxy is used for Internet access. 1. Gateway/proxy server (proxyserver) iptables: the firewall software iptables in linux has two features: 1, firwall2, nat address translation rpm-qa |

Linux system network performance debugging and optimization

This article describes network performance management techniques for Linux systems. it mainly describes how to use route, netstat, and tcpdump network management test tools and their functions. When configuring the network, you must specify the path

Linux partition and Mount graphic tutorial

1. after adding a new hard disk, you can use fdisk-l to view and confirm the new hard disk. In linux, device files are stored in/dev: 1) IDE hard disk is represented as hd, SCSI is represented as sd, 2) The first block is represented as. The second

Total Pages: 2732 1 .... 693 694 695 696 697 .... 2732 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.