Command line this section lists the components of the iptables command line (content following the utility name iptables ). Besides the clearly marked parts, the utility iptables has no special requirements on the location of command line parameters.
First, iptables the rules of the table and chain. Table (tables) provides specific functionality, the Iptables contains 4 tables, the filter table, the NAT table, the Mangle table, and the raw table, respectively, to implement packet filtering,
The Iptables command is listed below: --append:-A adds rule-specifications specified rules to the end of the rule chain chain. If the grouping matches all of the rules in the rule-specifications, then target targets will handle it. IPTABLES-A chain
The/etc/sysconfig/iptables file saves the port rules. I feel that editing this file is reliable. Run the iptables command to go to an article. 1. check the settings of IPTABLES on the local machine [root @ tp ~] # Iptables-L-nChainINPUT
Linux Iptables commandList:
Use iptables-ADC to specify the chain rules.-A Add-D Delete-C modify
Iptables-[RI] chain rule num rule-specification [option]
Use iptables-RI to specify the sequence of rules
Iptables-D chain rule num [option]
Deletes a
This article describes the detailed steps for configuring the firewall in linux, that is, how to use the iptables command. For more information, see
In this tutorial, make sure that you can use the linux host. If you are using an ssh remote
#iptables [OPTION] COMMAND CHAIN match standard-j TARGET[OPTION]-T TABLENAME does not specify default to filter-j Specify targetCOMMANDManagement rules-a adds a rule at the end of the chain-I CHAIN [num] inserts the NUM rule on the China chain
The principles and concepts of the iptables firewall are described above. here we mainly describe the parameters and usage of the iptabels command. let's first review the content of the iptables control process in the previous article. Iptables uses
Point I entered the original
Introduction to the Iptables command
Original link
The iptables firewall can be used to create filtering (filter) and NAT rules. All Linux distributions can use Iptables, so understanding how to configure Iptables will
Use of the iptables commandiptables [-t table] command [match] [-j Target/jump][-T table] specifies the rule tableThe-t parameter is used to have three built-in rule tables: NAT, mangle, and filter, which are treated as filter when no rule table is
See this configuration on the Internet is also relatively easy to understand, turned around, we look together, I hope that your work can be helpful.Iptables-fIptables-xIptables-f-T MangleIptables-t Mangle-xIptables-f-T NATIptables-t Nat-xFirst,
"Go: Original link"Iptables-fIptables-xIptables-f-T MangleIptables-t Mangle-xIptables-f-T NATIptables-t Nat-xFirst, empty the three tables and empty the self-built rules.Iptables-p INPUT DROPIptables-p OUTPUT DROPIptables-p FORWARD ACCEPTThe default
With this tutorial, make sure you can use Linux native. If you are using SSH remote, and can not directly operate the machine, then we recommend you cautious, cautious, and then cautious!With Iptables We can configure a dynamic firewall for our
Reprinted from: http://jiujiang.blog.sohu.com/97911176.html
If you do not know the basic knowledge about iptables, we recommend that you first check it out.
Start Configuration
Let's configure a filter table firewall.
(1) view the settings of
See this configuration on the Internet is also relatively easy to understand, turned around, we look together, I hope that your work can be helpful.The safety awareness of network administrators is much more important than sloganeering Linux
The firewall is the kernel configuration, iptables is the tool that uses the firewallIptables Syntax:iptables [-t table name] action chain name match condition-j target action or jumpDetailedName table1. Raw table: Determines whether the packet is
1. basic operations of the chain 1. clear all rules. 1) clear all rules in the rule chain in the filter of the preset table. # Iptables-F2) clears the rules in the user-defined chain in the preset table filter. # Iptables-X # iptables-Z2, set the
I. entry to iptables there are many ways for hackers to intrude into computers today, among which port-based intrusions are common. In particular, it is the simplest and most commonly used method to defend against hacker intrusions to shut down
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.