Tags: way AC drop CHM 3.0 Linux B16 address a lotIn many cases, you may need to block IP addresses under Linux. For example, as an end user, you may want to be immune from spyware or IP tracking. Or when you're running the peer software. You may want to filter the Internet links for anti-peer activities. If you are a system administrator, you may want to prohibit
How to block a large number of malicious IP addresses in Linux
In many cases, you may need to block IP addresses in Linux. For example, as an end user, you may want to avoid the troubles of spyware or IP tracking. Or when you are running P2P software. You may want to filter
192.168.2.0/24 is directly connected, Ethernet0/0For example, in the preceding routing table, we can use show ip route | I 192.168.1 to easily find all entries starting with 192.168.1.1. R2 # show ip route | I 192.168.12. O 192.168.1.0/24 [110/20] via 10.1.1.1, 00:15:46, Ethernet0/0However, this command is not so useful when the destination address also contains the CIDR
for other IP landing can be displayed by the quack
And then I'll send you the following instructions.
Then we based on the large flow of IP can be iptables to block IP, this is only temporary to see who is attacking us, modify the vulnerability is
Important to
Five, related parameters and instructions 1, IFTOP
Access-list standard David // configure the IP standard access control list named DavidR1 (config-STD-NaCl )#?Default set a command to its defaultsDeny specify packets to rejectExit exit from access-list Configuration ModeNo negate a command or set its defaultsPermit specify packets to forwardRemark access
interconnection! Using the IP address extended access list to implement access restrictions for the Application Service, we will configure the WWW Service that restricts the access of the student machine to the server here! (The rest are similar) Switch (config) # ip access-list extended cisco (set the extended
[Experiment Name] numbered standard IP address access list [Objective] To master the rules of the numbered standard IP address access list on the vro and configure [experiment function] to implement security control for mutual access between network segments 【 lab device: vro (2), V35 cable (1), crossover line (3) [exp
Initiating an SSH attack host IP Address listTohoku University http://antivirus.neu.edu.cn/scan/ssh.phpThe following IP address attacks the SSH service, significantly increasing the likelihood of the host becoming a broiler. Network management is strongly recommended to block the following addresses. #========== Start copying ==========LDD ' which sshd ' | grep l
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.