View Status:Iptables-l-NAdd the following methods for opening a specific port:Use Iptables to open the following ports/sbin/iptables-i input-p TCP--dport 8000-j ACCEPTSave/etc/rc.d/init.d/iptables SaveRestart ServiceService Iptables RestartSee if the port you want to open takes effect?/etc/init.d/iptables statusAct 2:or edit/etc/sysconfig/iptables directly-A inpu
Tags:/etc tables Linux edit IV part sysconfig style sbinView Status:Iptables-l-NAdd the following methods for opening a specific port:Use Iptables to open the following ports/sbin/iptables-i input-p TCP--dport 8000-j ACCEPTSave/etc/rc.d/init.d/iptables SaveRestart ServiceService Iptables RestartSee if the port you want to open takes effect?/etc/init.d/iptables st
Recently in the construction of lamp environment, configure a variety of environments need to open the port, always in Baidu too troublesome, record
Original address: http://m.blog.csdn.net/sherwin/article/details/49562667
-------------------------------------------------------------------------
#/sbin/iptables-i input-p TCP--dport 80-j ACCEPT
#/sbin/iptables-i input-p TCP--dport 22-j ACCEPT#/sbin/iptables-i input-p TCP--dport 3306-j ACCEPTAnd then S
Common commandsNetstat-pan|grep 2809: View a specific port situationNETSTAT-NL | grep 110: View a specific port situationNETSTAT-AP: List the connected PID (process number) based on the above command, using this PID, you can use Kill to kill the connectionFor example: a connected pid=111 that wants to kick out uses KILL-9 111. Ok!NETSTAT-RN: Output Routing TableNmap 127.0.0.1: View native open ports,
Linux open ports, linux open ports
In Linux, the server cannot be connected when software access is installed. In this case, check whether the corresponding port is enabled. For example, after svn is installed, unable to connect:
When the svn service is started, you Can use commands on the server to check out the files
represents the first rule.When you delete the previous rule, the number will change as well.OK, we have removed the previous 2 rules, 22 port can also be used normally, it means that no problem.Save it below, and don't forget, otherwise the reboot will revert back to the original look.Service Iptables SaveTo save.Saving firewall rules to/etc/sysconfig/iptables: [OK]In fact, the rules you just set are written to the/etc/sysconfig/iptables file.6. DNS
A few days ago I watched a tutorial that uses a Python scan port and then wrote a script to scan the port. Record it and make it easy for you to review later.The results are as follows:650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/6D/FB/wKioL1VwUlmSOQlFAAF2wYbk_78905.jpg "title=" Scan port " alt= "Wkiol1vwulmsoqlfaaf2wybk_78905.jpg"/>The specific cod
1. disable all INPUTFORWARDOUTPUT to open only some ports. The following is the command implementation: iptables-PINPUTDROPiptables-PFORWARDDROPiptables-POUTPUTDROP and then use the command iptables-L-n to check whether the settings are correct. then, we can see that all the settings have been dropped, 1. disable all input forward output and only open it to some
A few days ago I watched a tutorial that uses a Python scan port and then wrote a script to scan the port. Record it and make it easy for you to review later.The results are as follows:650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/6D/FB/wKioL1VwUlmSOQlFAAF2wYbk_78905.jpg "title=" Scan port " alt= "Wkiol1vwulmsoqlfaaf2wybk_78905.jpg"/>The specific cod
1. disable all INPUTFORWARDOUTPUT to open only some ports. The following is the command implementation: iptables-PINPUTDROPiptables-PFORWARDDROPiptables-POUTPUTDROP and then use the command iptables-L-n to check whether the settings are correct. you can see that all the settings have been dropped.
1. disable all input forward output and only open it to some ports
Open a DOS window in Win2000 and then execute
For/L % A in (1, 1, 254) do start/MIN/low Telnet 192.168.0.% A 3389
In this way, all open ports 3389 in the 192.168.0.x segment will be exposed to hosts.
After this command is executed
254 small windows will be opened in the taskbar
Then, the window that fails the Telnet link will automatically exit in about 5 se
scan, check the host online or not, do not send any message to the destination host, want to know whether the target host is running, and do not want to do other scans, this scanning method is very common)2,-SL (only in the network segment out of the host State, port and other information, query port words with-p port,port1 ...) )3,-ps/pa/pu [Portlist] (based on a given port with TCP or UDP message detection: For the root user, this option allows Nma
In general, we adopt some powerful anti-Black software and firewall to ensure the security of our system. This article proposes a simple method to help you prevent illegal intrusion by limiting ports.
Illegal intrusionIn short, illegal intrusion can be roughly divided into four types:1. Scan the port to attack the host through known System bugs.2. Planting Troja
one pair test end stop, here we will run time modified to 5 minutes, later can be based on testing requirements to increase the testing time;? Run again, this test shipped 5 minutes before the end, the data obtained closer to the real level;? The test, just test the notebook a packet to the notebook B, then you can reverse test notebook B package to notebook A, on the pair bar right mouse button, select Copy, Paster, copy a pair;? This will get two pair, on one of the mouse double-click;? Modif
1) Start the slogan: -Jaccept# -J accept#3306 -j ACCEPT2) Then Save:#/etc/rc.d/init.d/iptables Save3) To view open ports:#/etc/init.d/iptables Status-------------------------------------------------------Additional instructions: Turn off the firewall#/etc/init.d/iptables stop#service iptables Stop #停止服务#service iptables Start #开启服务View
First of all, to declare this function, personal feeling is not very useful, because most of the time we have to bring the system from the firewall closed. Like small series is certainly closed, because small weave sometimes in the local area network and other people connected to the net, if no matter the system with the firewall then I have no way to play. So the following is about the use of Win7
In the previous 9 articles to share with you the construction of the 2008 DC and the core mode of some applications, when we have to deploy infrastructure services for the enterprise to be safe to start Windows Server 2008 with Windows Firewall, and many enterprises will also Deploy some security-resolution products (such as ISA) separately. So, to do a good job of the deployment of these products, we need to understand the Active Directory services a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.