zoukankan      html  css  js  c++  java
  • Iptables

    There are three different chains : input , forward and output.

     

    Input: This chain is used to control the behavior for incoming connections.

     

    Forward: This chain is used for incoming connections that aren't actually being delivered locally. Think of a router -- data is always being sent to it but rarely actually destined for the router itself;

     

    There is one sure-fire way to check whether or not your system uses the forward chain.

    Croot@loca I host 
Cha i n 
pkts 
0 
0 
0 
0 
181K 
4 
7 
129K 
Cha in 
pkts 
0 
0 
0 
0 
0 
0 
Cha in 
pkts 
(pol icy 
INPUT 
bytes 
target 
O ACCEPT 
O ACCEPT 
O ACCEPT 
O ACCEPT 
243M ACCEPT 
48 ACCEPT 
240 ACCEPT 
440 ACCEPT 
16M REJECT 
iptab les —L —v 
ACCEPT 0 packets. 0 bytes) 
prot opt in 
udp 
tcp 
udp 
tcp 
all 
cmp 
all 
tcp 
all 
v i rbr0 
v i rbr0 
v i rbr0 
v i rbr0 
any 
any 
10 
any 
any 
out 
any 
any 
any 
any 
any 
any 
any 
any 
any 
source 
anywhere 
anywhere 
anywhere 
anywhere 
anywhere 
anywhere 
anywhere 
anywhere 
anywhere 
dest inat ion 
anywhere 
anywhere 
anywhere 
anywhere 
anywhere 
anywhere 
anywhere 
anywhere 
anywhere 
dest inat ion 
192. 168. 122. 0/24 
anywhere 
anywhere 
anywhere 
anywhere 
anywhere 
dest inat ion 
udp dpt : domain 
top dpt :domain 
udp dpt : bootps 
top dpt : bootps 
state RELATED. ESTABLISHED 
state NEW tcp dpt : ssh 
reject—with ib i ted 
state RELATED. ESTABLISHED 
FORWARD (poi icy 
bytes 
target 
O ACCEPT 
O ACCEPT 
O ACCEPT 
O REJECT 
O REJECT 
O REJECT 
ACCEPT 0 packets. 
0 bytes) 
prot 
all 
all 
all 
all 
all 
all 
opt in 
any 
v i rbr0 
v i rbr0 
any 
v i rbr0 
any 
out 
v i rbr0 
any 
v i rbr0 
v i rbr0 
any 
any 
source 
anywhere 
192. 168. 122. 0/24 
anywhere 
anywhere 
anywhere 
anywhere 
bytes) 
source 
reject—w i th 
reject—with 
reject—w i th 
i cmp—port—unreachab I e 
i cmp—port—unreachab I e 
i ib i ted 
OUTPUT (poi icy ACCEPT 
bytes target 
prot 
128K packets. 34M 
opt in 
out

     

    The screenshot above is of a server that's been running for a few months and has no restrictions on incoming or outgoing connections. As you can see, the output chain has processed 34M. The forward chain , on the other hand ,has processed 0GB. It means that  this server isn't doing any kind of forwarding or being used as a pass-through device.

     

    Output: this chain is used for outgoing connections. Iptables will check it's output chain to see what the rules are used before making a decision to allow or deny the connections attempt.

     

    To see the default polices for the unmatched traffic.

    Chain INPUT (policy ACCEPT)

     

    Connection-specific Responses

    Accept:

    Drop:

    i?2.i68.6.i2? 
Pinging 192.168.6.129 with 32 bytes 
Request timed o«t. 
Request tined out. 
Request timed o«t. 
Request: tined out: . 
Ping statistics E or 
Packets: Sent 
i?2.i68.6.i2?: 
4„ Received 
data: 
4 
loss),

    Reject: Don't allow the connection, but send back an error.

    Pinging with 32 byte'& OF data: 
Reply Tren 192 .168.6.129: Destination port unreachahle. 
Reply Fycni i 92 DeatinatiGß port unreachable. 
Reply Fren 192 .168.6.129: Destination port unreachahle. 
Reply Fycni i 92 DeatinatiGß port unreachable. 
Ping atatistic•• F or 
Packets: gent 
— 4. Received = 
4. Lost 
- loss),

     

     

    You can use iptables -A to append rules to the existing chain.

    iptables -A INPUT -s 10.10.10.10 -j DROP

     

    You can  use netmask or  standard slash notation to  specify the range of IP addresses.

    iptables -A INPUT -s 10.10.10.0/24 -j DROP

    iptables -A INPUT -s 10.10.10.0/255.255.255.0 -j DROP

     

    Specific port

    iptables -A INPUT -p tcp --dport ssh -s 10.10.10.10 -j DROP

     

    Connection States:

    If you permit the SSH connections from 10.10.10.10, but SSH connections to 10.10.10.10 are not allowed.However, with the state ESTABLISHED ,the system is permitted to send back information over SSH as long as the session has already been established, which makes SSH  communication possible between these two hosts.

    iptables -A INPUT -p tcp --dport ssh -s 10.10.10.10 -m state --state NEW,ESTABLISHED -j ACCEPT

    iptables -A OUTPUT -p tcp --sport 22 -d 10.10.10.10 -m state --state ESTABLISHED -j ACCEPT

     

    You should save the configuration

    [root@localhost sysconfig]# /etc/init.d/iptables save

    iptables: Saving firewall rules to /etc/sysconfig/iptables:[  OK  ]

     

    The configuration file is /etc/sysconfig/iptables:

    [root@localhost sysconfig]# more    iptables

    # Firewall configuration written by system-config-firewall

    # Manual customization of this file is not recommended.

    *filter

    :INPUT ACCEPT [0:0]

    :FORWARD ACCEPT [0:0]

    :OUTPUT ACCEPT [0:0]

    -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT

    -A INPUT -p icmp -j ACCEPT

    -A INPUT -i lo -j ACCEPT

    -A INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT

    -A INPUT -j REJECT --reject-with icmp-host-prohibited

    -A FORWARD -j REJECT --reject-with icmp-host-prohibited

    COMMIT





  • 相关阅读:
    Sql日期时间格式转换
    c#被指定为此窗体的 MdiParent 的窗体不是 MdiContainer?
    kmeans聚类分析
    C# VS2005打开没问题,但是运行解决方案时就整个自动关闭了
    PowerDesigner教程系列(一)概念数据模型
    PowerDesigner概念设计模型(CDM)中的3种实体关系
    spss clementine Twostep Cluster(两步聚类 二阶聚类)
    PowerDesigner教程系列(三)概念数据模型
    Kmeans聚类算法
    c# 中窗体居中代码怎么写?
  • 原文地址:https://www.cnblogs.com/roni/p/5999944.html
Copyright © 2011-2022 走看看