你可能感兴趣的试题
filter firewall nat mangle
ipchinas iptables ISA checkpoint
iptables-AINPUT-ptcp-s192.168.1.20--dport23-jREJECT iptables-AINPUT-ptcp-d192.168.1.20--sport23-jREJECT iptables-AOUTPUT-ptcp-s192.168.1.20--dport23-jREJECT iptables-AOUTPUT-ptcp-d192.168.1.20--sport23-jREJECT
tcp_wrappers ipfliter ipchains或iptables hosts.deny
过滤TCP23端口 删除/etc/issue和/etc/issunet文件 利用TCPWRAPPER iptables–AINPUT–ptcp–d0/0–dport23–jDROP
将对192.168.0.18 的80 端口的访问转发到内网的 61.129.3.88 主机上 将对61.129.3.88 的80 端口的访问转发到内网的192.168.0.8 主机上 将192.168.0.18 的80 端口映射到内网的61.129.3.88 的80 端口 禁止对61.129.3.88 的80 端口的访问
iptables-FINPUT-d192.168.0.2-ptcp--dport22-jACCEPT iptables-AINPUT-d192.168.0.2-ptcp--dport23-jACCEPT iptables-AFORWARD-d192.168.0.2-ptcp--dport22-jACCEPT iptables-AFORWARD-d192.168.0.2-ptcp--dport23-jACCEPT
PREROUTING INPUT OUTPUT FORWARD POSTROUTING
Bluetoothd Avahi Fuse Iptables
查询特殊规则 新增特殊规则 删除特殊规则 批量导入特殊规则
配置iptables 配置Tcpwapper 启用Selinux 修改root的UID
将对192.168.0.18的80端口的访问转发到内网的61.129.3.88主机上 将对61.129.3.88的80端口的访问转发到内网的192.168.0.18主机上 将192.168.0.18的80端口映射到内网的61.129.3.88的80端口 禁止对61.129.3.88的80端口的访问
将对192.168.0.18的80端口的访问转发到内网的61.129.3.88主机上 将对61.129.3.88的80端口的访问转发到内网的192.168.0.8主机上 将192.168.0.18的80端口映射到内网的61.129.3.88的80端口 禁止对61.129.3.88的80端口的访问
Squid Iptables Ipchains Netfilter
iptables-FINPUTE–d192.168.0.2-ptcp--dport22-jACCEPT iptables-AINPUT-d192.168.0.2-ptcp–dport23-jACCEPT iptables-AFORWARD–d192.168.0.2-ptcp—dport22-jACCEPT iptables-AFORWARD–d192.168.0.2-ptcp—dport23-jACCEPT
rarp route7 iptables filter
filter表内的OUTPUT链 filter表内的FORWARD链 nat表中的PREROUTING链 nat表中的POSTOUTING链