欧美一区二区三区老妇人-欧美做爰猛烈大尺度电-99久久夜色精品国产亚洲a-亚洲福利视频一区二区

O'REILLYiptables筆記

1  introduction
iptable 工作在osi 網(wǎng)絡(luò)層 和數(shù)據(jù)鏈路層
   example
  1.   iptables -t nat -A PREROUTING -i eth2 -p tcp --dport 80 -j DNAT  --to-destination 192.168.1.3:8080

    創(chuàng)新互聯(lián)專注于長(zhǎng)陽(yáng)網(wǎng)站建設(shè)服務(wù)及定制,我們擁有豐富的企業(yè)做網(wǎng)站經(jīng)驗(yàn)。 熱誠(chéng)為您提供長(zhǎng)陽(yáng)營(yíng)銷型網(wǎng)站建設(shè),長(zhǎng)陽(yáng)網(wǎng)站制作、長(zhǎng)陽(yáng)網(wǎng)頁(yè)設(shè)計(jì)、長(zhǎng)陽(yáng)網(wǎng)站官網(wǎng)定制、小程序設(shè)計(jì)服務(wù),打造長(zhǎng)陽(yáng)網(wǎng)絡(luò)公司原創(chuàng)品牌,更為您提供長(zhǎng)陽(yáng)網(wǎng)站排名全網(wǎng)營(yíng)銷落地服務(wù)。

    1. 解析:

    2. -t  nat    operate the table

    3. -A PERROUTING     by appending the following rule to its PREROUTING chain

    4. -i   eth0       match pactets coming in on the eth2 network interface

    5.  -p   tcp      use tcp protocol

    6. --dport 80    intended for local port 80

    7. -j DNAT      jump to the DNAT target

    8. --to-destination  change the destination address to 192.168.1.3

    9. 192.168.1.3:8080  destination port 80

  2. iptables defines five hook points

    1. PREROUTING

    2. INPUT

    3. FORWARD

    4. POSTROUTING

    5. OUTPUT

  3. tables   comes with three built-in tables

    1. filter   used to set polices for type of traffic allowed into  through and out of the computer.unless you refer to a different table explicitly,iptables operate on chains within this table by default.its built-in chains are FORWARD INPUT OUTPUT

    2. mangles used for specialized packet alteration,built-in chains are FORWARD INPUT OUTPUT POSTROUTING PEROUTING

    3. nat used with connection tracking to rediect connection for network address translation;typically based on source or destination address tis built-in chain are OUTPUT,POSTROUTING PREROUTING

  4. chains      default,each table has chains ,which are initally empty,for some or all of the hook points.  you can create your own custom chains to organize your rules. all user-defined chains have an implict policy of RETURN that cannot be changed.

  5. rules

  6. Matches

  7. targets   built-in four targets

    1. ACCEPT   let the packet through to the next stage of processing stop traversing the  current chain,start

    2. DROP

    3. QUEQU send the packet ro userspace.see the libipq manpage for more information

    4. From a rule in a user-defined chain, discontinue processing this chain, and resume traversing the calling chain at the rule following the one that had this chain as its target. From a rule in a built-in chain, discontinue processing the packet and apply the chain’s policy to it. See the previous section “Chains” for more information about chain policies.

  8. aplications

    1. packet filtering

    2. Accunting   using byte  packet counters assoiated with packet mataching criteria to moitor netwok traffic volumes.

    3. Connection tracking

    4. packet mangling

    5. network address translation (NAT)

    6. masquerading

    7. port forwarding

    8. loading balancing    Load balancing involves distributing connections across a group of servers so that higher total throughput can be achieved.One way to implement so that the destination address is selected in a round-robin fashion from a list of possible destinations

  9. configuring iptables      under refer to generic and Red Hat-specific information

    1. persistent rules  

      1. chkconfig --list iptables

      2. chkconfig --level 345 iptables on

      3. service iptables start

    2. other configure files     /proc

      1. /etc/sysct1.conf       contains settings for configurations in the /proc/sys directory that are applied at boot time.

      2. /proc/sys/net/ipv4/ip_conntrack_max          controls the size of the connection tracking table in the kernel.default value is calculated  based on the amount of RAM in your computer.you may need to increase it if you are getting "ip_conntrack:table full,dropping packet" errors in your log files

    3. connection tracking

      1. ESTABLISHED  the connection has already seen packets going in both direction.

      2. INVALID  the packet doesn't belong to any tracked connections.

      3. NEW   the packet is starting a new connection or is part of a connection that hasn't yet seen packets in both directions.

      4. RELATED   the packet is starting a new connection,but the new connection is related to an existing connection (such as the data connection for an ftp transfer

      5. @ the connection tracking logic maintains threee bits of status information

        1. ASSURED for tcp connections indicates the tcp connection setup has been completed for UDP connections,indicates its looks like a udp stream to the kernel.

        2. EXPECTED   indicates the connection was expected

        3. SEEN_REPLY  indicates that packets have gone in both directions.

      6. ipables connection tracking logic allows plug-in modules

      7. accounting

      8. NAT

        1. NAT helper modules

          1. ip_nat_amanda                                                                     Amanda backup protocol (requires CONFIG_IP_NFNAT_AMANDA kernel config)

          2. ip_nat_ftp                                                                                                                file transfer protocol(requires CONFIG_IP_NF_NAT_FTP kernel config)

          3. ip_nat_snmp_basic                                                                  simple network management protocol (requires CONFIG_IP_NF_NAT_SNMP_BASIC kernel conifig)

          4. ip_nat_tftp  t                                                                                         rivial file transfer protocol (                                                                          

        2. source NAT and Masquerading                                                           source nat is used to share a single internet connection among computers on a network.the computer attached to the internet acts as a gateway and uses

          1. iptables -t nat -A POSTROUTING to eth2 -j SNAT

          2. iptables -t nat -A POSTROUTING -o eth2 -j MASQUERADE

      9. DNAT  destination NAT

        1. iptables -t nat -A PREROUTING -i eth2 -p -tcp --dport 80 -j DNAT --to--destination 192.168.1.3:8000

      10. transparent proxying

        1. if you hava an http proxy configured to run as a transparenet proxy on you firewall computer and listen on port 8888. you can add a rule to redirect outbound http traffic to the http proxy

          1. iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 80 -j redirect --to-port 8888

      11. Load distribution and balancing

      12. stateless and stateful firewalls

      13. tools of the trade

        1. ethereal  network protocol analyzer

        2. Nessus  Remote security scanner

        3. nmap   network mapper

        4. ntop      network traffic probe

        5. tcpdump  packet capture and dumping

        6. traceroute   print the route packets take to a specific host

      14. iptable command reference

        1. -c    packet  or bytes

        2. --exact  synonym(同義)for -x

        3. -j    target  determines what to do with packets matching this rule.the target can be the name of a user-defined chain,one of the built-in targets,

        4. -M     used to load an iptables module with appending inserting  or replacing rules

        5. -n         displays numeric addresses and ports instead of looking up and displaying domain names for the IP address and displaying service names for the port numbers this can be especially useful if your DNS server is slow or down.

        6. -t  table    perfroms the specified subcommand on table  if this option is not used.the subcommand operates on filter tables by default.

        7. -x    display exact numbers for packet and byte counters,rather than the default abbreviatd format with metric suffixes(K?。汀。牵?/p>

      15. the iptables subcommands

        1. -A chain rule   appends rule to chain

        2. --append synonym for -A

        3. -D chain deletes the rule at position index or matching

        4. -E rename chain to new chain

        5. -F flushes (deletes) all rules from chain

        6. --replace synonym for -R

      16. iptables Matches and targets

        1. internet protocol matches (encyclopedic廣博的 format)

        2. ah match     this  match is available only if your kernel has been configured with CONFIG_IP_NF_MATCH_AH_ESP enabled

        3. connmark match     based on the packets connection mark

          1. --mark     match if the packets connection mark is equal to value after applying mask.

        4. CONNMARK target  (注意區(qū)分大小寫(xiě))

          1. --set-mark value  set the packets connection mark to the integer value

          2. --save-mark  save the packets mark into the connection

          3. --retore-mark  restore the packets mark from the connection.

        5. DNAT target   the DNAT target extension is avaiable only on the PREROUTING AND OUTPUT chain of the nat table.

        6. DRIP target

        7. dscp match    use this match to identify packets with particular diffntiated services codepoint(DSCP) values in their IPV4 headers    this match is available only if your kernel has been configured with  CONFIG_IP_NF_MATCH_DSCP enabled.

        8. ecn match      CONFIG_IP_NF_MATCH_ECN enabled

        9. esp match     match IPsec protocol encapsulation headers,CONFIG_IP_NF_MATCH_AH_ESP enabled

        10. FTOS  --set-ftos value Set the IP type of service field to the decimal or hex value (this target does not accept Type of Service names). See Table34 for a list of types of service

        11. helper match  CONFIG_IP_NF_MATCH_HELPER

        12. icmp match   --icmp-type   --icmp-type

        13. O'REILLY iptables 筆記

        14. iplimit match

        15. ipv4option match

        16. length match   CONFIG_IP_NF_MATCH_LENGTH enable

        17. limit match     CONFIG_IP_NF_MATCH_LIMIT enabled

          1. iptables -A INPUT -p icmp --icmp-type ping -m limit --limit 10/s -j ACCEPT

        18. log target    CONFIG_IP_NF_TARGET enabled    

          1. --log-ip-options

          2. --log-level level

          3. --log-prefix prefix

          4. --log-tcp-options

          5. --log-tcp-sequence  log level   refer to page 49

        19. mac match   CONFIG_IP_NF_MATCH_MAC enabled

          1. --mac-source  

        20. mark match   CONFIG_IP_NF_MATCH_MARK enabled

        21. MASQUERADE target  --to-ports  CONFIG_IP_NF_TARGET_MASQUERADE

        22. multiport match  CONFIG_IP_NF_MATCH_MULTIPORT enabled

        23. netlink target   CONFIG_IP_NF_QUEQU

          1. iptable -A INPUT -p icmp --icmp-type ping -j NETLINK --nldrop

        24. NETMAP       target     CONFIG_IP_NF_TARGET      An IPv4 address consists of 32 bits, divided into a network number and a host number based on the network mask. This target strips off the network number and replaces it with a different network number

          1. iptables -t nat -A RREROUTING -d 192.168.1.10/24 -j NETMAP --to 172.16.5.0/24

        25. nth match O'REILLY iptables 筆記O'REILLY iptables 筆記O'REILLY iptables 筆記

          1. owner match    CONFIG_IP_NF_MATCH_OWNER enabled

        26. pkttype match

        27. pool match  

          1. --srcpool poll  match if the source ip address is in pool

          2. --dstpool pool  match if the destination ip address is in pool

        28. pool target

        29. psd match      the match extension attempts to detect port scans by monitoring connection attempts across port numbers it calulates and maintains a port scan value staticticO'REILLY iptables 筆記

        30. QUEUE target    match until a quota is reached.    --quota amount

        31. random match     match all traffic from ip addresses that have seen recent activity of a particulrar kind,

        32. record-rpc match

        33. REDIRECT target  CONFIG_IP_NF_TARGET enabled     --to-ports

        34. REJECT target      CONFIG_IP_NF_TARGET_REJECT enabled

        35. RETURN target  

        36. ROUTE target

          1. ROUTE target

          2. SAME target

          3. SNAT target

          4. state match  CONFIG_IP_NF_STATE

          5. sting match  iptables -A INPUT -m string .pif -j QUEQU

          6. tcp match

          7. tcpmss match   CONFIG_IP_NF_MATCH_TCPMSS enable

          8. TCPMSS target  CONFIG_IP_NF_TARGET_TCPMSS

          9. time match

          10. tos match  CONFIG_IP_NF_MATCH_TOS

          11. TOS target  CONFIG_IP_NF_TARGET_TOS

          12. ttl match     CONFIG_IP_NF_MATCH_TTL

          13. udp match  

          14. ULOG target   CONFIG_IP_NF_TARGET_ULOG and CONFIG_IP_NF_QUEUE enabled

          15. unclean match     CONFIG_IP_NF_MATCH_UNCLEAN  matches unusual or malformed ip icmp udp or tcp headers,Documentation of this match is minimal,but you could use it  for logging unusual packets here are a few of the checks it perfoms

            1. ip packet length not less than ip header length

            2. various ip fragmentation checks

            3. noozero ip protocol number

            4. unused ip bits set to zero

            5. icmp date at least two 32 bit words long

            6. icmp code appropriate for icmp type

            7. icmp packet length approgriate for icmp type

            8. udp data at least as big as the minimun-size udp header.

            9. nozero udp destination port

            10. udp fragmentation integrity checks

            11. tcp date at least as big  as the minimum-size tcp header

            12. tcp data offset and overall packet data length in accord

            13. nonzero tcp ports

            14. reserved tcp bits set to zero

            15. tcp flags match one of the patterns

            16. various integrity checks on any tcp option

        37. utility command reference

          1. iptables-restore

          2. iptables-save

網(wǎng)頁(yè)題目:O'REILLYiptables筆記
URL網(wǎng)址:http://chinadenli.net/article2/jeejoc.html

成都網(wǎng)站建設(shè)公司_創(chuàng)新互聯(lián),為您提供外貿(mào)網(wǎng)站建設(shè)、移動(dòng)網(wǎng)站建設(shè)、云服務(wù)器、自適應(yīng)網(wǎng)站、商城網(wǎng)站、網(wǎng)頁(yè)設(shè)計(jì)公司

廣告

聲明:本網(wǎng)站發(fā)布的內(nèi)容(圖片、視頻和文字)以用戶投稿、用戶轉(zhuǎn)載內(nèi)容為主,如果涉及侵權(quán)請(qǐng)盡快告知,我們將會(huì)在第一時(shí)間刪除。文章觀點(diǎn)不代表本網(wǎng)站立場(chǎng),如需處理請(qǐng)聯(lián)系客服。電話:028-86922220;郵箱:631063699@qq.com。內(nèi)容未經(jīng)允許不得轉(zhuǎn)載,或轉(zhuǎn)載時(shí)需注明來(lái)源: 創(chuàng)新互聯(lián)

營(yíng)銷型網(wǎng)站建設(shè)
亚洲国产综合久久天堂| 国产精品久久女同磨豆腐| 国产午夜福利一区二区| 日韩中文字幕视频在线高清版| 国产级别精品一区二区视频| 久久精品少妇内射毛片| 粉嫩一区二区三区粉嫩视频| 五月婷婷六月丁香狠狠| 免费观看一区二区三区黄片| 日韩三极片在线免费播放| 日韩一区二区三区观看| 日本不卡一区视频欧美| 日本高清视频在线播放| 久久99午夜福利视频| 欧美日韩高清不卡在线播放| 欧美日韩国产亚洲三级理论片| 欧美野外在线刺激在线观看| 欧美在线观看视频三区| 久久99青青精品免费观看| 国产一区二区三区色噜噜| 日本一品道在线免费观看| 日本三区不卡高清更新二区| 伊人久久青草地婷婷综合| 日韩成人免费性生活视频| 亚洲国产成人精品一区刚刚| 日韩精品人妻少妇一区二区| 91人妻人人澡人人人人精品| 国产成人精品资源在线观看| 黑丝袜美女老师的小逼逼| 国产成人精品一区二三区在线观看| 在线免费国产一区二区| 绝望的校花花间淫事2| 欧美日韩国产免费看黄片| 日本人妻精品有码字幕| 99久久国产综合精品二区| 亚洲第一视频少妇人妻系列| 五月天综合网五月天综合网| 午夜视频在线观看日韩| 国产91人妻精品一区二区三区| 深夜视频在线观看免费你懂| 欧美日韩亚洲精品内裤|