iptables –F #Delete existing rules iptables -P INPUT DROP #Configure the default deny rule. The basic rule is to reject all services first and then add new ones as needed. Iptables -A INPUT -p tcp --dport 80 -j ACCEPT #open the tcp protocol of the WEB service port iptables -A INPUT -p tcp --dport 110 -j ACCEPT #open the POP3 service port tcp protocol iptables -A INPUT -p Tcp --dport 25 -j ACCEPT #Open the SMTP service port tcp protocol iptables -A INPUT -p tcp --dport 21 -j ACCEPT #Open the FTP service port tcp protocol iptables -A INPUT -p tcp -s 202.106.12.130 --dport 22 -j ACCEPT #Allow the IP address to be 202.106.12.130. This host connects to the local SSH service port iptables -A INPUT -p tcp --dport 53 -j ACCEPT #Allow the tcp packets of the DNS service port to flow into iptables - A INPUT -p udp --dport 53 -j ACCEPT #Allow UDP packets from the DNS service port to flow into iptables -A INPUT -p icmp -icmp-type echo-request -i eth1 -j DROP #防死的ping, slave interface All requests for icmp protocol entered by eth1 are discarded. Iptables -A FORWARD -p tcp --syn -m limit --limit 1/s -j ACCEPT #Prevent SYN Flood (denial of service attack) iptables -t nat -A POSTROUTING -o eth1 -s 192.168.0.226 -j MASQUERADE# Allow 192.168.0.226 to spoof the external network iptables via eth1 IP -t nat -A POSTROUTING -o eth0 -s 192.168.0.4 -p tcp --dport 25 -j MASQUERADE# allows 192.168.0.4 to access the 25 port of the external network through eth0 masquerading < Br>
Devil-Linux is a special Linux distribution for firewalls and routers. The goal of Devil-Linux is to
Faced with powerful Microsoft and early NetWare, Linux server operating system can be said to be a r
Many Linux enthusiasts consider the hardware configuration to be compatible with Linux systems when
After VPN connection is established, need to make the following settings: 1, click & ldquo; att
Linux prompt bash:command not found
Powerful screen commands in Linux systems
Linux use cpulimit limit process cpu usage rate
Tip: Linux personalized face clock display
Nginx Configuring SSL Basics Tutorial
Introduction to JDK installation and configuration method under Linux system
Linux hard links and soft links deep understanding
Linux file lookup command find, xargs details
Linux server performance optimization process
Linux sector by sector read and write block device
Data transmission on the link layer of the Linux protocol stack (bridge processing of data (5))
How to use the xbox screen recording software that comes with win10?
Solution for black screen code after system reinstallation
Windows Disc Production U disk installation system
Microsoft launches new website Want to accelerate the adoption of Windows 10 speed
How to query whether Win7 system is permanently activated
Want to quickly lock the computer screen to master a one-click lock screen recipe
Ways to place web page shortcuts on the Windows 8 system desktop
Solution for NFS version incompatibility in CentOS/Debian system
Communicate unbounded Windows 8 system easily install rich language packs