歡迎您光臨本站 註冊首頁

iptables之我見

←手機掃碼閱讀     火星人 @ 2014-03-08 , reply:0

iptables 和 SELinux 是Red Hat/ CentOS 的兩個很有力的工具,如果配置的好就能起到對伺服器進一步的保護作用,但是如果配置的不好往往會遭到管理員的拋棄.總有“老人”提醒我別開iptables和SELinux,但是我覺得既然開發出來還是可以加以利用的.

但是值得注意的是儘管iptables防火牆的功能很強大,但是有一個硬體防火牆還是很必要的.

因為有了其他設備,因此我既用不到轉發也不用網路地址轉換(NAT),我只要把握好讓那些數據流可以進入哪些不能進入就行了.不過我不太清楚ROS(Router Operating System,軟路由操作系統)是不是也有這個機制.

關於iptables的用法和注意事項,網上各大論壇和IT網站都進行了熱烈的討論和文章展示.在此就不贅述了!

  1. [root@localhost ~]# service iptables status
  2. Table: nat
  3. Chain PREROUTING (policy ACCEPT)
  4. num target prot opt source destination
  5. Chain POSTROUTING (policy ACCEPT)
  6. num target prot opt source destination
  7. Chain OUTPUT (policy ACCEPT)
  8. num target prot opt source destination
  9. Table: mangle
  10. Chain PREROUTING (policy ACCEPT)
  11. num target prot opt source destination
  12. Chain INPUT (policy ACCEPT)
  13. num target prot opt source destination
  14. Chain FORWARD (policy ACCEPT)
  15. num target prot opt source destination
  16. Chain OUTPUT (policy ACCEPT)
  17. num target prot opt source destination
  18. Chain POSTROUTING (policy ACCEPT)
  19. num target prot opt source destination
  20. Table: filter
  21. Chain INPUT (policy ACCEPT)
  22. num target prot opt source destination
  23. 1 RH-Firewall-1-INPUT all -- 0.0.0.0/0 0.0.0.0/0
  24. 2 ACCEPT udp -- 10.0.0.0/8 0.0.0.0/0 udp dpt:53
  25. 3 ACCEPT tcp -- 10.0.0.0/8 0.0.0.0/0 tcp dpt:443
  26. 4 ACCEPT tcp -- 10.0.0.0/8 0.0.0.0/0 tcp dpt:80
  27. Chain FORWARD (policy ACCEPT)
  28. num target prot opt source destination
  29. 1 RH-Firewall-1-INPUT all -- 0.0.0.0/0 0.0.0.0/0
  30. Chain OUTPUT (policy ACCEPT)
  31. num target prot opt source destination
  32. Chain RH-Firewall-1-INPUT (2 references)
  33. num target prot opt source destination
  34. 1 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
  35. 2 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 255
  36. 3 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
  37. 4 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22
  38. 5 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:8006
  39. 6 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:8007
  40. 7 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:8008
  41. 8 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:8080
  42. 9 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:8443
  43. 10 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:111
  44. 11 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:111
  45. 12 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:892
  46. 13 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:892
  47. 14 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:875
  48. 15 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:875
  49. 16 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:662
  50. 17 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:662
  51. 18 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2049
  52. 19 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:32803
  53. 20 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:32769
  54. 21 REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
  55. [root@localhost ~]#


[火星人 ] iptables之我見已經有819次圍觀

http://coctec.com/docs/linux/show-post-45994.html