Difference between revisions of "Iptables"

From wikieduonline
Jump to navigation Jump to search
 
(6 intermediate revisions by 2 users not shown)
Line 22: Line 22:
 
  [[KVM]] [[VNC]] remote viewer
 
  [[KVM]] [[VNC]] remote viewer
 
  [[iptables]] -t nat -A PREROUTING -i eno1 -p tcp --dport 5900 -j DNAT --to 127.0.0.1:5900
 
  [[iptables]] -t nat -A PREROUTING -i eno1 -p tcp --dport 5900 -j DNAT --to 127.0.0.1:5900
  [[sysctl]] -w net.ipv4.ip_forward=1
+
  [[sysctl -w]] [[net.ipv4.ip_forward]]=1
 
  sysctl -p [[/etc/sysctl.conf]]
 
  sysctl -p [[/etc/sysctl.conf]]
  
Line 40: Line 40:
 
*<code>iptables -P INPUT DROP</code>
 
*<code>iptables -P INPUT DROP</code>
 
*<code>iptables -P OUTPUT DROP</code>
 
*<code>iptables -P OUTPUT DROP</code>
[[netfilter-persistent]] save
+
*<code>[[netfilter-persistent]] save</code>
  
 
===Block all but one IP===
 
===Block all but one IP===
Line 55: Line 55:
 
*<code>[[netfilter-persistent]] save</code>
 
*<code>[[netfilter-persistent]] save</code>
  
Clear iptables rules <ref>https://serverfault.com/a/200658</ref>
+
===Clear iptables rules===
iptables -P INPUT ACCEPT
+
<ref>https://serverfault.com/a/200658</ref>
iptables -P FORWARD ACCEPT
+
*<code>iptables -P INPUT ACCEPT</code>
iptables -P OUTPUT ACCEPT
+
*<code>iptables -P FORWARD ACCEPT</code>
iptables -t nat -F
+
*<code>iptables -P OUTPUT ACCEPT</code>
iptables -t mangle -F
+
*<code>iptables -t nat -F</code>
iptables -F
+
*<code>iptables -t mangle -F</code>
iptables -X
+
*<code>iptables -F</code>
 +
*<code>iptables -X</code>
  
  
* Flush
+
===Flush===
 
** <code>iptables -F</code>
 
** <code>iptables -F</code>
 
::: (no output)
 
::: (no output)
Line 84: Line 85:
 
* <code>[[arptables]]</code>
 
* <code>[[arptables]]</code>
 
* <code>[[resolvconf]]</code>
 
* <code>[[resolvconf]]</code>
* [[table]], [[chain]]
+
* <code>[[table]]</code>, <code>[[chain]]</code>
 +
* [[IP forwarding]]
 +
* [[eBPF]]
  
 
== See also ==
 
== See also ==

Latest revision as of 08:15, 26 February 2024

iptables (1998) command line utility allows to modify Linux kernel firewall rules.

Tables: filter, nat, mangle, raw and security

Basic commands[edit]



Options[edit]

  • Add: iptables -A
  • Delete: iptables -D
  • Insert: iptables -I

Examples[edit]

KVM VNC remote viewer
iptables -t nat -A PREROUTING -i eno1 -p tcp --dport 5900 -j DNAT --to 127.0.0.1:5900
sysctl -w net.ipv4.ip_forward=1
sysctl -p /etc/sysctl.conf


Port forwarding[edit]

[1]

  • iptables -t nat -A PREROUTING -p tcp --dport 2222 -j DNAT --to-destination IP_DESTINATION
  • iptables -t nat -A POSTROUTING -p tcp -d IP_DESTINATION --dport 2222 -j MASQUERADE
  • echo 1 > /proc/sys/net/ipv4/ip_forward
  • Block all output traffic: iptables -A OUTPUT -o ethXXX -j DROP
  • Open a port: iptables -I INPUT -p tcp --dport XXX -j ACCEPT

Block all but a range[edit]

  • iptables -I OUTPUT -m iprange --dst-range <remote_ip> -j ACCEPT
  • iptables -I INPUT -m iprange --src-range <remote_ip> -j ACCEPT
  • iptables -P INPUT DROP
  • iptables -P OUTPUT DROP
  • netfilter-persistent save

Block all but one IP[edit]

  • iptables -I OUTPUT -d <remote_ip> -j ACCEPT
  • iptables -I INPUT -s <remote_ip> -j ACCEPT
  • iptables -I OUTPUT -d <remote_ip> -j ACCEPT
  • iptables -I INPUT -s <remote_ip> -j ACCEPT
  • iptables -P INPUT DROP
  • iptables -P OUTPUT DROP

Allow ssh connections only from specific IPs[edit]

  • iptables -A INPUT -p tcp --dport 22 -s YourIP -j ACCEPT
  • iptables -A INPUT -p tcp --dport 22 -j DROP
  • netfilter-persistent save

Clear iptables rules[edit]

[2]

  • iptables -P INPUT ACCEPT
  • iptables -P FORWARD ACCEPT
  • iptables -P OUTPUT ACCEPT
  • iptables -t nat -F
  • iptables -t mangle -F
  • iptables -F
  • iptables -X


Flush[edit]

    • iptables -F
(no output)
    • iptables -t nat -F
    • iptables -t YOUR_TABLE_NAME -F

Activities[edit]

  1. Read iptables Ubuntu howto: https://help.ubuntu.com/community/IptablesHowTo
  2. Read archlinux documentation: https://wiki.archlinux.org/index.php/iptables
  3. Read Stackoverflow iptables questions: https://stackoverflow.com/questions/tagged/iptables?tab=Votes
  4. Review your current iptables configuration
  5. iptables-save, iptables-restore

Related terms[edit]

See also[edit]

  • http://jensd.be/343/linux/forward-a-tcp-port-to-another-ip-or-port-using-nat-with-iptables
  • https://serverfault.com/a/200658
  • https://serverfault.com/a/608976
  • Advertising: