사용법:
iptables -hiptables v1.4.12
Usage: iptables -[ACD] chain rule-specification [options] iptables -I chain [rulenum] rule-specification [options] iptables -R chain rulenum rule-specification [options] iptables -D chain rulenum [options] iptables -[LS] [chain [rulenum]] [options] iptables -[FZ] [chain] [options] iptables -[NX] chain iptables -E old-chain-name new-chain-name iptables -P chain target [options] iptables -h (print this help information)
Commands:Either long or short options are allowed. --append -A chain Append to chain --check -C chain Check for the existence of a rule --delete -D chain Delete matching rule from chain --delete -D chain rulenum Delete rule rulenum (1 = first) from chain --insert -I chain [rulenum] Insert in chain as rulenum (default 1=first) --replace -R chain rulenum Replace rule rulenum (1 = first) in chain --list -L [chain [rulenum]] List the rules in a chain or all chains --list-rules -S [chain [rulenum]] Print the rules in a chain or all chains --flush -F [chain] Delete all rules in chain or all chains --zero -Z [chain [rulenum]] Zero counters in chain or all chains --new -N chain Create a new user-defined chain --delete-chain -X [chain] Delete a user-defined chain --policy -P chain target Change policy on chain to target --rename-chain -E old-chain new-chain Change chain name, (moving any references)Options: --ipv4 -4 Nothing (line is ignored by ip6tables-restore) --ipv6 -6 Error (line is ignored by iptables-restore)[!] --proto -p proto protocol: by number or name, eg. `tcp'[!] --source -s address[/mask][...] source specification[!] --destination -d address[/mask][...] destination specification[!] --in-interface -i input name[+] network interface name ([+] for wildcard) --jump -j target target for rule (may load target extension) --goto -g chain jump to chain with no return --match -m match extended match (may load extension) --numeric -n numeric output of addresses and ports[!] --out-interface -o output name[+] network interface name ([+] for wildcard) --table -t table table to manipulate (default: `filter') --verbose -v verbose mode --line-numbers print line numbers when listing --exact -x expand numbers (display exact values)[!] --fragment -f match second or further fragments only --modprobe=<command> try to insert modules using this command --set-counters PKTS BYTES set the counter during insert/append[!] --version -V print package version.
<Specific input interface> iptables -A INPUT -i eth0 -j ACCEPT
<Specific MAC only ACCEPT and others DROP> iptables -A INPUT [-s XXX.XXX.XXX.XXX] -m mac --mac-source XX:XX:XX:XX:XX:XX -j ACCEPT iptables -A INPUT -j DROP
<ACCEPT from a specific IP or Subnet> # Accept packets from trusted IP address iptables -A INPUT -s 192.168.0.4 -j ACCEPT # change the IP address as appropriate # Accept packets from trusted subnet iptables -A INPUT -s 192.168.0.0/24 -j ACCEPT # using standard slash notation iptables -A INPUT -s 192.168.0.0/255.255.255.0 -j ACCEPT # using a subnet mask
<Specific protocol and port> # Accept tcp packets on destination port 6881 (bittorrent) iptables -A INPUT -p tcp --dport 6881 -j ACCEPT # Accept tcp packets on destination ports 6881-6890 iptables -A INPUT -p tcp --dport 6881:6890 -j ACCEPT
<Specific MAC only ACCEPT and others DROP> iptables -A INPUT -m mac --mac-source XX:XX:XX:XX:XX:XX -j ACCEPT iptables -A INPUT -j DROP
Count 확인
iptables -L -n -v -x |
'프로...NetWork' 카테고리의 다른 글
[Link Aggregation] Linux (0) | 2018.07.23 |
---|---|
[SWITCH] Flow COntrol Configure by "ethtool" (0) | 2018.07.05 |
tcpdump 예제 (0) | 2018.01.25 |
[HowTo-WOL] Wake On LAN 동작원리 및 구현 방법 (0) | 2017.09.13 |
[DNS] Dynamic resolv.conf (0) | 2015.09.23 |