IPTABLES
IPTABLES allows us to modify the route of incoming traffic accordingly. IPTABLES is an administrative tool for IPv4 packet filtering and NAT. IPTABLES is used to set up, maintain and inspect the tables of IPv4 packet filter rules in the linux kernel. Several different tables may be defined. Each table contains a number of built-in chains and may also contain user-defined chains. Each chain is a list of rules which can match a set of packets. Each rule specifies what to do with a packet that matches. This is called a `target`, which may be a jump to a user-defined chain in the same table.
TARGETS:
A firewall rule specifies criteria for a packet and a target. If the packet doesn't match, the next rule in the chain is examined, if it doesn't match, then the next rule is specified by the value of the target, which can be the name of a user_defined chain or one of the special values ACCEPT, DROP, QUEUE or RETURN.
ACCEPT means to let the packet through. DROP means to drop the packet on the floor. QUEUE means to pass the packet to userspace. How the packet can be received by a userspace process differs by the particular queue handler. Packets with a target of QUEUE will be sent to queue number '0' in this case. RETURN means stop traversing this chain and resume at the next rule in the previous chain. If the end of the built-in chain is reached or a rule in a built-in chain with target RETURN is matched, the target specified by the chain policy determines the fate of the packet.
TABLES:
There are currently three independent tables, which tables are present at a time depends on the kernel configuration options and which modules are present.
The tables are:
FILTER:
This is default table and contains the built-in chains INPUT(for incoming packets), FORWARD(for the packets being routed through) and OUTPUT(for locally generated packages).
NAT:
This table is consulted when a packet that creates a new connection is encountered. It consists of three built-ins
PREROUTING(for altering packets as soon as they come in), OUTPUT(for altering locally generated packets before routing) and POSTROUTING(for altering packets as they are about to go out).
MANGLE:
This table is used for specialized packet alteration. It has all the chains that the above two tables have.
We will discuss some options that are useful in commandline.
-A use this option if you want to append your rule.
-I use this option if you want to insert your rule on the top of the file.
-D use this option if you want to delete the rule from the chain.
-R use this option if you want to replace the rule.
IPTABLES allows us to modify the route of incoming traffic accordingly. IPTABLES is an administrative tool for IPv4 packet filtering and NAT. IPTABLES is used to set up, maintain and inspect the tables of IPv4 packet filter rules in the linux kernel. Several different tables may be defined. Each table contains a number of built-in chains and may also contain user-defined chains. Each chain is a list of rules which can match a set of packets. Each rule specifies what to do with a packet that matches. This is called a `target`, which may be a jump to a user-defined chain in the same table.
TARGETS:
A firewall rule specifies criteria for a packet and a target. If the packet doesn't match, the next rule in the chain is examined, if it doesn't match, then the next rule is specified by the value of the target, which can be the name of a user_defined chain or one of the special values ACCEPT, DROP, QUEUE or RETURN.
ACCEPT means to let the packet through. DROP means to drop the packet on the floor. QUEUE means to pass the packet to userspace. How the packet can be received by a userspace process differs by the particular queue handler. Packets with a target of QUEUE will be sent to queue number '0' in this case. RETURN means stop traversing this chain and resume at the next rule in the previous chain. If the end of the built-in chain is reached or a rule in a built-in chain with target RETURN is matched, the target specified by the chain policy determines the fate of the packet.
TABLES:
There are currently three independent tables, which tables are present at a time depends on the kernel configuration options and which modules are present.
The tables are:
FILTER:
This is default table and contains the built-in chains INPUT(for incoming packets), FORWARD(for the packets being routed through) and OUTPUT(for locally generated packages).
NAT:
This table is consulted when a packet that creates a new connection is encountered. It consists of three built-ins
PREROUTING(for altering packets as soon as they come in), OUTPUT(for altering locally generated packets before routing) and POSTROUTING(for altering packets as they are about to go out).
MANGLE:
This table is used for specialized packet alteration. It has all the chains that the above two tables have.
We will discuss some options that are useful in commandline.
-A use this option if you want to append your rule.
-I use this option if you want to insert your rule on the top of the file.
-D use this option if you want to delete the rule from the chain.
-R use this option if you want to replace the rule.
-L use this options to list all the rules.
-F use this option to flush all the rules.
-p using this option specify the protocol(tcp or udp)
-j use this option to specify the action(accept, reject)
--dport use this option to specify the port number.
-d/-s use this option to specify the destination or source address, address may be hostname or ipaddress.
Here we will discuss some examples to understand the concept of iptables.
# iptables -A INPUT -p tcp -s example.com --dport 22 -j REJECT
The above rule will reject the incoming packet from source example.com from port 22 on TCP.
# iptables -A INPUT -p udp -s !192.168.100.42 --dport 20 -j REJECT
This rule will REJECT all packets coming from the source ipaddress in port number 20.
-F use this option to flush all the rules.
-p using this option specify the protocol(tcp or udp)
-j use this option to specify the action(accept, reject)
--dport use this option to specify the port number.
-d/-s use this option to specify the destination or source address, address may be hostname or ipaddress.
Here we will discuss some examples to understand the concept of iptables.
# iptables -A INPUT -p tcp -s example.com --dport 22 -j REJECT
The above rule will reject the incoming packet from source example.com from port 22 on TCP.
# iptables -A INPUT -p udp -s !192.168.100.42 --dport 20 -j REJECT
This rule will REJECT all packets coming from the source ipaddress in port number 20.
No comments:
Post a Comment