国产av日韩一区二区三区精品,成人性爱视频在线观看,国产,欧美,日韩,一区,www.成色av久久成人,2222eeee成人天堂

Table of Contents
Understanding the Basics of Iptables
Setting Up Basic Firewall Rules
Managing Iptables Rules Effectively
Common Use Cases and Examples
Home System Tutorial LINUX What is iptables and how do you use it to configure a firewall?

What is iptables and how do you use it to configure a firewall?

Jun 25, 2025 am 12:27 AM

Iptables is a powerful firewall tool in Linux systems that controls network traffic in and out of the system by setting IP packet filtering rules. 1. It matches and processes data packets based on rule chains (INPUT, OUTPUT, FORWARD). The default policy is usually set to DROP to improve security. 2. When setting basic rules, you should first allow key services such as SSH, HTTP and HTTPS, and then block all other input traffic. 3. Use iptables-save and iptables-restore to achieve rule persistence. 4. Use -L -n -v to view rules, delete or insert rules to specify the location by line number. 5. Common uses include blocking suspicious IPs, allowing connection responses, limiting brute-force attempts, etc. Mastering these core operations can help users build a secure network environment and continuously maintain their effectiveness.

What is iptables and how do you use it to configure a firewall?

Iptables is a powerful firewall utility for Linux systems that allows you to set up, maintain, and inspect the tables of IP packet filter rules. It controls network traffic—both incoming and outgoing—based on predefined rules. If you're managing a Linux server or just want to secure your desktop, knowing how to use iptables can give you fine-grained control over your system's security.


Understanding the Basics of Iptables

Iptables works by checking each packet that enters or leaves your system against a set of rules. These rules are grouped into chains, and chains are grouped into tables. The main table used for filtering is called the filter table, which contains three built-in chains:

  • INPUT – handles packets coming into the system
  • OUTPUT – handles packets going out from the system
  • FORWARD – handles packets passing through the system (for routers)

Each rule in a chain tells iptables what to do with a packet that matches certain criteria—like protocol type, port number, source or destination address, etc.

The default policy for each chain is usually ACCEPT , but it's common practice to change this to DROP and then selectively allow only the traffic you need.


Setting Up Basic Firewall Rules

You don't want to block yourself out when setting up iptables, especially if you're working on a remote server. Start by allowing essential services like SSH, HTTP, and HTTPS.

Here are some basic commands:

  • Allow SSH access:

     sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT
  • Allow web traffic:

     sudo iptables -A INPUT -p tcp --dport 80 -j ACCEPT
    sudo iptables -A INPUT -p tcp --dport 443 -j ACCEPT

Once you've added the rules you need, it's good practice to block everything else:

 sudo iptables -P INPUT DROP
sudo iptables -P FORWARD DROP

?? Be careful with these policies. If you lock yourself out, you'll need physical or console access to reset them.

Also, remember that iptables rules are not persistent by default. Rebooting the system will clear them unless you save them using a tool like iptables-save and restore them at boot with iptables-restore .


Managing Iptables Rules Effectively

It's easy to forget what rules you've added or where they're placed in the chain. Here are a few tips to help manage your configuration:

  • View current rules:

     sudo iptables -L -n -v

    Adding -L gives a list format, -n shows numeric output (faster), and -v gives more details.

  • Delete a specific rule: First list rules with line numbers:

     sudo iptables -L --line-numbers

    Then delete by number:

     sudo iptables -D INPUT 3
  • Insert a rule at a specific position:

     sudo iptables -I INPUT 2 -p tcp --dport 25 -j ACCEPT

    This adds an SMTP rule at position 2 in the INPUT chain.

If you're doing anything beyond basic setup, consider writing a script that applies all your rules at once. It makes testing and applying changes much easier.


Common Use Cases and Examples

One of the most common uses of iptables is protecting servers exposed to the internet. For example:

  • Blocking a suspicious IP:

     sudo iptables -A INPUT -s 192.168.1.100 -j DROP
  • Allowing responses to outgoing connections:

     sudo iptables -A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT

    This ensures that responses to your own outbound requests (like web browser) are allowed back in.

  • Limiting brute-force attacks: You can rate-limit SSH attempts:

     sudo iptables -A INPUT -p tcp --dport 22 -m limit --limit 5/minute -j ACCEPT

These kinds of rules help prevent abuse without blocking legitimate users.


Basically that's it. Iptables may seem complex, but as long as you master the basic rules and common commands, you can quickly build an effective firewall system. Remember to check your rules and log files regularly to make sure nothing slips through the cracks.

The above is the detailed content of What is iptables and how do you use it to configure a firewall?. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undress AI Tool

Undress AI Tool

Undress images for free

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Hot Topics

PHP Tutorial
1502
276
How to troubleshoot DNS issues on a Linux machine? How to troubleshoot DNS issues on a Linux machine? Jul 07, 2025 am 12:35 AM

When encountering DNS problems, first check the /etc/resolv.conf file to see if the correct nameserver is configured; secondly, you can manually add public DNS such as 8.8.8.8 for testing; then use nslookup and dig commands to verify whether DNS resolution is normal. If these tools are not installed, you can first install the dnsutils or bind-utils package; then check the systemd-resolved service status and configuration file /etc/systemd/resolved.conf, and set DNS and FallbackDNS as needed and restart the service; finally check the network interface status and firewall rules, confirm that port 53 is not

Install Guacamole for Remote Linux/Windows Access in Ubuntu Install Guacamole for Remote Linux/Windows Access in Ubuntu Jul 08, 2025 am 09:58 AM

As a system administrator, you may find yourself (today or in the future) working in an environment where Windows and Linux coexist. It is no secret that some big companies prefer (or have to) run some of their production services in Windows boxes an

How to Install NodeJS 14 / 16 & NPM on Rocky Linux 8 How to Install NodeJS 14 / 16 & NPM on Rocky Linux 8 Jul 13, 2025 am 09:09 AM

Built on Chrome’s V8 engine, Node.JS is an open-source, event-driven JavaScript runtime environment crafted for building scalable applications and backend APIs. NodeJS is known for being lightweight and efficient due to its non-blocking I/O model and

How to find my private and public IP address in Linux? How to find my private and public IP address in Linux? Jul 09, 2025 am 12:37 AM

In Linux systems, 1. Use ipa or hostname-I command to view private IP; 2. Use curlifconfig.me or curlipinfo.io/ip to obtain public IP; 3. The desktop version can view private IP through system settings, and the browser can access specific websites to view public IP; 4. Common commands can be set as aliases for quick call. These methods are simple and practical, suitable for IP viewing needs in different scenarios.

System requirements to install linux System requirements to install linux Jul 20, 2025 am 03:49 AM

Linuxcanrunonmodesthardwarewithspecificminimumrequirements.A1GHzprocessor(x86orx86_64)isneeded,withadual-coreCPUrecommended.RAMshouldbeatleast512MBforcommand-lineuseor2GBfordesktopenvironments.Diskspacerequiresaminimumof5–10GB,though25GBisbetterforad

How to Install MySQL 8.0 on Rocky Linux and AlmaLinux How to Install MySQL 8.0 on Rocky Linux and AlmaLinux Jul 12, 2025 am 09:21 AM

Written in C, MySQL is an open-source, cross-platform, and one of the most widely used Relational Database Management Systems (RDMS). It’s an integral part of the LAMP stack and is a popular database management system in web hosting, data analytics,

Ubuntu 25.04 'Plucky Puffin”: A Bold Leap Forward with GNOME 48 and HDR Brilliance Ubuntu 25.04 'Plucky Puffin”: A Bold Leap Forward with GNOME 48 and HDR Brilliance Jul 12, 2025 am 09:28 AM

Ubuntu has long stood as a bastion of accessibility, polish, and power in the Linux ecosystem. With the arrival of Ubuntu 25.04, codenamed “Plucky Puffin”, Canonical has once again demonstrated its commitment to delivering a

How to Install MongoDB on Rocky Linux and AlmaLinux How to Install MongoDB on Rocky Linux and AlmaLinux Jul 12, 2025 am 09:29 AM

MongoDB is a high-performance, highly scalable document-oriented NoSQL database built to manage heavy traffic and vast amounts of data. Unlike traditional SQL databases that store data in rows and columns within tables, MongoDB structures data in a J

See all articles