您的位置:首页 > 运维架构 > Linux

Linux网络相关 firewalld和netfilter netfilte5表5链介绍 iptab

2018-07-16 15:02 961 查看
10.11 Linux网络相关修改配置网卡配置文件/etc/sysconfig/network-scripts/ifcfg-xxx(网卡)
ifconfig 查看网卡的ip,安装网卡的命令:yum install net-toolsifdown ens33 && ifup ens33 重启网卡(服务器上和终端连接)systemctl restart network 重启网卡
mii-tool ens33:查看ens33网卡是否连接,lin-ok(连接)
[root@bogon ~]# mii-tool ens33ens33: negotiated 1000baseT-FD flow-control, link ok
ethtool ens33这个命令也可以查看网卡是否连接,detected yes/no
[root@bogon ~]# ethtool ens33Settings for ens33:Supported ports: [ TP ]Supported link modes:   10baseT/Half 10baseT/Full100baseT/Half 100baseT/Full1000baseT/FullSupported pause frame use: NoSupports auto-negotiation: YesSupported FEC modes: Not reportedAdvertised link modes:  10baseT/Half 10baseT/Full100baseT/Half 100baseT/Full1000baseT/FullAdvertised pause frame use: NoAdvertised auto-negotiation: YesAdvertised FEC modes: Not reportedSpeed: 1000Mb/sDuplex: FullPort: Twisted PairPHYAD: 0Transceiver: internalAuto-negotiation: onMDI-X: off (auto)Supports Wake-on: dWake-on: dCurrent message level: 0x00000007 (7)drv probe linkLink detected: yes
更改主机名命令hostname 临时更改hostnamectl set-hostname aminglinux-123 永久更改用户名
[root@bogon ~]# hostnamebogon[root@bogon ~]# hostname Aing[root@bogon ~]# hostnameAing[root@bogon ~]# hostnamectl set-hostname aminglinux-123[root@bogon ~]# hostnameaminglinux-123[root@bogon ~]# cat /etc/hostnameaminglinux-123
设置DNS把DNS写到配置文件/etc/resolv.conf
[root@bogon ~]# cat /etc/resolv.conf# Generated by NetworkManagernameserver 202.106.0.20
修改/etc/hosts文件
[root@bogon network-scripts]# cat /etc/hosts127.0.0.1   localhost localhost.localdomain localhost4 localhost4.localdomain4::1         localhost localhost.localdomain localhost6 localhost6.localdomain6
[root@bogon network-scripts]# vim /etc/hosts[root@bogon network-scripts]# ping -c 2 www.baidu.comPING localhost (127.0.0.1) 56(84) bytes of data.64 bytes from localhost (127.0.0.1): icmp_seq=1 ttl=64 time=0.104 ms64 bytes from localhost (127.0.0.1): icmp_seq=2 ttl=64 time=0.039 ms--- localhost ping statistics ---2 packets transmitted, 2 received, 0% packet loss, time 999msrtt min/avg/max/mdev = 0.039/0.071/0.104/0.033 ms
一个IP后面可以跟多个域名,可以是几十个甚至上百个每一行只能一个IP,也就是说一个域名不能对应多个IP如果有多行中出现相同的域名(对应的IP不一样),会按最前面出现的记录来解析。LINUX防火墙SELinux是LInux系统特有的安全机制。临时关闭SElinux的方法
[root@aminglinux-123 ~]# setenforce 0setenforce: SELinux is disabled[root@aminglinux-123 ~]#
永久关闭 把SELINUX=enforcing改成SELINUX=disabled 重启生效getenforce 查看当前SELinux的状态
[root@aminglinux-123 ~]# vim /etc/selinux/config
netfilternetfilter5表5链介绍netfilter的5个表:filter表用于过滤包,系统预设的最常用的表,该表有3个链,分别是 INPUT、OUTPUT以及FORWARD 。INPUT链作用于进入本机的包OUTPUT作用于送出本机的包FORWARD链作用于那些跟本机无关的包。nat表主要用于网络地址转换,他也有3个链,分别是:PREROUTING链的作用是在包刚刚到达防火墙时改变它的目的地址(需要的时候可以使用这个链)OUTPUT链是改变本地产生的包的目的地址POSTROUTING链的作用是在包即将离开防火墙的时候改变其源地址。以下3个表几乎不用:mangle表:主要用来修改数据包security表:用于实现强制访问控制安全模型。raw表:其他各种用途。iptablesIptables是linux上特有的防火墙机制,其功能非常强大,然而阿铭在日常的管理工作中仅仅用到了一两个应用,这并不代表iptables不重要。作为一个网络管理员,iptables是必要要熟练掌握的。但是作为系统管理员,我们也应该会最基本的iptables操作,认识iptables的基本规则。CentOS上默认是设有iptables规则的,这个规则虽然很安全,但是对于我们来说没有用,建议你先清除规则,然后把清除后的规则保存一下。
[root@aminglinux-123 ~]# iptables -nvLChain INPUT (policy ACCEPT 0 packets, 0 bytes)pkts bytes target     prot opt in     out     source               destination0     0 ACCEPT     udp  --  virbr0 *       0.0.0.0/0            0.0.0.0/0                                                                                                    udp dpt:530     0 ACCEPT     tcp  --  virbr0 *       0.0.0.0/0            0.0.0.0/0                                                                                                    tcp dpt:530     0 ACCEPT     udp  --  virbr0 *       0.0.0.0/0            0.0.0.0/0                                                                                                    udp dpt:670     0 ACCEPT     tcp  --  virbr0 *       0.0.0.0/0            0.0.0.0/0                                                                                                    tcp dpt:6753713   27M ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0                                                                                                    ctstate RELATED,ESTABLISHED7   528 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/056824 4641K INPUT_direct  all  --  *      *       0.0.0.0/0            0.0.0.0/056824 4641K INPUT_ZONES_SOURCE  all  --  *      *       0.0.0.0/0            0.0                                                                                        .0.0/056824 4641K INPUT_ZONES  all  --  *      *       0.0.0.0/0            0.0.0.0/00     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0                                                                                                    ctstate INVALID56818 4641K REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0                                                                                                    reject-with icmp-host-prohibitedChain FORWARD (policy ACCEPT 0 packets, 0 bytes)pkts bytes target     prot opt in     out     source               destination0     0 ACCEPT     all  --  *      virbr0  0.0.0.0/0            192.168.122.                                                                                        0/24     ctstate RELATED,ESTABLISHED0     0 ACCEPT     all  --  virbr0 *       192.168.122.0/24     0.0.0.0/00     0 ACCEPT     all  --  virbr0 virbr0  0.0.0.0/0            0.0.0.0/00     0 REJECT     all  --  *      virbr0  0.0.0.0/0            0.0.0.0/0                                                                                                    reject-with icmp-port-unreachable0     0 REJECT     all  --  virbr0 *       0.0.0.0/0            0.0.0.0/0                                                                                                    reject-with icmp-port-unreachable0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0                                                                                                    ctstate RELATED,ESTABLISHED0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/00     0 FORWARD_direct  all  --  *      *       0.0.0.0/0            0.0.0.0                                                                                        /00     0 FORWARD_IN_ZONES_SOURCE  all  --  *      *       0.0.0.0/0                                                                                                    0.0.0.0/00     0 FORWARD_IN_ZONES  all  --  *      *       0.0.0.0/0            0.0.0                                                                                        .0/00     0 FORWARD_OUT_ZONES_SOURCE  all  --  *      *       0.0.0.0/0                                                                                                    0.0.0.0/00     0 FORWARD_OUT_ZONES  all  --  *      *       0.0.0.0/0            0.0.                                                                                        0.0/00     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0                                                                                                    ctstate INVALID0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0                                                                                                    reject-with icmp-host-prohibitedChain OUTPUT (policy ACCEPT 186 packets, 18143 bytes)pkts bytes target     prot opt in     out     source               destination0     0 ACCEPT     udp  --  *      virbr0  0.0.0.0/0            0.0.0.0/0                                                                                                    udp dpt:6883145   23M OUTPUT_direct  all  --  *      *       0.0.0.0/0            0.0.0.0/                                                                                        0Chain FORWARD_IN_ZONES (1 references)pkts bytes target     prot opt in     out     source               destination0     0 FWDI_public  all  --  ens33  *       0.0.0.0/0            0.0.0.0/0                                                                                                   [goto]0     0 FWDI_public  all  --  +      *       0.0.0.0/0            0.0.0.0/0                                                                                                   [goto]Chain FORWARD_IN_ZONES_SOURCE (1 references)pkts bytes target     prot opt in     out     source               destinationChain FORWARD_OUT_ZONES (1 references)pkts bytes target     prot opt in     out     source               destination0     0 FWDO_public  all  --  *      ens33   0.0.0.0/0            0.0.0.0/0                                                                                                   [goto]0     0 FWDO_public  all  --  *      +       0.0.0.0/0            0.0.0.0/0                                                                                                   [goto]Chain FORWARD_OUT_ZONES_SOURCE (1 references)pkts bytes target     prot opt in     out     source               destinationChain FORWARD_direct (1 references)pkts bytes target     prot opt in     out     source               destinationChain FWDI_public (2 references)pkts bytes target     prot opt in     out     source               destination0     0 FWDI_public_log  all  --  *      *       0.0.0.0/0            0.0.0.                                                                                        0/00     0 FWDI_public_deny  all  --  *      *       0.0.0.0/0            0.0.0                                                                                        .0/00     0 FWDI_public_allow  all  --  *      *       0.0.0.0/0            0.0.                                                                                        0.0/00     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0Chain FWDI_public_allow (1 references)pkts bytes target     prot opt in     out     source               destinationChain FWDI_public_deny (1 references)pkts bytes target     prot opt in     out     source               destinationChain FWDI_public_log (1 references)pkts bytes target     prot opt in     out     source               destinationChain FWDO_public (2 references)pkts bytes target     prot opt in     out     source               destination0     0 FWDO_public_log  all  --  *      *       0.0.0.0/0            0.0.0.                                                                                        0/00     0 FWDO_public_deny  all  --  *      *       0.0.0.0/0            0.0.0                                                                                        .0/00     0 FWDO_public_allow  all  --  *      *       0.0.0.0/0            0.0.                                                                                        0.0/0Chain FWDO_public_allow (1 references)pkts bytes target     prot opt in     out     source               destinationChain FWDO_public_deny (1 references)pkts bytes target     prot opt in     out     source               destinationChain FWDO_public_log (1 references)pkts bytes target     prot opt in     out     source               destinationChain INPUT_ZONES (1 references)pkts bytes target     prot opt in     out     source               destination1959  160K IN_public  all  --  ens33  *       0.0.0.0/0            0.0.0.0/0                                                                                                   [goto]11  2534 IN_public  all  --  +      *       0.0.0.0/0            0.0.0.0/0                                                                                                   [goto]Chain INPUT_ZONES_SOURCE (1 references)pkts bytes target     prot opt in     out     source               destinationChain INPUT_direct (1 references)pkts bytes target     prot opt in     out     source               destinationChain IN_public (2 references)pkts bytes target     prot opt in     out     source               destination56824 4641K IN_public_log  all  --  *      *       0.0.0.0/0            0.0.0.0/                                                                                        056824 4641K IN_public_deny  all  --  *      *       0.0.0.0/0            0.0.0.0                                                                                        /056824 4641K IN_public_allow  all  --  *      *       0.0.0.0/0            0.0.0.                                                                                        0/00     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0Chain IN_public_allow (1 references)pkts bytes target     prot opt in     out     source               destination6   312 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0                                                                                                    tcp dpt:22 ctstate NEWChain IN_public_deny (1 references)pkts bytes target     prot opt in     out     source               destinationChain IN_public_log (1 references)pkts bytes target     prot opt in     out     source               destinationChain OUTPUT_direct (1 references)pkts bytes target     prot opt in     out     source               destination
-nvL 就是查看规则, -F 是把当前规则清除,但这个只是临时的,重启系统或者重启 iptalbes 服务后还会加载已经保存的规则,所以需要使用
/etc/init.d/iptables save
保存一下规则,通过上边的命令输出我们也可以看到,防火墙规则保存在了/etc/sysconfig/iptables 你可以查看一下这个文件。1)iptalbes的三个表filter 这个表主要用于过滤包的,是系统预设的表,这个表也是阿铭用的最多的。内建三个链INPUT、OUTPUT以及FORWARD。INPUT作用于进入本机的包;OUTPUT作用于本机送出的包;FORWARD作用于那些跟本机无关的包。nat 主要用处是网络地址转换,也有三个链。PREROUTING 链的作用是在包刚刚到达防火墙时改变它的目的地址,如果需要的话。OUTPUT链改变本地产生的包的目的地址。POSTROUTING链在包就要离开防火墙之前改变其源地址。该表阿铭用的不多,但有时候会用到。mangle 这个表主要是用于给数据包打标记,然后根据标记去操作哪些包。这个表几乎不怎么用。除非你想成为一个高级网络工程师,否则你就没有必要花费很多心思在它上面。iptables 基本语法A. 查看规则以及清除规则
[root@aminglinux-123 ~]#  iptables -t nat -nvLChain PREROUTING (policy ACCEPT 1999 packets, 162K bytes)pkts bytes target     prot opt in     out     source               destination56652 4601K PREROUTING_direct  all  --  *      *       0.0.0.0/0            0.0.          0.0/056652 4601K PREROUTING_ZONES_SOURCE  all  --  *      *       0.0.0.0/0                      0.0.0.0/056652 4601K PREROUTING_ZONES  all  --  *      *       0.0.0.0/0            0.0.0          .0/0Chain INPUT (policy ACCEPT 1 packets, 52 bytes)pkts bytes target     prot opt in     out     source               destinationChain OUTPUT (policy ACCEPT 146 packets, 11067 bytes)pkts bytes target     prot opt in     out     source               destination1642  122K OUTPUT_direct  all  --  *      *       0.0.0.0/0            0.0.0.0/          0Chain POSTROUTING (policy ACCEPT 146 packets, 11067 bytes)pkts bytes target     prot opt in     out     source               destination11   627 RETURN     all  --  *      *       192.168.122.0/24     224.0.0.0/240     0 RETURN     all  --  *      *       192.168.122.0/24     255.255.255.          2550     0 MASQUERADE  tcp  --  *      *       192.168.122.0/24    !192.168.122          .0/24     masq ports: 1024-655350     0 MASQUERADE  udp  --  *      *       192.168.122.0/24    !192.168.122          .0/24     masq ports: 1024-655350     0 MASQUERADE  all  --  *      *       192.168.122.0/24    !192.168.122          .0/241631  121K POSTROUTING_direct  all  --  *      *       0.0.0.0/0            0.0          .0.0/01631  121K POSTROUTING_ZONES_SOURCE  all  --  *      *       0.0.0.0/0                      0.0.0.0/01631  121K POSTROUTING_ZONES  all  --  *      *       0.0.0.0/0            0.0.          0.0/0Chain OUTPUT_direct (1 references)pkts bytes target     prot opt in     out     source               destinationChain POSTROUTING_ZONES (1 references)pkts bytes target     prot opt in     out     source               destination146 11067 POST_public  all  --  *      ens33   0.0.0.0/0            0.0.0.0/0                     [goto]7   528 POST_public  all  --  *      +       0.0.0.0/0            0.0.0.0/0                     [goto]Chain POSTROUTING_ZONES_SOURCE (1 references)pkts bytes target     prot opt in     out     source               destinationChain POSTROUTING_direct (1 references)pkts bytes target     prot opt in     out     source               destinationChain POST_public (2 references)pkts bytes target     prot opt in     out     source               destination1631  121K POST_public_log  all  --  *      *       0.0.0.0/0            0.0.0.          0/01631  121K POST_public_deny  all  --  *      *       0.0.0.0/0            0.0.0          .0/01631  121K POST_public_allow  all  --  *      *       0.0.0.0/0            0.0.          0.0/0Chain POST_public_allow (1 references)pkts bytes target     prot opt in     out     source               destinationChain POST_public_deny (1 references)pkts bytes target     prot opt in     out     source               destinationChain POST_public_log (1 references)pkts bytes target     prot opt in     out     source               destinationChain PREROUTING_ZONES (1 references)pkts bytes target     prot opt in     out     source               destination1999  162K PRE_public  all  --  ens33  *       0.0.0.0/0            0.0.0.0/0                     [goto]8  1664 PRE_public  all  --  +      *       0.0.0.0/0            0.0.0.0/0                     [goto]Chain PREROUTING_ZONES_SOURCE (1 references)pkts bytes target     prot opt in     out     source               destinationChain PREROUTING_direct (1 references)pkts bytes target     prot opt in     out     source               destinationChain PRE_public (2 references)pkts bytes target     prot opt in     out     source               destination56652 4601K PRE_public_log  all  --  *      *       0.0.0.0/0            0.0.0.0          /056652 4601K PRE_public_deny  all  --  *      *       0.0.0.0/0            0.0.0.          0/056652 4601K PRE_public_allow  all  --  *      *       0.0.0.0/0            0.0.0          .0/0Chain PRE_public_allow (1 references)pkts bytes target     prot opt in     out     source               destinationChain PRE_public_deny (1 references)pkts bytes target     prot opt in     out     source               destinationChain PRE_public_log (1 references)pkts bytes target     prot opt in     out     source               destination
-t 后面跟表名,-nvL 即查看该表的规则,其中-n表示不针对IP反解析主机名;-L表示列出的意思;而-v表示列出的信息更加详细。如果不加-t ,则打印filter表的
[root@aminglinux-123 ~]#  iptables -nvLChain INPUT (policy ACCEPT 0 packets, 0 bytes)pkts bytes target     prot opt in     out     source               destination0     0 ACCEPT     udp  --  virbr0 *       0.0.0.0/0            0.0.0.0/0            udp dpt:530     0 ACCEPT     tcp  --  virbr0 *       0.0.0.0/0            0.0.0.0/0            tcp dpt:530     0 ACCEPT     udp  --  virbr0 *       0.0.0.0/0            0.0.0.0/0            udp dpt:670     0 ACCEPT     tcp  --  virbr0 *       0.0.0.0/0            0.0.0.0/0            tcp dpt:6753742   27M ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            ctstate RELATED,ESTABLISHED7   528 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/056909 4648K INPUT_direct  all  --  *      *       0.0.0.0/0            0.0.0.0/056909 4648K INPUT_ZONES_SOURCE  all  --  *      *       0.0.0.0/0            0.0.0.0/056909 4648K INPUT_ZONES  all  --  *      *       0.0.0.0/0            0.0.0.0/00     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0            ctstate INVALID56903 4647K REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibitedChain FORWARD (policy ACCEPT 0 packets, 0 bytes)pkts bytes target     prot opt in     out     source               destination0     0 ACCEPT     all  --  *      virbr0  0.0.0.0/0            192.168.122.0/24     ctstate RELATED,ESTABLISHED0     0 ACCEPT     all  --  virbr0 *       192.168.122.0/24     0.0.0.0/00     0 ACCEPT     all  --  virbr0 virbr0  0.0.0.0/0            0.0.0.0/00     0 REJECT     all  --  *      virbr0  0.0.0.0/0            0.0.0.0/0            reject-with icmp-port-unreachable0     0 REJECT     all  --  virbr0 *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-port-unreachable0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            ctstate RELATED,ESTABLISHED0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/00     0 FORWARD_direct  all  --  *      *       0.0.0.0/0            0.0.0.0/00     0 FORWARD_IN_ZONES_SOURCE  all  --  *      *       0.0.0.0/0            0.0.0.0/00     0 FORWARD_IN_ZONES  all  --  *      *       0.0.0.0/0            0.0.0.0/00     0 FORWARD_OUT_ZONES_SOURCE  all  --  *      *       0.0.0.0/0            0.0.0.0/00     0 FORWARD_OUT_ZONES  all  --  *      *       0.0.0.0/0            0.0.0.0/00     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0            ctstate INVALID0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibitedChain OUTPUT (policy ACCEPT 209 packets, 32823 bytes)pkts bytes target     prot opt in     out     source               destination0     0 ACCEPT     udp  --  *      virbr0  0.0.0.0/0            0.0.0.0/0            udp dpt:6883168   23M OUTPUT_direct  all  --  *      *       0.0.0.0/0            0.0.0.0/0Chain FORWARD_IN_ZONES (1 references)pkts bytes target     prot opt in     out     source               destination0     0 FWDI_public  all  --  ens33  *       0.0.0.0/0            0.0.0.0/0           [goto]0     0 FWDI_public  all  --  +      *       0.0.0.0/0            0.0.0.0/0           [goto]Chain FORWARD_IN_ZONES_SOURCE (1 references)pkts bytes target     prot opt in     out     source               destinationChain FORWARD_OUT_ZONES (1 references)pkts bytes target     prot opt in     out     source               destination0     0 FWDO_public  all  --  *      ens33   0.0.0.0/0            0.0.0.0/0           [goto]0     0 FWDO_public  all  --  *      +       0.0.0.0/0            0.0.0.0/0           [goto]Chain FORWARD_OUT_ZONES_SOURCE (1 references)pkts bytes target     prot opt in     out     source               destinationChain FORWARD_direct (1 references)pkts bytes target     prot opt in     out     source               destinationChain FWDI_public (2 references)pkts bytes target     prot opt in     out     source               destination0     0 FWDI_public_log  all  --  *      *       0.0.0.0/0            0.0.0.0/00     0 FWDI_public_deny  all  --  *      *       0.0.0.0/0            0.0.0.0/00     0 FWDI_public_allow  all  --  *      *       0.0.0.0/0            0.0.0.0/00     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0Chain FWDI_public_allow (1 references)pkts bytes target     prot opt in     out     source               destinationChain FWDI_public_deny (1 references)pkts bytes target     prot opt in     out     source               destinationChain FWDI_public_log (1 references)pkts bytes target     prot opt in     out     source               destinationChain FWDO_public (2 references)pkts bytes target     prot opt in     out     source               destination0     0 FWDO_public_log  all  --  *      *       0.0.0.0/0            0.0.0.0/00     0 FWDO_public_deny  all  --  *      *       0.0.0.0/0            0.0.0.0/00     0 FWDO_public_allow  all  --  *      *       0.0.0.0/0            0.0.0.0/0Chain FWDO_public_allow (1 references)pkts bytes target     prot opt in     out     source               destinationChain FWDO_public_deny (1 references)pkts bytes target     prot opt in     out     source               destinationChain FWDO_public_log (1 references)pkts bytes target     prot opt in     out     source               destinationChain INPUT_ZONES (1 references)pkts bytes target     prot opt in     out     source               destination2044  167K IN_public  all  --  ens33  *       0.0.0.0/0            0.0.0.0/0           [goto]11  2534 IN_public  all  --  +      *       0.0.0.0/0            0.0.0.0/0           [goto]Chain INPUT_ZONES_SOURCE (1 references)pkts bytes target     prot opt in     out     source               destinationChain INPUT_direct (1 references)pkts bytes target     prot opt in     out     source               destinationChain IN_public (2 references)pkts bytes target     prot opt in     out     source               destination56909 4648K IN_public_log  all  --  *      *       0.0.0.0/0            0.0.0.0/056909 4648K IN_public_deny  all  --  *      *       0.0.0.0/0            0.0.0.0/056909 4648K IN_public_allow  all  --  *      *       0.0.0.0/0            0.0.0.0/00     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0Chain IN_public_allow (1 references)pkts bytes target     prot opt in     out     source               destination6   312 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:22 ctstate NEWChain IN_public_deny (1 references)pkts bytes target     prot opt in     out     source               destinationChain IN_public_log (1 references)pkts bytes target     prot opt in     out     source               destinationChain OUTPUT_direct (1 references)pkts bytes target     prot opt in     out     source               destination
内容来自用户分享和网络整理,不保证内容的准确性,如有侵权内容,可联系管理员处理 点击这里给我发消息
相关文章推荐