美文网首页Linux
Linux网络相关、firewalld和netfilter、ne

Linux网络相关、firewalld和netfilter、ne

作者: 强出头 | 来源:发表于2018-03-12 21:35 被阅读18次

    Linux网络相关

    Linux网络相关

    ifconfig -a 这个 -a 选项是如果在网卡down掉或者没有IP的时候不加选项是看不到的

    [root@localhost ~]# ifconfig
    ens33: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
            inet 172.16.79.140  netmask 255.255.255.0  broadcast 172.16.79.255
            inet6 fe80::20c:29ff:fe45:ec93  prefixlen 64  scopeid 0x20<link>
            ether 00:0c:29:45:ec:93  txqueuelen 1000  (Ethernet)
            RX packets 259340  bytes 221385363 (211.1 MiB)
            RX errors 0  dropped 0  overruns 0  frame 0
            TX packets 171931  bytes 35881931 (34.2 MiB)
            TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
    
    lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
            inet 127.0.0.1  netmask 255.0.0.0
            inet6 ::1  prefixlen 128  scopeid 0x10<host>
            loop  txqueuelen 1  (Local Loopback)
            RX packets 64  bytes 5568 (5.4 KiB)
            RX errors 0  dropped 0  overruns 0  frame 0
            TX packets 64  bytes 5568 (5.4 KiB)
            TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
    [root@localhost ~]# ip add
    1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN qlen 1
        link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
        inet 127.0.0.1/8 scope host lo
           valid_lft forever preferred_lft forever
        inet6 ::1/128 scope host 
           valid_lft forever preferred_lft forever
    2: ens33: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
        link/ether 00:0c:29:45:ec:93 brd ff:ff:ff:ff:ff:ff
        inet 172.16.79.140/24 brd 172.16.79.255 scope global ens33
           valid_lft forever preferred_lft forever
        inet6 fe80::20c:29ff:fe45:ec93/64 scope link 
           valid_lft forever preferred_lft forever
    

    关闭网卡和开启网卡

    [root@localhost ~]# ifdown ens33
    [root@localhost ~]# ifup ens33
    [root@localhost ~]# ifdown ens33 && ifup ens33
    

    设置虚拟网卡
    配置文件可以删除网关和DNS
    同时需要更改ip
    更改后重启网卡会发现我们设置的ens33:0虚拟网卡

    [root@localhost ~]# cd /etc/sysconfig/network-scripts/
    [root@localhost network-scripts]# cp ifcfg-ens33 ifcfg-ens33\:0
    [root@localhost network-scripts]# vim ifcfg-ens33\:0 
    [root@localhost network-scripts]# cat ifcfg-ens33
    ifcfg-ens33    ifcfg-ens33:0  
    [root@localhost network-scripts]# cat ifcfg-ens33\:0 
    TYPE=Ethernet
    PROXY_METHOD=none
    BROWSER_ONLY=no
    BOOTPROTO=static
    DEFROUTE=yes
    IPV4_FAILURE_FATAL=no
    IPV6INIT=yes
    IPV6_AUTOCONF=yes
    IPV6_DEFROUTE=yes
    IPV6_FAILURE_FATAL=no
    IPV6_ADDR_GEN_MODE=stable-privacy
    NAME=ens33:0
    UUID=487e1678-0d20-449d-8ae6-b16c74b737b3
    DEVICE=ens33:0
    ONBOOT=yes
    IPADDR=172.16.79.141
    NETMASK=255.255.255.0
    [root@localhost network-scripts]# ifdown ens33 && ifup ens33
    Determining if ip address 172.16.79.141 is already in use for device ens33...
    [root@localhost network-scripts]# ifconfig
    ens33: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
            inet 172.16.79.140  netmask 255.255.255.0  broadcast 172.16.79.255
            inet6 fe80::20c:29ff:fe45:ec93  prefixlen 64  scopeid 0x20<link>
            ether 00:0c:29:45:ec:93  txqueuelen 1000  (Ethernet)
            RX packets 1071  bytes 94921 (92.6 KiB)
            RX errors 0  dropped 0  overruns 0  frame 0
            TX packets 647  bytes 77653 (75.8 KiB)
            TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
    
    ens33:0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
            inet 172.16.79.141  netmask 255.255.255.0  broadcast 172.16.79.255
            ether 00:0c:29:45:ec:93  txqueuelen 1000  (Ethernet)
    
    lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
            inet 127.0.0.1  netmask 255.0.0.0
            inet6 ::1  prefixlen 128  scopeid 0x10<host>
            loop  txqueuelen 1  (Local Loopback)
            RX packets 0  bytes 0 (0.0 B)
            RX errors 0  dropped 0  overruns 0  frame 0
            TX packets 0  bytes 0 (0.0 B)
            TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
    [root@localhost ~]# ping 172.16.79.141
    PING 172.16.79.141 (172.16.79.141) 56(84) bytes of data.
    64 bytes from 172.16.79.141: icmp_seq=1 ttl=64 time=0.070 ms
    64 bytes from 172.16.79.141: icmp_seq=2 ttl=64 time=0.053 ms
    64 bytes from 172.16.79.141: icmp_seq=3 ttl=64 time=0.110 ms
    64 bytes from 172.16.79.141: icmp_seq=4 ttl=64 time=0.054 ms
    64 bytes from 172.16.79.141: icmp_seq=5 ttl=64 time=0.064 ms
    ^C
    --- 172.16.79.141 ping statistics ---
    5 packets transmitted, 5 received, 0% packet loss, time 3999ms
    rtt min/avg/max/mdev = 0.053/0.070/0.110/0.021 ms
    
    

    查看网卡是否连接

    [root@localhost ~]# mii-tool ens33
    ens33: negotiated 1000baseT-FD flow-control, link ok
    [root@localhost ~]# ethtool ens33
    Settings for ens33:
        Supported ports: [ TP ]
        Supported link modes:   10baseT/Half 10baseT/Full 
                                100baseT/Half 100baseT/Full 
                                1000baseT/Full 
        Supported pause frame use: No
        Supports auto-negotiation: Yes
        Advertised link modes:  10baseT/Half 10baseT/Full 
                                100baseT/Half 100baseT/Full 
                                1000baseT/Full 
        Advertised pause frame use: No
        Advertised auto-negotiation: Yes
        Speed: 1000Mb/s
        Duplex: Full
        Port: Twisted Pair
        PHYAD: 0
        Transceiver: internal
        Auto-negotiation: on
        MDI-X: off (auto)
        Supports Wake-on: d
        Wake-on: d
        Current message level: 0x00000007 (7)
                       drv probe link
        Link detected: yes
    
    

    更改主机名

    [root@localhost ~]# hostnamectl set-hostname wsl-001
    [root@localhost ~]# hostname
    wsl-001
    [root@localhost ~]# bash
    [root@wsl-001 ~]# exit
    exit
    [root@localhost ~]# cat /etc/hostname 
    wsl-001
    

    DNS配置文件

    [root@localhost ~]# cat /etc/resolv.conf
    # Generated by NetworkManager
    nameserver 119.29.29.29
    search localdomain
    [root@localhost ~]# vi /etc/sysconfig/network-scripts/ifcfg-ens33
    (增加DNS2=8.8.8.8)
    [root@localhost ~]# ifdown ens33 && ifup ens33 
    Determining if ip address 172.16.79.141 is already in use for device ens33...
    [root@localhost ~]# cat /etc/resolv.conf
    # Generated by NetworkManager
    nameserver 119.29.29.29
    nameserver 8.8.8.8
    

    /etc/hosts文件
    更改文件使访问域名跳转
    支持一个ip配多个域名
    同样的域名后面会覆盖前面的

    [root@localhost ~]# cat /etc/hosts
    127.0.0.1   localhost localhost.localdomain localhost4 localhost4.localdomain4
    ::1         localhost localhost.localdomain localhost6 localhost6.localdomain6
    [root@localhost ~]# ping www.qq123.com
    PING www.qq123.com (202.91.250.93) 56(84) bytes of data.
    64 bytes from 202.91.250.93 (202.91.250.93): icmp_seq=1 ttl=128 time=32.5 ms
    64 bytes from 202.91.250.93 (202.91.250.93): icmp_seq=2 ttl=128 time=31.3 ms
    ^C
    --- www.qq123.com ping statistics ---
    2 packets transmitted, 2 received, 0% packet loss, time 1000ms
    rtt min/avg/max/mdev = 31.315/31.934/32.553/0.619 ms
    [root@localhost ~]# vim /etc/hosts
    [root@localhost ~]# cat /etc/hosts
    127.0.0.1   localhost localhost.localdomain localhost4 localhost4.localdomain4
    ::1         localhost localhost.localdomain localhost6 localhost6.localdomain6
    172.16.79.140 www.qq123.com
    [root@localhost ~]# ping www.qq123.com
    PING www.qq123.com (172.16.79.140) 56(84) bytes of data.
    64 bytes from www.qq123.com (172.16.79.140): icmp_seq=1 ttl=64 time=0.041 ms
    64 bytes from www.qq123.com (172.16.79.140): icmp_seq=2 ttl=64 time=0.083 ms
    64 bytes from www.qq123.com (172.16.79.140): icmp_seq=3 ttl=64 time=0.098 ms
    64 bytes from www.qq123.com (172.16.79.140): icmp_seq=4 ttl=64 time=0.058 ms
    ^C
    --- www.qq123.com ping statistics ---
    4 packets transmitted, 4 received, 0% packet loss, time 3002ms
    rtt min/avg/max/mdev = 0.041/0.070/0.098/0.022 ms
    

    firewalld和netfilter

    Linux防火墙-netfilter

    selinux临时关闭
    Permissive仅仅提醒

    [root@localhost ~]# setenforce 0
    [root@localhost ~]# getenforce
    Permissive
    

    selinux永久关闭
    更改文件后重启系统生效

    [root@localhost ~]# cat /etc/selinux/config 
    
    # This file controls the state of SELinux on the system.
    # SELINUX= can take one of these three values:
    #     enforcing - SELinux security policy is enforced.
    #     permissive - SELinux prints warnings instead of enforcing.
    #     disabled - No SELinux policy is loaded.
    SELINUX=enforcing
    # SELINUXTYPE= can take one of three two values:
    #     targeted - Targeted processes are protected,
    #     minimum - Modification of targeted policy. Only selected processes are protected. 
    #     mls - Multi Level Security protection.
    SELINUXTYPE=targeted 
    
    
    [root@localhost ~]# vim /etc/selinux/config 
    [root@localhost ~]# cat /etc/selinux/config 
    
    # This file controls the state of SELinux on the system.
    # SELINUX= can take one of these three values:
    #     enforcing - SELinux security policy is enforced.
    #     permissive - SELinux prints warnings instead of enforcing.
    #     disabled - No SELinux policy is loaded.
    SELINUX=disabled
    # SELINUXTYPE= can take one of three two values:
    #     targeted - Targeted processes are protected,
    #     minimum - Modification of targeted policy. Only selected processes are protected. 
    #     mls - Multi Level Security protection.
    SELINUXTYPE=targeted 
    

    centos7之前版本使用netfilter防火墙
    先关闭firewalld,然后停止firewalld服务
    再安装iptables-services,启动iptables服务

    [root@localhost ~]# systemctl disable firewalld
    Removed symlink /etc/systemd/system/multi-user.target.wants/firewalld.service.
    Removed symlink /etc/systemd/system/dbus-org.fedoraproject.FirewallD1.service.
    [root@localhost ~]# systemctl stop firewalld
    [root@localhost ~]# yum install -y iptables-services
    [root@localhost ~]# systemctl enable iptables
    Created symlink from /etc/systemd/system/basic.target.wants/iptables.service to /usr/lib/systemd/system/iptables.service.
    [root@localhost ~]# systemctl start iptables
    [root@localhost ~]# iptables -nvL (查看默认规则)
    Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
       78  5524 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED
        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           
        0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           
        0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
    
    Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
    
    Chain OUTPUT (policy ACCEPT 41 packets, 3896 bytes)
     pkts bytes target     prot opt in     out     source               destination      
    

    centos7版本开始使用firewalld防火墙

    netfilter5表5链介绍

    Linux防火墙-netfilter

    netfilter的5个表

    filter表主要用于过滤包,是系统预设表。该表内建3个链:INPUT、OUTPUT以及FORWARD。INPUT链作用于进入本机的包,OUTPUT链作用于本机送出的包,FORWARD链作用于那些跟本机无关的包。

    nat表用于网络地址转换(IP映射)。PREOUTING链的作用是在包刚刚到达防火墙时改变它的目标地址,OUTPUT链的作用是改变本地产生的包的目的地址,POSTROUTING链的作用是在包即将离开防火墙时改变其源地址。

    managle表用于给数据包做标记,几乎用不到

    raw表可以实现不追踪某些数据包,几乎用不到

    security表在centos6中并没有,用于强制访问控制(MAC)的网络规则,几乎用不到

    iptables语法

    Linux防火墙-netfilter

    iptables规则查看
    规则保存地址 /etc/sysconfig/iptables

    [root@wsl-001 ~]# iptables -nvL
    Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
      376 30957 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED
        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           
        2   140 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           
        1    64 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22
        1    96 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
    
    Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
    
    Chain OUTPUT (policy ACCEPT 361 packets, 32003 bytes)
     pkts bytes target     prot opt in     out     source               destination         
    [root@wsl-001 ~]# cat /etc/sysconfig/iptables
    # sample configuration for iptables service
    # you can edit this manually or use system-config-firewall
    # please do not ask us to add additional ports/services to this default configuration
    *filter
    :INPUT ACCEPT [0:0]
    :FORWARD ACCEPT [0:0]
    :OUTPUT ACCEPT [0:0]
    -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
    -A INPUT -p icmp -j ACCEPT
    -A INPUT -i lo -j ACCEPT
    -A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT
    -A INPUT -j REJECT --reject-with icmp-host-prohibited
    -A FORWARD -j REJECT --reject-with icmp-host-prohibited
    COMMIT
    

    iptables -F 清空规则
    但是文件里面还是有规则,如果重启iptables或者重启服务器就会还原为文件中的规则
    service iptables sava 保存当前的规则写入到文件中

    [root@wsl-001 ~]# iptables -F
    [root@wsl-001 ~]# iptables -nvL
    Chain INPUT (policy ACCEPT 17 packets, 1180 bytes)
     pkts bytes target     prot opt in     out     source               destination         
    
    Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
    
    Chain OUTPUT (policy ACCEPT 9 packets, 864 bytes)
     pkts bytes target     prot opt in     out     source               destination         
    [root@wsl-001 ~]# cat /etc/sysconfig/iptables
    # sample configuration for iptables service
    # you can edit this manually or use system-config-firewall
    # please do not ask us to add additional ports/services to this default configuration
    *filter
    :INPUT ACCEPT [0:0]
    :FORWARD ACCEPT [0:0]
    :OUTPUT ACCEPT [0:0]
    -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
    -A INPUT -p icmp -j ACCEPT
    -A INPUT -i lo -j ACCEPT
    -A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT
    -A INPUT -j REJECT --reject-with icmp-host-prohibited
    -A FORWARD -j REJECT --reject-with icmp-host-prohibited
    COMMIT
    [root@wsl-001 ~]# service iptables restart
    Redirecting to /bin/systemctl restart iptables.service
    [root@wsl-001 ~]# iptables -nvL
    Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
        9   636 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED
        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           
        0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           
        0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
    
    Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
    
    Chain OUTPUT (policy ACCEPT 5 packets, 656 bytes)
     pkts bytes target     prot opt in     out     source         
    

    查看指定表
    iptables -t nat -nvL
    如果不加 -t filter 则默认就是filter表

    [root@wsl-001 ~]# iptables -t filter -nvL
    Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
       97  6816 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED
        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           
        0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           
        0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
    
    Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
    
    Chain OUTPUT (policy ACCEPT 56 packets, 7104 bytes)
     pkts bytes target     prot opt in     out     source               destination 
    

    iptables -Z 可以把计数器清零

    [root@wsl-001 ~]# iptables -nvL
    Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
      204 14821 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED
        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           
        0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           
        0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
    
    Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
    
    Chain OUTPUT (policy ACCEPT 167 packets, 16798 bytes)
     pkts bytes target     prot opt in     out     source               destination         
    [root@wsl-001 ~]# iptables -Z;iptables -nvL
    Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED
        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           
        0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           
        0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
    
    Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
    
    Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination    
    

    -A 增加协议 -s 来源IP -p 指定协议 --sport 来源端口 -d 目标IP --dport 目标端口 -j 操作 DROP(扔掉) REJECT(拒绝)
    -I 是插入到最前面
    优先过滤前面的规则
    -D 删除规则

    [root@wsl-001 ~]# iptables -A INPUT -s 192.168.188.1 -p tcp --sport 1234 -d 192.168.188.128 --dport 80 -j DROP
    [root@wsl-001 ~]# iptables -t filter -nvL
    Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
      309 22189 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED
        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           
        0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           
        0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
        0     0 DROP       tcp  --  *      *       192.168.188.1        192.168.188.128      tcp spt:1234 dpt:80
    
    Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
    
    Chain OUTPUT (policy ACCEPT 28 packets, 2456 bytes)
     pkts bytes target     prot opt in     out     source               destination 
    [root@wsl-001 ~]# iptables -I INPUT -p tcp --dport 80 -j DROP
    [root@wsl-001 ~]# iptables -t filter -nvL
    Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:80
      580 42250 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED
        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           
        0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           
        0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
        0     0 DROP       tcp  --  *      *       192.168.188.1        192.168.188.128      tcp spt:1234 dpt:80
    
    Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
    
    Chain OUTPUT (policy ACCEPT 9 packets, 936 bytes)
     pkts bytes target     prot opt in     out     source               destination 
    [root@wsl-001 ~]# iptables -D INPUT -p tcp --dport 80 -j DROP
    [root@wsl-001 ~]# iptables -t filter -nvL
    Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
      674 49122 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED
        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           
        0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           
        0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
        0     0 DROP       tcp  --  *      *       192.168.188.1        192.168.188.128      tcp spt:1234 dpt:80
    
    Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
    
    Chain OUTPUT (policy ACCEPT 4 packets, 544 bytes)
     pkts bytes target     prot opt in     out     source               destination 
    [root@wsl-001 ~]# iptables -D INPUT -s 192.168.188.1 -p tcp --sport 1234 -d 192.168.188.128 --dport 80 -j DROP
    [root@wsl-001 ~]# iptables -t filter -nvL
    Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
      727 52938 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED
        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           
        0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           
        0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
    
    Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination         
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
    
    Chain OUTPUT (policy ACCEPT 4 packets, 640 bytes)
     pkts bytes target     prot opt in     out     source               destination
    

    另外一种删除方法

    [root@wsl-001 ~]# iptables -A INPUT -s 192.168.188.1 -p tcp --sport 1234 -d 192.168.188.128 --dport 80 -j DROP
    [root@wsl-001 ~]# iptables -nvL --line-number
    Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
    num   pkts bytes target     prot opt in     out     source               destination         
    1      827 60030 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED
    2        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           
    3        0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           
    4        0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22
    5        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
    6        0     0 DROP       tcp  --  *      *       192.168.188.1        192.168.188.128      tcp spt:1234 dpt:80
    
    Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
    num   pkts bytes target     prot opt in     out     source               destination         
    1        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
    
    Chain OUTPUT (policy ACCEPT 31 packets, 2744 bytes)
    num   pkts bytes target     prot opt in     out     source               destination         
    [root@wsl-001 ~]# iptables -D INPUT 6
    [root@wsl-001 ~]# iptables -nvL --line-number
    Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
    num   pkts bytes target     prot opt in     out     source               destination         
    1     1166 87287 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED
    2        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           
    3        0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           
    4        0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22
    5        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
    
    Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
    num   pkts bytes target     prot opt in     out     source               destination         
    1        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited
    
    Chain OUTPUT (policy ACCEPT 41 packets, 4544 bytes)
    num   pkts bytes target     prot opt in     out     source               destination
    

    iptables -P INPUT DROP (默认规则进入的数据包全部丢掉)
    这个保持默认就行了

    扩展(selinux了解即可)
    1. selinux教程 http://os.51cto.com/art/201209/355490.htm
    2.selinux pdf电子书 http://pan.baidu.com/s/1jGGdExK

    相关文章

      网友评论

        本文标题:Linux网络相关、firewalld和netfilter、ne

        本文链接:https://www.haomeiwen.com/subject/rerufftx.html