Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Linux firewall rules example Extracts     - Installation Elementary OS Freya to do some settings (Linux)

- Linux Getting Started tutorial: Experience Xen Virtual Machine chapter (Linux)

- Ubuntu Linux use ufw or iptables firewall configuration (Linux)

- Linux terminal interface font color settings (Linux)

- Linux netstat command to get started (Linux)

- Select helps secure the system network management tools (Linux)

- Linux initialization init system - UpStart (Linux)

- Elixir: the future of programming languages (Programming)

- iOS development -Launch Image and Launchscreen (Programming)

- HttpClient Tutorial (Programming)

- How to recover deleted files in Linux systems (Linux)

- Install Ubuntu Software Center App Grid (Linux)

- Oracle 11g contraction table space error ORA-03297: file contains used data beyondrequested RESIZE value (Database)

- MySQL Tutorial: Building MySQL Cluster under Linux (Database)

- Spring Data JPA @EnableJpaRepositories configuration in detail (Programming)

- Upgrading to Debian 7.6 glibc 2.15 (Linux)

- grep search from files and display the file name (Linux)

- error 1819 (HY000): your password does not satisfy the current policy requirements (Database)

- Linux platform to prevent hackers to share practical skills (Linux)

- The difference between Linux su and sudo commands (Linux)

  Linux firewall rules example Extracts
  Add Date : 2018-11-21      
  Online to see a Linux firewall rules example, recorded for future reference purposes

sbin / iptables -P INPUT DROP

/ Sbin / iptables -I INPUT -p tcp-dport 80 -j ACCEPT

/ Sbin / iptables -I INPUT -p tcp-dport 22 -j ACCEPT

/ Sbin / iptables -A INPUT -j DROP

/ Sbin / iptables -A INPUT -j LOG

/ Sbin / iptables -A FORWARD -p tcp-syn -m limit-limit 1 / s -j ACCEPT

/ Sbin / iptables -A FORWARD -p tcp -tcp-flags SYN, ACK, FIN, RST RST -m limit -limit 1 / s -j ACCEPT

/ Sbin / iptables -A FORWARD -p icmp-icmp-type echo-request -m limit-limit 1 / s -j ACCEPT

/etc/init.d/iptables save /etc/init.d/iptables restart
- Hackers is how the invasion and control of Things devices? (Linux)
- Wireless LAN security solutions (Linux)
- Linux signal and orphans, and zombie process (Programming)
- To get Java class / jar package path (Programming)
- How to install with JSON support in Ubuntu 15.04 SQLite 3.9.1 (Database)
- Realization of Linux operating system illegal IP censorship (Linux)
- To teach you a trick to find the real IP address (Linux)
- 22 Port weak passwords and SSH connection program of the Linux server (Linux)
- PL / SQL -> UTL_FILE use presentation package (Database)
- PostgreSQL using the system cache to improve operational efficiency (Database)
- Linux common network tools: ping host sweep (Linux)
- Ubuntu 14.04 Configuring cuda-convnet (Linux)
- Android design patterns - state mode (Programming)
- Git use and interpretation of common commands (Linux)
- MySQL common functions summary (Database)
- The correct way of logical backup mysqldump (Database)
- Using Linux stat command to view the files (Linux)
- Linux use glibc2 library and crypt () function to generate the user password (Programming)
- Redhat 7 modify the default run level method --RHEL7 use systemd to create a symbolic link to the default runlevel (Linux)
- for (int a: i) the use of the Java programming (Programming)
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.