Linux第十四周
系統(tǒng)的INPUT和OUTPUT默認(rèn)策略為DROP;
#把默認(rèn)策略設(shè)置為DROP [root@localhost?~]#?iptables?-P?INPUT?DROP [root@localhost?~]#?iptables?-P?OUTPUT?DROP1、限制本地主機(jī)的web服務(wù)器在周一不允許訪問;新請求的速率不能超過100個每秒;web服務(wù)器包含了admin字符串的頁面不允許訪問;web服務(wù)器僅允許響應(yīng)報文離開本機(jī);
#web服務(wù)器周一不允許訪問;新請求的速率不能超過100個每秒 [root@localhost?~]#?iptables?-I?INPUT?-d?192.168.1.61?-p?tcp?--dport?80?-m?connlimit?!?--connlimit-above?100?-m?time?!?--weekdays?Mon?-j?ACCEPT [root@localhost?~]#?iptables?-I?INPUT?-s?192.168.1.61?-p?tcp?--sport?80?-m?time?!?--weekdays?Mon?-j?ACCEPT #web服務(wù)器包含了admin字符串的頁面不允許訪問;? [root@localhost?~]#?iptables?-I?OUTPUT?-s?192.168.1.61?-p?tcp?--sport?80?-m?string?--string?"admin"?--algo?kmp?-j?REJECT #web服務(wù)器僅允許響應(yīng)報文離開本機(jī); [root@localhost?~]#?iptables?-A?OUTPUT?-p?tcp?--sport?80?-m?state?--state?ESTABLISHED?-j?ACCEPT2、在工作時間,即周一到周五的8:30-18:00,開放本機(jī)的ftp服務(wù)給172.16.0.0網(wǎng)絡(luò)中的主機(jī)訪問;數(shù)據(jù)下載請求的次數(shù)每分鐘不得超過5個;
[root@localhost?~]#?iptables?-A?INPUT?-s?172.168.0.0/16?-d?192.168.1.61?-p?tcp?--dport?21?-m?limit?--limit?5/minute?-m?time?--timestart?08:30?--timestop?18:00?--weekdays?Mon,Tue,Wed,Thu,Fri?-j?ACCEPT [root@localhost?~]#?iptables?-A?OUTPUT?-d?172.168.0.0/16?-s?192.168.1.61?-p?tcp?--sport?21?-m?limit?--limit?5/minute?-m?time?--timestart?08:30?--timestop?18:00?--weekdays?Mon,Tue,Wed,Thu,Fri?-j?ACCEPT3、開放本機(jī)的ssh服務(wù)給172.16.x.1-172.16.x.100中的主機(jī),x為你的座位號,新請求建立的速率一分鐘不得超過2個;僅允許響應(yīng)報文通過其服務(wù)端口離開本機(jī);
4、拒絕TCP標(biāo)志位全部為1及全部為0的報文訪問本機(jī);
[root@localhost?~]#?iptables?-A?INPUT?-p?tcp?--tcp-flags?ALL?ALL?-j?REJECT [root@localhost?~]#?iptables?-A?INPUT?-p?tcp?--tcp-flags?ALL?NONE?-j?REJECT5、允許本機(jī)ping別的主機(jī);但不開放別的主機(jī)ping本機(jī);
[root@localhost?~]#?iptables?-A?OUTPUT?-s?192.168.1.61?-p?icmp?--icmp-type?8?-j?ACCEPT [root@localhost?~]#?iptables?-A?INPUT?-d?192.168.1.61?-p?icmp?--icmp-type?0?-j?ACCEPT6、判斷下述規(guī)則的意義:?
?#?iptables?-N?clean_in創(chuàng)建一條自定義鏈clena_in#?iptables?-A?clean_in?-d?255.255.255.255?-p?icmp?-j?DROP在clean_in鏈接上追加禁止本機(jī)收icmp廣播#?iptables?-A?clean_in?-d?172.16.255.255?-p?icmp?-j?DROP在clean_in鏈接上追加禁止本機(jī)到172.16.0.0網(wǎng)段收發(fā)icmp廣播#?iptables?-A?clean_in?-p?tcp?!?--syn?-m?state?--state?NEW?-j?DROP禁止非syn不正常請求#?iptables?-A?clean_in?-p?tcp?--tcp-flags?ALL?ALL?-j?DROP丟棄所有tcp標(biāo)志位為1的數(shù)據(jù)包#?iptables?-A?clean_in?-p?tcp?--tcp-flags?ALL?NONE?-j?DROP丟棄所有tcp標(biāo)志位為0的數(shù)據(jù)包#?iptables?-A?clean_in?-d?172.16.100.7?-j?RETURN?停止執(zhí)行當(dāng)前鏈中目標(biāo)地址為172.16.100.7的后續(xù)rules,并返回到調(diào)用鏈中#?iptables?-A?INPUT?-d?172.16.100.7?-j?clean_in 目標(biāo)地址為172.168.100.7的報文執(zhí)行clean_in鏈rules;#?iptables?-A?INPUT??-i?lo?-j?ACCEPT指定流入報文接口為lo#?iptables?-A?OUTPUT?-o?lo?-j?ACCEPT #指定流出報文接口為lo#?iptables?-A?INPUT??-i?eth0?-m?multiport?-p?tcp?--dports?53,113,135,137,139,445?-j?DROP在INPUT鏈中新增一條rules,所有通過eth0進(jìn)入,目標(biāo)端口為53,113,135,137,139,445的tcp報文,全部丟棄;#?iptables?-A?INPUT??-i?eth0?-m?multiport?-p?udp?--dports?53,113,135,137,139,445?-j?DROP在INPUT鏈中新增一條rules,所有通過eth0進(jìn)入,目標(biāo)端口為53,113,135,137,139,445的udp報文,全部丟棄;#?iptables?-A?INPUT??-i?eth0?-p?udp?--dport?1026?-j?DROP在INPUT鏈中新增一條rules,所有通過eth0進(jìn)入,目標(biāo)端口為?udp?1026的報文,全部丟棄#?iptables?-A?INPUT??-i?eth0?-m?multiport?-p?tcp?--dports?1433,4899?-j?DROP在INPUT鏈中新增一條rules,所有通過eth0進(jìn)入,目標(biāo)端口為1433,4899的tcp報文,全部丟棄#?iptables?-A?INPUT??-p?icmp?-m?limit?--limit?10/second?-j?ACCEPT限制icmp報文的速率為每秒10次7、通過tcp_wrapper控制vsftpd僅允許172.16.0.0/255.255.0.0網(wǎng)絡(luò)中的主機(jī)訪問,但172.16.100.3除外;對所被被拒絕的訪問嘗試都記錄在/var/log/tcp_wrapper.log日志文件中;
[root@localhost?~]#?vim?/etc/hosts.allow? 添加 vsftpd:172.16.0.0/255.255.255.0?EXCEPT?172.16.100.3 [root@localhost?~]#?vim?/etc/hosts.deny? 添加 vsftpd:ALL?:spawn?/bin/echo?`date`?login?attempt?from?%c?to?%s,?%d?>>/var/log/tcp_wrapper.log轉(zhuǎn)載于:https://blog.51cto.com/sihua/1875200
總結(jié)
- 上一篇: 华为路由AX3上手教程 华为路由AX3怎
- 下一篇: Linux Perl 升级