Browse Source

iptables

master
test2 5 years ago
parent
commit
c4200230d1
  1. 10
      sec/ex-3_iptables.adoc

10
sec/ex-3_iptables.adoc

@ -114,15 +114,17 @@ iptables is the user utility which allows you to work with these chains/rules.
The key to understanding how iptables works is http://docs.swarmlab.io/lab/sec/tables_traverse.jpg[this chart]. The key to understanding how iptables works is http://docs.swarmlab.io/lab/sec/tables_traverse.jpg[this chart].
The lowercase word on top is the table and the upper case word below is the chain. The lowercase word on top is the table and the upper case word below is the chain.
- Every IP packet that comes in **on any network interface** passes through this flow chart from top to bottom. - Every IP packet that comes in **on any network interface** passes through this flow chart from top to bottom.
A common source of confusion is that packets entering from, say, an internal interface are handled differently than packets from an Internet-facing interface.
All interfaces are handled the same way; it's up to you to define rules that treat them differently. **All interfaces are handled the same way; it's up to you to define rules that treat them differently.**
Of course some packets are intended for local processes, hence come in from the top of the chart and stop at <Local Process>, while other packets are generated by local processes; hence start at <Local Process> and proceed downward through the flowchart. Of course some packets
- are intended for local processes, hence come in from the top of the chart and stop at **Local Proces**,
- while other packets are generated by local processes; hence start at **Local Process** and proceed downward through the flowchart.
A detailed explanation can be found [https://www.frozentux.net/iptables-tutorial/iptables-tutorial.html#TRAVERSINGOFTABLES here]. A detailed explanation [https://www.frozentux.net/iptables-tutorial/iptables-tutorial.html#TRAVERSINGOFTABLES here].
==== ====
In the vast majority of use cases you won't need to use the **raw**, **mangle**, or **security** tables at all. In the vast majority of use cases you won't need to use the **raw**, **mangle**, or **security** tables at all.

Loading…
Cancel
Save