Re: gateway newbie questions

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



/sbin/iptables --flush
> /sbin/iptables --table nat --flush


Above two lines flushes all existing rules  in iptables

/sbin/iptables --delete-chain
> /sbin/iptables --table nat --delete-chain


This two deletes any user defined chains present

/sbin/iptables --table nat --append POSTROUTING --out-interface ppp0 -j
> MASQUERADE


This  one masquerades the requests going out to internet through interface
ppp0 which is the dialup interface. Masquerading allows internally connected
computers that don't have registered Internet IP addresses to communicate to
the Internet through the sigle IP address present.

Refer http://www.tldp.org/HOWTO/IP-Masquerade-HOWTO/ for more details about
it.


/sbin/iptables --append FORWARD --in-interface eth0 -j ACCEPT


This one accepts Forwarding of all packets (to other interfaces present, say
ppp0) comming at the interface eth0 that is connected to the local network.

echo 1 > /proc/sys/net/ipv4/ip_forward


Enable packet forwarding in kernel. Can also be set permanantly in
/etc/sysctl.conf

To block a particular machine by its IP address you can add the following
line to iptables.

iptables -A INPUT -s 192.168.0.5 -i eth0 -j DROP
this blocks requests from 192.168.0.5 comming at interface eth0. I think
this would be sufficient. try.

Also refer http://iptables.org/ for more details abt iptables.

--
regards,
Ashok.
-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subjecthttps://www.redhat.com/mailman/listinfo/redhat-list


[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux