精品国产18久久久久久洗澡_精品剧情v国产在线观看_任你弄精品视频免费观看_国产毛片av在线_在线观看日产精品_黄色综合网站_一区二区乱码_蜜桃tv在线播放_五月婷婷激情综合网_日韩午夜激情

  • IDC銷售:020-66849165/66849090/66849088
  • 云服務銷售:020-66849108/9091 | 客服(備案,域名,虛機,郵箱):020-66849000-2

登錄 | 會員注冊 | 控制面板 | 幫助中心 | 購物車 | 舉報中心

? ? 域名活動
幫助中心FAQ

# iptables filter

 

- iptables -F #清空所有規則

- service iptables save #保存規則

- iptables -t nat #-t指定表

- iptables -Z #將計數器清零

- iptables -A INPUT -s 192.168.188.1 -p tcp --sport 1234 -d 192.168.188.128 --dport 80 -j DROP

- iptables -I/-A/-D INPUT -s 1.1.1.1 -j DROP

- iptables -I INPUT -s 192.168.1.0/24 -i eth0 -j ACCEPT

- iptables -nvL --line-numbers

- iptables -D INPUT 1

- iptables -P INPUT DROP

 

 

 

 

 

 

```

[root@localhost ~]# iptables -nvL

Chain INPUT (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

  193 12868 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED

0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           

0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           

6   552 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22

   10  2365 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

 

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

 

Chain OUTPUT (policy ACCEPT 112 packets, 12324 bytes)

 pkts bytes target     prot opt in     out     source               destination         

```

iptables規則記錄在/etc/sysconfig/iptables的配置文件中

```

[root@localhost ~]# cat /etc/sysconfig/iptables

# sample configuration for iptables service

# you can edit this manually or use system-config-firewall

# please do not ask us to add additional ports/services to this default configuration

*filter

:INPUT ACCEPT [0:0]

:FORWARD ACCEPT [0:0]

:OUTPUT ACCEPT [0:0]

-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT

-A INPUT -p icmp -j ACCEPT

-A INPUT -i lo -j ACCEPT

-A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT

-A INPUT -j REJECT --reject-with icmp-host-prohibited

-A FORWARD -j REJECT --reject-with icmp-host-prohibited

COMMIT[root@localhost ~]# iptables -F

```

```

[root@localhost ~]# iptables -nvL

Chain INPUT (policy ACCEPT 6 packets, 428 bytes)

 pkts bytes target     prot opt in     out     source               destination         

 

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

 

Chain OUTPUT (policy ACCEPT 4 packets, 448 bytes)

 pkts bytes target     prot opt in     out     source               destination

[root@localhost ~]# cat /etc/sysconfig/iptables

# sample configuration for iptables service

# you can edit this manually or use system-config-firewall

# please do not ask us to add additional ports/services to this default configuration

*filter

:INPUT ACCEPT [0:0]

:FORWARD ACCEPT [0:0]

:OUTPUT ACCEPT [0:0]

-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT

-A INPUT -p icmp -j ACCEPT

-A INPUT -i lo -j ACCEPT

-A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT

-A INPUT -j REJECT --reject-with icmp-host-prohibited

-A FORWARD -j REJECT --reject-with icmp-host-prohibited

COMMIT

 

```

重啟服務,iptables規則重置

```

[root@localhost ~]# service iptables restart

Redirecting to /bin/systemctl restart iptables.service

[root@localhost ~]# iptables -nvL

Chain INPUT (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

8   576 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED

0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           

0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           

0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22

0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

 

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

 

Chain OUTPUT (policy ACCEPT 5 packets, 716 bytes)

 pkts bytes target     prot opt in     out     source               destination

[root@localhost ~]# service iptables save

 

```

 

```

[root@localhost ~]# iptables -t filter -nvL

Chain INPUT (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

   68  4536 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED

0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           

0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           

0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22

1   229 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

 

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

 

Chain OUTPUT (policy ACCEPT 38 packets, 5024 bytes)

 pkts bytes target     prot opt in     out     source               destination

[root@localhost ~]# iptables -t nat -nvL

Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

 

Chain INPUT (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

 

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

 

Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination

```

iptables -Z #將計數器清零pktsbytes

```

[root@localhost ~]# iptables -Z ; iptables -nvL

Chain INPUT (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED

0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           

0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           

0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22

0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

 

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

 

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination

```

 

[root[@localhost](https://my.oschina.net/u/570656) ~]# iptables -A INPUT -s 192.168.188.1 -p tcp --sport 1234 -d 192.168.188.128 --dport 80 -j DROP/REJECT

 

iptables -A #插入到后面

```

[root@localhost ~]# iptables -A INPUT -s 192.168.188.1 -p tcp --sport 1234 -d 192.168.188.128 --dport 80 -j DROP

[root@localhost ~]# iptables -nvL

Chain INPUT (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

  354 23684 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED

0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           

0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           

   13  1196 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22

  383 47064 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

0     0 DROP       tcp  --  *      *       192.168.188.1        192.168.188.128      tcp spt:1234 dpt:80

 

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

 

Chain OUTPUT (policy ACCEPT 23 packets, 2212 bytes)

 pkts bytes target     prot opt in     out     source               destination

```

> 0     0 DROP       tcp  --  *      *       192.168.188.1        192.168.188.128      tcp spt:1234 dpt:80

 

iptables -I #插入到前面

```

[root@localhost ~]# iptables -I INPUT -p tcp --dport 80 -j DROP

[root@localhost ~]# iptables -nvL

Chain INPUT (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:80

  513 35132 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED

0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           

0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           

   13  1196 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22

  384 47308 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

0     0 DROP       tcp  --  *      *       192.168.188.1        192.168.188.128      tcp spt:1234 dpt:80

 

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

 

Chain OUTPUT (policy ACCEPT 7 packets, 1156 bytes)

 pkts bytes target     prot opt in     out     source               destination

 

```

iptables -D #刪除

```

[root@localhost ~]# iptables -D INPUT -p tcp --dport 80 -j DROP

[root@localhost ~]# iptables -nvL

Chain INPUT (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

  605 42492 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED

0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           

0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           

   17  1564 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22

  672 75245 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

0     0 DROP       tcp  --  *      *       192.168.188.1        192.168.188.128      tcp spt:1234 dpt:80

 

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

 

Chain OUTPUT (policy ACCEPT 19 packets, 1972 bytes)

 pkts bytes target     prot opt in     out     source               destination  

[root@localhost ~]# iptables -D INPUT -s 192.168.188.1 -p tcp --sport 1234 -d 192.168.188.128 --dport 80 -j DROP

[root@localhost ~]# iptables -nvL

Chain INPUT (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

  744 55092 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED

0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           

0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           

   18  1656 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22

  673 75489 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

 

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

 

Chain OUTPUT (policy ACCEPT 17 packets, 1628 bytes)

 pkts bytes target     prot opt in     out     source               destination  

```

> 刪除iptables的規則,但是重新書寫一條規則或許太麻煩或者忘記規則的寫法時

 

```

 

[root@localhost ~]# iptables -A INPUT -s 192.168.188.1 -p tcp --sport 1234 -d 192.168.188.128 --dport 80 -j DROP

[root@localhost ~]# iptables -I INPUT -p tcp --dport 80 -j DROP

[root@localhost ~]# iptables -nvL

Chain INPUT (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:80

  912 70948 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED

0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           

0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           

   18  1656 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22

  674 75718 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

0     0 DROP       tcp  --  *      *       192.168.188.1        192.168.188.128      tcp spt:1234 dpt:80

 

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

 

Chain OUTPUT (policy ACCEPT 7 packets, 1364 bytes)

 pkts bytes target     prot opt in     out     source               destination

```

iptables -nvL --line-number

```

[root@localhost ~]# iptables -nvL --line-number

Chain INPUT (policy ACCEPT 0 packets, 0 bytes)

num   pkts bytes target     prot opt in     out     source               destination         

1        0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:80

2     1010 77416 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED

3        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           

4        0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           

5       18  1656 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22

6      674 75718 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

7        0     0 DROP       tcp  --  *      *       192.168.188.1        192.168.188.128      tcp spt:1234 dpt:80

 

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)

num   pkts bytes target     prot opt in     out     source               destination         

1        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

 

Chain OUTPUT (policy ACCEPT 59 packets, 7820 bytes)

num   pkts bytes target     prot opt in     out     source               destination

```

```

[root@localhost ~]# iptables -D INPUT 1

[root@localhost ~]# iptables -D INPUT 7

iptables: Index of deletion too big.

[root@localhost ~]# iptables -D INPUT 6

[root@localhost ~]# iptables -nvL --line-number

Chain INPUT (policy ACCEPT 0 packets, 0 bytes)

num   pkts bytes target     prot opt in     out     source               destination         

1     1165 87732 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED

2        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           

3        0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           

4       19  1748 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22

5      674 75718 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

 

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)

num   pkts bytes target     prot opt in     out     source               destination         

1        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

 

Chain OUTPUT (policy ACCEPT 42 packets, 4056 bytes)

num   pkts bytes target     prot opt in     out     source               destination

```

 

iptables -P #默認規則

```

[root@localhost ~]# iptables -P OUTPUT DROP

```

 

> 終端使用DROP規則會使原本數據包在22端口通信,接收不了數據,在返回給客戶端再返回給終端,結果到達不了終端,然后接收不了數據就會導致斷開終端連接,解決辦法到主機上將規則改回ACCEPT

 

```

[root@localhost ~]# iptables -nvL --line-number

Chain INPUT (policy ACCEPT 0 packets, 0 bytes)

num   pkts bytes target     prot opt in     out     source               destination         

1     1165 87732 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED

2        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           

3        0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           

4       19  1748 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22

5      674 75718 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

 

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)

num   pkts bytes target     prot opt in     out     source               destination         

1        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

 

Chain OUTPUT (policy DROP 37 packets, 24648 bytes)

num   pkts bytes target     prot opt in     out     source               destination

[root@localhost ~]# iptables -P OUTPUT ACCEPT

```

 

> -s #ip

-p #指定協議

--sport #源端口號

-d #目標ip

--dport #目標端口號

-j #行為

 

 

#iptables小案例

 

```

vi /usr/local/sbin/iptables.sh

#!/bin/bash

ipt="/usr/sbin/iptables"

$ipt -F

$ipt -P INPUT DROP

$ipt -P OUTPUT ACCEPT

$ipt -P FORWARD ACCEPT

$ipt -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT

$ipt -A INPUT -s 192.168.133.0/24 -p tcp --dport 22 -J ACCEPT

$ipt -A INPUT -p tcp --dprot 80 -j ACCEPT

$ipt -A INPUT -p tcp --dprot 21 -j ACCEPT

 

icmp示例

iptables -I INPUT -p icmp --icmp-type 8 -j DROP

 

```

 

 

```

[root@localhost ~]# vim /usr/local/sbin/iptables.sh

#!/bin/bash

ipt="/usr/sbin/iptables"

$ipt -F

$ipt -P INPUT DROP

$ipt -P OUTPUT ACCEPT

$ipt -P FORWARD ACCEPT

$ipt -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT

$ipt -A INPUT -s 192.168.133.0/24 -p tcp --dport 22 -j ACCEPT

$ipt -A INPUT -p tcp --dport 80 -j ACCEPT

$ipt -A INPUT -p tcp --dport 21 -j ACCEPT

```

> tcp協議里ESTABLISHED是保持連接,RELATED狀態

 

```

[root@localhost ~]# w

 22:10:01 up 1 day, 20:48,  2 users,  load average: 0.00, 0.01, 0.05

USER     TTY        LOGIN@   IDLE   JCPU   PCPU WHAT

root     tty1      06:40   15:23m  0.42s  0.42s -bash

root     pts/0     21:50    1.00s  0.45s  0.00s w

[root@localhost ~]# sh /usr/local/sbin/iptables.sh

[root@localhost ~]# iptables -nvL

Chain INPUT (policy DROP 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

   28  1848 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED

0     0 ACCEPT     tcp  --  *      *       192.168.133.0/24     0.0.0.0/0            tcp dpt:22

0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:80

0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:21

 

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

 

Chain OUTPUT (policy ACCEPT 15 packets, 1428 bytes)

 pkts bytes target     prot opt in     out     source               destination

[root@localhost ~]# iptables -nvL

Chain INPUT (policy DROP 1 packets, 229 bytes)

 pkts bytes target     prot opt in     out     source               destination         

   41  2712 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED

0     0 ACCEPT     tcp  --  *      *       192.168.133.0/24     0.0.0.0/0            tcp dpt:22

0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:80

0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:21

 

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)

 pkts bytes target     prot opt in     out     source               destination         

 

Chain OUTPUT (policy ACCEPT 27 packets, 3628 bytes)

 pkts bytes target     prot opt in     out     source               destination  

[root@localhost ~]# service iptables restart #此命令為重啟iptables服務

Redirecting to /bin/systemctl restart iptables.service

```

> 可以看出pkts bytes的值正在增長

 

 

icmp案例

Windows

```

C:UsersAdministrator>ping 192.168.9.134


正在 Ping 192.168.9.134 具有 32 字節的數據:

來自 192.168.9.134 的回復: 字節=32 時間<1ms TTL=64

來自 192.168.9.134 的回復: 字節=32 時間<1ms TTL=64

來自 192.168.9.134 的回復: 字節=32 時間<1ms TTL=64

來自 192.168.9.134 的回復: 字節=32 時間<1ms TTL=64

 

192.168.9.134 Ping 統計信息:

    數據包: 已發送 = 4,已接收 = 4,丟失 = 0 (0% 丟失)

往返行程的估計時間(以毫秒為單位):

    最短 = 0ms,最長 = 0ms,平均 = 0ms

```

Linux

```

[root@localhost ~]# iptables -I INPUT -p icmp --icmp-type 8 -j DROP

```

> 使icmp被禁止了,--icmp-type 8icmp8種類型

 

Windows

```

C:UsersAdministrator>ping 192.168.9.134

 

正在 Ping 192.168.9.134 具有 32 字節的數據:

請求超時。

請求超時。

請求超時。

請求超時。

 

192.168.9.134

久久久国产一区二区三区四区小说| 99久久婷婷国产综合精品电影| 国产乱理伦片a级在线观看| 亚洲精品免费在线| 三级成人在线视频| 欧美天堂影院| 888av在线视频| 日本免费视频www| 岛国视频午夜一区免费在线观看 | av日韩电影| 找av导航入口| 依依成人精品视频| 久久精品国产免费| 精品国产一区二区三区av片| 国产在线看片免费视频在线观看| 初尝黑人巨炮波多野结衣电影| 亚洲国产日韩综合久久精品| 国产一区二区三区四区在线观看| 日本黄色精品| 国产精品美女久久久久人| 麻豆tv在线| 日本在线中文电影| 欧美人体做爰大胆视频| 亚洲女人****多毛耸耸8| 精品一区二区三区不卡 | 麻豆成人入口| 免费在线小视频| 欧美高清成人| 欧美电影免费提供在线观看| 午夜欧美大尺度福利影院在线看 | 国产精品素人一区二区| 日本中文字幕一区二区视频 | 欧美性猛交xxxx黑人| 久久精品网站免费观看| 国产精品一区专区| 亚洲片区在线| 久久婷婷蜜乳一本欲蜜臀| 另类一区二区| 天堂资源在线| av免费在线观看网址| 天堂a√中文在线| 777永久免费网站国产| 欧美剧情片在线观看| 亚洲成a人片在线不卡一二三区| 2024国产精品| 国产91精品免费| 老司机亚洲精品| 亚洲天天综合| 成人写真视频| 免费成人高清在线视频theav| 亚洲黑人在线| 国产精欧美一区二区三区蓝颜男同| 黄色网在线免费看| 在线观看二区| 欧美精品电影| 黄色免费网站在线观看| 电影av一区| 国产精品四虎| 国产露出视频在线观看| 国产三级电影在线| 久色视频在线| 日韩av地址| 国产在线小视频| 高清在线观看av| 日本中文字幕在线看| 国产1区在线| 黄色网页在线免费看| av理论在线观看| 深夜成人在线| 天堂综合在线播放| 91久久精品无嫩草影院| 美日韩黄色大片| 精品一区二区三区中文字幕老牛| 欧美色女视频| 欧美日韩久久| 奶水喷射视频一区| 极品少妇xxxx精品少妇偷拍| 国产成人高清在线| 久久久精品蜜桃| 亚洲精品视频在线观看免费| 性感美女极品91精品| 欧美色男人天堂| 天天舔夜夜操| 欧美黄色小说| 天堂电影一区| 久久国产精品免费精品3p| 91亚洲一区| 日韩激情视频在线观看| 91麻豆国产福利在线观看| 国产精品久久久久久久久动漫 | 国产精品xnxxcom| 日韩欧美影院| 亚洲国产高清一区| 国内精品伊人久久久久av一坑| 97久久超碰精品国产| 亚洲三级电影网站| 欧美精品在线视频| 美臀av在线| 日本精品600av| 综合久草视频| 亚洲欧美综合久久久| 美女在线观看视频一区二区| 国产日韩精品一区| 欧美视频自拍偷拍| 中文字幕视频在线| 国产精品一二三产区| 国产精品毛片视频| 99精品国产一区二区青青牛奶| 国产在线视频一区二区三区| 亚洲丝袜另类动漫二区| 在线不卡a资源高清| 九色视频在线观看免费播放 | 日韩欧美天堂| 一本色道久久综合亚洲精品高清 | 在线免费观看日本欧美爱情大片| 视频一区在线视频| 国产精品美女久久久久久 | 午夜电影一区二区| 羞羞网站在线观看入口免费| 永久免费av在线| 日本a人精品| 亚洲特级毛片| 26uuu国产电影一区二区| 五月激情综合色| 一起操在线观看| 亚洲综合视频| 男人的天堂成人在线| 亚洲精品欧美激情| 传媒av在线| jizz亚洲女人高潮大叫| 亚洲九九视频| 91蜜桃在线观看| 欧美一区欧美二区| 好看的中文字幕在线播放| 狠狠色丁香婷婷综合影院| 高清不卡一区二区| 欧洲色大大久久| 在线视频婷婷| 老牛影视av一区二区在线观看 | 黄色亚洲在线| 欧美国产欧美综合| 成人伊人222| 99久久婷婷国产综合精品首页 | 精品国产免费人成电影在线观看四季| 丁香在线视频| 蜜桃tv一区二区三区| 高清国产一区二区| 精品久久一区二区| 成人做爰免费视频免费看| 亚洲激情网站| 午夜日韩在线电影| а√中文在线8| 香蕉久久网站| 亚洲免费av高清| 亚洲高清国产精品| 久久精品66| 久久久久久久久免费| 国产美女被遭强高潮免费网站| 高清在线一区| 国产福利不卡视频| 久草在线国产| 91久久精品无嫩草影院 | 日韩高清在线观看| 91久久线看在观草草青青| 欧美男男video| 精品不卡视频| 一本到高清视频免费精品| 在线观看免费视频你懂的| 激情婷婷久久| 欧美丝袜美女中出在线| 美女精品视频| 美日韩一级片在线观看| 日韩欧美中文一区二区| 高清不卡一区| 91麻豆6部合集magnet| 一本一道dvd在线观看免费视频| 国产日产精品一区二区三区四区的观看方式 | 日韩精品一区二区三区中文不卡| 九色成人搞黄网站| 9l国产精品久久久久麻豆| fc2人成共享视频在线观看| 免费看日本一区二区| 亚洲宅男天堂在线观看无病毒| 羞羞视频在线观看免费| 亚洲一区二区动漫| 欧美一区二区视频在线观看2022| 久久免费影院| 亚洲国产成人午夜在线一区| а√天堂中文在线资源bt在线| 欧美日韩三级| 精品视频免费在线| 日韩精品一区二区三区中文在线| 国产欧美日韩三级| 久草资源在线| 精品一二三四在线| 天堂成人在线| 亚洲伊人观看| 粉嫩tv在线播放| 国产欧美丝祙| 日本激情免费|