Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # Generated by iptables-save v1.4.14 on Mon Mar 17 22:16:31 2014
- *filter
- :INPUT DROP [1:32]
- :FORWARD ACCEPT [0:0]
- :OUTPUT ACCEPT [60:7792]
- -A INPUT -p tcp -m state --state NEW -m tcp --dport 80 -j ACCEPT
- -A INPUT -p tcp -m state --state NEW,ESTABLISHED -m tcp --dport 443 -j ACCEPT
- -A INPUT -i eth0 -p tcp -m state --state NEW -m tcp --dport 21 -j ACCEPT
- -A INPUT -p udp -m udp --dport 21 -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 20 -j ACCEPT
- -A INPUT -p udp -m udp --dport 20 -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT
- -A INPUT -p udp -m udp --dport 443 -j ACCEPT
- -A INPUT -p udp -m udp --dport 25565 -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 25565 -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 30033 -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 41144 -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 10011 -j ACCEPT
- -A INPUT -p udp -m udp --dport 9987 -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 22 -j ACCEPT
- -A INPUT -p tcp -m tcp --sport 80 -j ACCEPT
- -A INPUT -p tcp -m tcp --sport 53 -j ACCEPT
- -A INPUT -p udp -m udp --sport 53 -j ACCEPT
- -A INPUT -p udp -m udp --dport 9987 -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 3306 -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 21 -j ACCEPT
- -A INPUT -i lo -j ACCEPT
- -A INPUT -p tcp --dport 25 -j ACCEPT
- -A INPUT -p tcp --dport 587 -j ACCEPT
- -A INPUT -p tcp --dport 110 -j ACCEPT
- -A INPUT -p tcp --dport 995 -j ACCEPT
- -A INPUT -p tcp --dport 143 -j ACCEPT
- -A INPUT -p tcp --dport 993 -j ACCEPT
- -A OUTPUT -o lo -j ACCEPT
- COMMIT
- # Completed on Mon Mar 17 22:16:31 2014
- flurry@flurryofactivity:~$ ip addr
- 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
- link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
- inet 127.0.0.1/8 scope host lo
- inet6 ::1/128 scope host
- valid_lft forever preferred_lft forever
- 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
- link/ether 0e:48:f3:6b:25:a5 brd ff:ff:ff:ff:ff:ff
- inet 178.63.221.178/24 brd 178.63.221.255 scope global eth0
- inet6 fe80::c48:f3ff:fe6b:25a5/64 scope link
- valid_lft forever preferred_lft forever
- flurry@flurryofactivity:~$ ip addr eth0
- Command "eth0" is unknown, try "ip addr help".
- flurry@flurryofactivity:~$ ip
- Usage: ip [ OPTIONS ] OBJECT { COMMAND | help }
- ip [ -force ] -batch filename
- where OBJECT := { link | addr | addrlabel | route | rule | neigh | ntable |
- tunnel | tuntap | maddr | mroute | mrule | monitor | xfrm |
- netns | l2tp }
- OPTIONS := { -V[ersion] | -s[tatistics] | -d[etails] | -r[esolve] |
- -f[amily] { inet | inet6 | ipx | dnet | link } |
- -l[oops] { maximum-addr-flush-attempts } |
- -o[neline] | -t[imestamp] | -b[atch] [filename] |
- -rc[vbuf] [size]}
- flurry@flurryofactivity:~$ ip addr
- 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
- link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
- inet 127.0.0.1/8 scope host lo
- inet6 ::1/128 scope host
- valid_lft forever preferred_lft forever
- 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
- link/ether 0e:48:f3:6b:25:a5 brd ff:ff:ff:ff:ff:ff
- inet 178.63.221.178/24 brd 178.63.221.255 scope global eth0
- inet6 fe80::c48:f3ff:fe6b:25a5/64 scope link
- valid_lft forever preferred_lft forever
- flurry@flurryofactivity:~$ apt-get install net-tools
- E: Sperrdatei /var/lib/dpkg/lock konnte nicht geöffnet werden. - open (13: Keine Berechtigung)
- E: Sperren des Administrationsverzeichnisses (/var/lib/dpkg/) nicht möglich, sind Sie root?
- flurry@flurryofactivity:~$ apt-get install net-tools^C
- flurry@flurryofactivity:~$ sudo -i
- [sudo] password for flurry:
- root@flurryofactivity:~# apt-get install net-tools
- Paketlisten werden gelesen... Fertig
- Abhängigkeitsbaum wird aufgebaut.
- Statusinformationen werden eingelesen.... Fertig
- net-tools ist schon die neueste Version.
- 0 aktualisiert, 0 neu installiert, 0 zu entfernen und 0 nicht aktualisiert.
- root@flurryofactivity:~# route -nee
- Kernel-IP-Routentabelle
- Ziel Gateway Maske Flags Metric Ref Benutzer Iface MSS Fenster irtt
- 0.0.0.0 178.63.221.160 0.0.0.0 UG 0 0 0 eth0 0 0 0
- 178.63.221.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 0 0 0
- root@flurryofactivity:~#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement