Advertisement
Guest User

Untitled

a guest
Apr 4th, 2016
100
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.39 KB | None | 0 0
  1. команда
  2. iptables -L -n --line
  3. +++++++++++++++++++++++++++++++++++++++++++++++++++++++
  4. Chain INPUT (policy DROP)
  5. num target prot opt source destination
  6. 1 ufw-before-logging-input all -- 0.0.0.0/0 0.0.0.0/0
  7. 2 ufw-before-input all -- 0.0.0.0/0 0.0.0.0/0
  8. 3 ufw-after-input all -- 0.0.0.0/0 0.0.0.0/0
  9. 4 ufw-after-logging-input all -- 0.0.0.0/0 0.0.0.0/0
  10. 5 ufw-reject-input all -- 0.0.0.0/0 0.0.0.0/0
  11. 6 ufw-track-input all -- 0.0.0.0/0 0.0.0.0/0
  12.  
  13. Chain FORWARD (policy DROP)
  14. num target prot opt source destination
  15. 1 ufw-before-logging-forward all -- 0.0.0.0/0 0.0.0.0/0
  16. 2 ufw-before-forward all -- 0.0.0.0/0 0.0.0.0/0
  17. 3 ufw-after-forward all -- 0.0.0.0/0 0.0.0.0/0
  18. 4 ufw-after-logging-forward all -- 0.0.0.0/0 0.0.0.0/0
  19. 5 ufw-reject-forward all -- 0.0.0.0/0 0.0.0.0/0
  20. 6 ufw-track-forward all -- 0.0.0.0/0 0.0.0.0/0
  21.  
  22. Chain OUTPUT (policy ACCEPT)
  23. num target prot opt source destination
  24. 1 ufw-before-logging-output all -- 0.0.0.0/0 0.0.0.0/0
  25. 2 ufw-before-output all -- 0.0.0.0/0 0.0.0.0/0
  26. 3 ufw-after-output all -- 0.0.0.0/0 0.0.0.0/0
  27. 4 ufw-after-logging-output all -- 0.0.0.0/0 0.0.0.0/0
  28. 5 ufw-reject-output all -- 0.0.0.0/0 0.0.0.0/0
  29. 6 ufw-track-output all -- 0.0.0.0/0 0.0.0.0/0
  30.  
  31. Chain ufw-after-forward (1 references)
  32. num target prot opt source destination
  33.  
  34. Chain ufw-after-input (1 references)
  35. num target prot opt source destination
  36. 1 ufw-skip-to-policy-input udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:137
  37. 2 ufw-skip-to-policy-input udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:138
  38. 3 ufw-skip-to-policy-input tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:139
  39. 4 ufw-skip-to-policy-input tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:445
  40. 5 ufw-skip-to-policy-input udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:67
  41. 6 ufw-skip-to-policy-input udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:68
  42. 7 ufw-skip-to-policy-input all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type BROADCAST
  43.  
  44. Chain ufw-after-logging-forward (1 references)
  45. num target prot opt source destination
  46. 1 LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "
  47.  
  48. Chain ufw-after-logging-input (1 references)
  49. num target prot opt source destination
  50. 1 LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "
  51.  
  52. Chain ufw-after-logging-output (1 references)
  53. num target prot opt source destination
  54.  
  55. Chain ufw-after-output (1 references)
  56. num target prot opt source destination
  57.  
  58. Chain ufw-before-forward (1 references)
  59. num target prot opt source destination
  60. 1 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  61. 2 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3
  62. 3 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 4
  63. 4 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 11
  64. 5 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 12
  65. 6 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
  66. 7 ufw-user-forward all -- 0.0.0.0/0 0.0.0.0/0
  67.  
  68. Chain ufw-before-input (1 references)
  69. num target prot opt source destination
  70. 1 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
  71. 2 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  72. 3 ufw-logging-deny all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
  73. 4 DROP all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
  74. 5 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3
  75. 6 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 4
  76. 7 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 11
  77. 8 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 12
  78. 9 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
  79. 10 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:67 dpt:68
  80. 11 ufw-not-local all -- 0.0.0.0/0 0.0.0.0/0
  81. 12 ACCEPT udp -- 0.0.0.0/0 224.0.0.251 udp dpt:5353
  82. 13 ACCEPT udp -- 0.0.0.0/0 239.255.255.250 udp dpt:1900
  83. 14 ufw-user-input all -- 0.0.0.0/0 0.0.0.0/0
  84.  
  85. Chain ufw-before-logging-forward (1 references)
  86. num target prot opt source destination
  87.  
  88. Chain ufw-before-logging-input (1 references)
  89. num target prot opt source destination
  90.  
  91. Chain ufw-before-logging-output (1 references)
  92. num target prot opt source destination
  93.  
  94. Chain ufw-before-output (1 references)
  95. num target prot opt source destination
  96. 1 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
  97. 2 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  98. 3 ufw-user-output all -- 0.0.0.0/0 0.0.0.0/0
  99.  
  100. Chain ufw-logging-allow (0 references)
  101. num target prot opt source destination
  102. 1 LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW ALLOW] "
  103.  
  104. Chain ufw-logging-deny (2 references)
  105. num target prot opt source destination
  106. 1 RETURN all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID limit: avg 3/min burst 10
  107. 2 LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "
  108.  
  109. Chain ufw-not-local (1 references)
  110. num target prot opt source destination
  111. 1 RETURN all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type LOCAL
  112. 2 RETURN all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type MULTICAST
  113. 3 RETURN all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type BROADCAST
  114. 4 ufw-logging-deny all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10
  115. 5 DROP all -- 0.0.0.0/0 0.0.0.0/0
  116.  
  117. Chain ufw-reject-forward (1 references)
  118. num target prot opt source destination
  119.  
  120. Chain ufw-reject-input (1 references)
  121. num target prot opt source destination
  122.  
  123. Chain ufw-reject-output (1 references)
  124. num target prot opt source destination
  125.  
  126. Chain ufw-skip-to-policy-forward (0 references)
  127. num target prot opt source destination
  128. 1 DROP all -- 0.0.0.0/0 0.0.0.0/0
  129.  
  130. Chain ufw-skip-to-policy-input (7 references)
  131. num target prot opt source destination
  132. 1 DROP all -- 0.0.0.0/0 0.0.0.0/0
  133.  
  134. Chain ufw-skip-to-policy-output (0 references)
  135. num target prot opt source destination
  136. 1 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
  137.  
  138. Chain ufw-track-forward (1 references)
  139. num target prot opt source destination
  140.  
  141. Chain ufw-track-input (1 references)
  142. num target prot opt source destination
  143.  
  144. Chain ufw-track-output (1 references)
  145. num target prot opt source destination
  146. 1 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 ctstate NEW
  147. 2 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 ctstate NEW
  148.  
  149. Chain ufw-user-forward (1 references)
  150. num target prot opt source destination
  151.  
  152. Chain ufw-user-input (1 references)
  153. num target prot opt source destination
  154. 1 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:3002
  155. 2 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:3002
  156.  
  157. Chain ufw-user-limit (0 references)
  158. num target prot opt source destination
  159. 1 LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 5 LOG flags 0 level 4 prefix "[UFW LIMIT BLOCK] "
  160. 2 REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
  161.  
  162. Chain ufw-user-limit-accept (0 references)
  163. num target prot opt source destination
  164. 1 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
  165.  
  166. Chain ufw-user-logging-forward (0 references)
  167. num target prot opt source destination
  168.  
  169. Chain ufw-user-logging-input (0 references)
  170. num target prot opt source destination
  171.  
  172. Chain ufw-user-logging-output (0 references)
  173. num target prot opt source destination
  174.  
  175. Chain ufw-user-output (1 references)
  176. num target prot opt source destination
  177. 1 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:3002
  178. 2 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:3002
  179. +++++++++++++++++++++++++++++++++++++++++++++
  180. команда
  181. iptables -t nat -L
  182. +++++++++++++++++++++++++++++++++++++++++++++
  183. Chain PREROUTING (policy ACCEPT)
  184. target prot opt source destination
  185.  
  186. Chain INPUT (policy ACCEPT)
  187. target prot opt source destination
  188.  
  189. Chain OUTPUT (policy ACCEPT)
  190. target prot opt source destination
  191.  
  192. Chain POSTROUTING (policy ACCEPT)
  193. target prot opt source destination
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement