Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- $ iptables -L -n
- Chain INPUT (policy DROP)
- target prot opt source destination
- fail2ban-ssh tcp -- 0.0.0.0/0 0.0.0.0/0 multiport dports 22
- ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
- ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0
- ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
- REJECT all -- 0.0.0.0/0 127.0.0.0/8 reject-with icmp-port-unreachable
- ACCEPT all -- 107.170.58.141 0.0.0.0/0
- ACCEPT all -- 10.128.48.203 0.0.0.0/0
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 ctstate NEW
- ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 ctstate NEW
- LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 5/min burst 5 LOG flags 0 level 4 prefix "IPTables Dropped: "
- ACCEPT all -- 107.170.58.141 0.0.0.0/0
- Chain FORWARD (policy DROP)
- target prot opt source destination
- ACCEPT tcp -- 0.0.0.0/0 172.17.0.2 tcp dpt:8080
- ACCEPT tcp -- 0.0.0.0/0 172.17.0.2 tcp dpt:29015
- ACCEPT tcp -- 0.0.0.0/0 172.17.0.2 tcp dpt:28015
- Chain OUTPUT (policy ACCEPT)
- target prot opt source destination
- Chain fail2ban-ssh (1 references)
- target prot opt source destination
- RETURN all -- 0.0.0.0/0 0.0.0.0/0
- $ iptables-save
- # Generated by iptables-save v1.4.21 on Sat Apr 26 04:36:53 2014
- *filter
- :INPUT DROP [0:0]
- :FORWARD DROP [55:3276]
- :OUTPUT ACCEPT [1258:161636]
- :fail2ban-ssh - [0:0]
- -A INPUT -p tcp -m multiport --dports 22 -j fail2ban-ssh
- -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
- -A INPUT -p icmp -j ACCEPT
- -A INPUT -i lo -j ACCEPT
- -A INPUT -d 127.0.0.0/8 -j REJECT --reject-with icmp-port-unreachable
- -A INPUT -s 107.170.58.141/32 -j ACCEPT
- -A INPUT -s 10.128.48.203/32 -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 80 -m conntrack --ctstate NEW -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 443 -m conntrack --ctstate NEW -j ACCEPT
- -A INPUT -m limit --limit 5/min -j LOG --log-prefix "IPTables Dropped: "
- -A INPUT -s 107.170.58.141/32 -j ACCEPT
- -A FORWARD -d 172.17.0.2/32 ! -i docker0 -o docker0 -p tcp -m tcp --dport 8080 -j ACCEPT
- -A FORWARD -d 172.17.0.2/32 ! -i docker0 -o docker0 -p tcp -m tcp --dport 29015 -j ACCEPT
- -A FORWARD -d 172.17.0.2/32 ! -i docker0 -o docker0 -p tcp -m tcp --dport 28015 -j ACCEPT
- -A fail2ban-ssh -j RETURN
- COMMIT
- # Completed on Sat Apr 26 04:36:53 2014
- # Generated by iptables-save v1.4.21 on Sat Apr 26 04:36:53 2014
- *nat
- :PREROUTING ACCEPT [12:696]
- :INPUT ACCEPT [0:0]
- :OUTPUT ACCEPT [90:5400]
- :POSTROUTING ACCEPT [93:5588]
- :DOCKER - [0:0]
- -A PREROUTING -m addrtype --dst-type LOCAL -j DOCKER
- -A OUTPUT ! -d 127.0.0.0/8 -m addrtype --dst-type LOCAL -j DOCKER
- -A POSTROUTING -s 172.17.0.0/16 ! -d 172.17.0.0/16 -j MASQUERADE
- -A DOCKER ! -i docker0 -p tcp -m tcp --dport 28015 -j DNAT --to-destination 172.17.0.2:28015
- -A DOCKER ! -i docker0 -p tcp -m tcp --dport 29015 -j DNAT --to-destination 172.17.0.2:29015
- -A DOCKER ! -i docker0 -p tcp -m tcp --dport 8080 -j DNAT --to-destination 172.17.0.2:8080
- COMMIT
- # Completed on Sat Apr 26 04:36:53 2014
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement