linux – Iptables忽略配置文件中的规则

前端之家收集整理的这篇文章主要介绍了linux – Iptables忽略配置文件中的规则前端之家小编觉得挺不错的,现在分享给大家,也给大家做个参考。
@H_404_1@我从ip 188.241.114.22看到很多与我的apache服务器建立的连接,最终导致apache挂起.重新启动服务后,一切正常.
我尝试在iptables中添加规则
  1. -A INPUT -s 188.241.114.22 -j DROP

但尽管如此,我仍然看到来自该IP的连接.
我正在使用centOS,我正在添加像你这样的规则:

  1. iptables -A INPUT -s 188.241.114.22 -j DROP

正好我用它来保存它:service iptables save
这是iptables -L -v的输出

  1.  
  2. Chain INPUT (policy ACCEPT 120K packets,16M bytes)
  3.  
  4. pkts bytes target prot opt in out source destination
  5. 0 0 DROP all -- any any lg01.mia02.pccwbtn.net anywhere
  6. 0 0 DROP all -- any any c-98-210-5-174.hsd1.ca.comcast.net anywhere
  7. 0 0 DROP all -- any any c-98-201-5-174.hsd1.tx.comcast.net anywhere
  8. 0 0 DROP all -- any any lg01.mia02.pccwbtn.net anywhere
  9. 0 0 DROP all -- any any www.dabacus2.com anywhere
  10. 0 0 DROP all -- any any 116.255.163.100 anywhere
  11. 0 0 DROP all -- any any 94.23.119.11 anywhere
  12. 0 0 DROP all -- any any 164.bajanet.mx anywhere
  13. 0 0 DROP all -- any any 173-203-71-136.static.cloud-ips.com anywhere
  14. 0 0 DROP all -- any any v1.oxygen.ro anywhere
  15. 0 0 DROP all -- any any 74.122.177.12 anywhere
  16. 0 0 DROP all -- any any 58.83.227.150 anywhere
  17. 0 0 DROP all -- any any v1.oxygen.ro anywhere
  18. 0 0 DROP all -- any any v1.oxygen.ro anywhere
  19.  
  20. Chain FORWARD (policy ACCEPT 0 packets,0 bytes)
  21. pkts bytes target prot opt in out source destination
  22.  
  23. Chain OUTPUT (policy ACCEPT 186K packets,224M bytes)
  24. pkts bytes target prot opt in out source destination

解决方法

命令iptables -A INPUT在INPUT链的末尾添加一个新规则. Iptables在第一个匹配原则上工作,因此您可能有规则允许在链中较早的端口80上访问.

使用a保存iptables的状态

服务iptables保存
然后编辑/ etc / sysconfig / iptables文件并将-A INPUT -s 188.241.114.22 -j DROP移动到允许端口80的行上方.保存文件并运行

service iptables restart

猜你在找的Linux相关文章