iptables 下

来源:互联网 发布:专业打印照片软件 编辑:程序博客网 时间:2024/04/30 11:32

<!-- /* Font Definitions */ @font-face{font-family:Wingdings;panose-1:5 0 0 0 0 0 0 0 0 0;mso-font-charset:2;mso-generic-font-family:auto;mso-font-pitch:variable;mso-font-signature:0 268435456 0 0 -2147483648 0;}@font-face{font-family:宋体;panose-1:2 1 6 0 3 1 1 1 1 1;mso-font-alt:SimSun;mso-font-charset:134;mso-generic-font-family:auto;mso-font-pitch:variable;mso-font-signature:3 680460288 22 0 262145 0;}@font-face{font-family:"Comic Sans MS";panose-1:3 15 7 2 3 3 2 2 2 4;mso-font-charset:0;mso-generic-font-family:script;mso-font-pitch:variable;mso-font-signature:647 0 0 0 159 0;}@font-face{font-family:楷体_GB2312;panose-1:0 0 0 0 0 0 0 0 0 0;mso-font-alt:黑体;mso-font-charset:134;mso-generic-font-family:modern;mso-font-format:other;mso-font-pitch:auto;mso-font-signature:1 135135232 16 0 262144 0;}@font-face{font-family:"/@宋体";panose-1:2 1 6 0 3 1 1 1 1 1;mso-font-charset:134;mso-generic-font-family:auto;mso-font-pitch:variable;mso-font-signature:3 680460288 22 0 262145 0;}@font-face{font-family:"/@楷体_GB2312";panose-1:0 0 0 0 0 0 0 0 0 0;mso-font-charset:134;mso-generic-font-family:modern;mso-font-format:other;mso-font-pitch:auto;mso-font-signature:1 135135232 16 0 262144 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal{mso-style-parent:"";margin:0cm;margin-bottom:.0001pt;text-align:justify;text-justify:inter-ideograph;mso-pagination:none;font-size:10.5pt;mso-bidi-font-size:12.0pt;font-family:"Times New Roman";mso-fareast-font-family:宋体;mso-font-kerning:1.0pt;} /* Page Definitions */ @page{mso-page-border-surround-header:no;mso-page-border-surround-footer:no;}@page Section1{size:595.3pt 841.9pt;margin:72.0pt 90.0pt 72.0pt 90.0pt;mso-header-margin:42.55pt;mso-footer-margin:49.6pt;mso-paper-source:0;layout-grid:15.6pt;}div.Section1{page:Section1;} /* List Definitions */ @list l0{mso-list-id:224293898;mso-list-type:hybrid;mso-list-template-ids:-1026391254 1392016648 -21994848 -106798788 -766448152 -1857778672 -1388309744 -1233369256 1883522570 1048894390;}@list l0:level1{mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:36.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l0:level2{mso-level-start-at:77;mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:72.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l1{mso-list-id:549613183;mso-list-type:hybrid;mso-list-template-ids:-1980982422 -803979616 -271545234 -686281214 1886146272 1956303740 -87524658 -720875200 2065846264 1034326402;}@list l1:level1{mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:36.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l1:level2{mso-level-start-at:112;mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:72.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l1:level3{mso-level-start-at:112;mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:108.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l2{mso-list-id:712923617;mso-list-type:hybrid;mso-list-template-ids:-1408595188 -257902308 -142808418 1852470998 -2114813890 1363956014 -491388894 -1820849368 1954289514 -1750564110;}@list l2:level1{mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:36.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l2:level2{mso-level-start-at:127;mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:72.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l3{mso-list-id:1024476255;mso-list-type:hybrid;mso-list-template-ids:1363571466 -1335352680 -1775604786 1428313756 -243627450 513292386 -1726811086 -1294582690 1659121126 1311286866;}@list l3:level1{mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:36.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l3:level2{mso-level-start-at:112;mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:72.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l4{mso-list-id:1091244735;mso-list-type:hybrid;mso-list-template-ids:656193542 1493310490 1933235966 1559666598 740316212 -514062160 -1431562924 -1425873564 -410909544 -1311623392;}@list l4:level1{mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:36.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l5{mso-list-id:1372000917;mso-list-type:hybrid;mso-list-template-ids:504166848 -42434534 -53999622 1759414212 -705152252 2028381194 -1440592038 -2082968896 -879070788 -1264523240;}@list l5:level1{mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:36.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l5:level2{mso-level-start-at:112;mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:72.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l5:level3{mso-level-start-at:112;mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:108.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l6{mso-list-id:1497724106;mso-list-type:hybrid;mso-list-template-ids:1349543988 214857314 -399111542 -1034108264 -93399824 1972560098 -701452558 381298334 -318092742 398730016;}@list l6:level1{mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:36.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l6:level2{mso-level-start-at:112;mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:72.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l7{mso-list-id:1515412494;mso-list-type:hybrid;mso-list-template-ids:-1012214970 -1515289570 121672454 -470263142 1045349178 496936628 -492389820 1905419762 1618651480 2022222;}@list l7:level1{mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:36.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l8{mso-list-id:1731461727;mso-list-type:hybrid;mso-list-template-ids:880831798 606339140 1742230694 -556999968 1570692048 1983271070 748467574 332275766 212869528 963542736;}@list l8:level1{mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:36.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l8:level2{mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:72.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l9{mso-list-id:1741253238;mso-list-type:hybrid;mso-list-template-ids:63860068 96388636 -1657902360 -1603396004 236901612 -147957624 -1243312890 -1720414736 -1739008734 -164605428;}@list l9:level1{mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:36.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l10{mso-list-id:1753701595;mso-list-type:hybrid;mso-list-template-ids:597068776 -1517760288 -561709414 531002374 -1614884362 1803576284 -1902491686 -693843536 54445176 -1265062396;}@list l10:level1{mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:36.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l11{mso-list-id:2007048042;mso-list-type:hybrid;mso-list-template-ids:-901891306 788178950 1508950954 -737231752 -339545034 1777136150 -986777170 779782238 319079150 -1313166934;}@list l11:level1{mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:36.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l11:level2{mso-level-start-at:112;mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:72.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l11:level3{mso-level-start-at:112;mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:108.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l12{mso-list-id:2042511534;mso-list-type:hybrid;mso-list-template-ids:1219555038 1815372436 1044812234 1833729816 1631848320 911513678 1507480938 1300119006 -628839266 -815487782;}@list l12:level1{mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:36.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l13{mso-list-id:2047826078;mso-list-type:hybrid;mso-list-template-ids:-503270686 -145195398 -1754646922 -989927786 -1260110584 -1343067624 -1484761854 -1965781080 -1572408382 221948602;}@list l13:level1{mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:36.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l13:level2{mso-level-start-at:112;mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:72.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l14{mso-list-id:2076052359;mso-list-type:hybrid;mso-list-template-ids:-250192806 1439965132 418924696 1651030058 -602091500 72012342 -386627386 -2012730654 -2086513058 -1066924710;}@list l14:level1{mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:36.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l14:level2{mso-level-start-at:112;mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:72.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l14:level3{mso-level-start-at:112;mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:108.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l15{mso-list-id:2093156858;mso-list-type:hybrid;mso-list-template-ids:-473894548 1006261262 44341328 -1109492768 -1453059240 -1697066628 -54614872 1138239102 -130380162 264136534;}@list l15:level1{mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:36.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l15:level2{mso-level-start-at:112;mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:72.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l16{mso-list-id:2124038080;mso-list-type:hybrid;mso-list-template-ids:-1202156484 2029542204 -1597457228 -480752178 1097470720 1683642928 955693238 -1051825050 -602791582 -146353134;}@list l16:level1{mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:36.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l16:level2{mso-level-start-at:77;mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:72.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l17{mso-list-id:2128113501;mso-list-type:hybrid;mso-list-template-ids:956219200 -1318026478 -385698376 -311243798 1403035608 -1340975884 -1764983056 780844282 1982737440 1346288226;}@list l17:level1{mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:36.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l17:level2{mso-level-start-at:112;mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:72.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}@list l17:level3{mso-level-start-at:112;mso-level-number-format:bullet;mso-level-text:;mso-level-tab-stop:108.0pt;mso-level-number-position:left;text-indent:-18.0pt;font-family:Wingdings;}ol{margin-bottom:0cm;}ul{margin-bottom:0cm;}-->

                                                 Iptables l7应用层过滤

好的,上次我们简单的讨论了下iptales的用法,其中有很多的用法我们都还没说,例如非常重要的SNAT ,DNAT转换,字符匹配过滤,同是定义多端口,最大连接数限制,访问时间限制,匹配速率限制,还有就是现在企业中经常要用到的l7layer应用层过滤!!下面我们来讨论这些非常重要有用但是又很具挑战难度的东东

 

主要内容

iptables的实践应用,L7应用层过滤

目标:

              熟练应用ipatbles的用法,要做到烂熟于心

 

我们接着上次继续探讨iptables更深层的用法。这次我们基于上次的理论介绍主要通过实验来熟悉每个命令的用法.

 

实验环境:

              内网210.0.2.100      telnet   vsftp    http

              内网110.0.1.100

              外网:10.0.3.100       

firewalleth010.0.2.1   eth110.0.3.1  ssh

SNAT DNAT

Ü     SNAT

Ü     --to-source   IPport

Ü     DNAT

Ü     --to-destination IP:port

路由测试

              [root@station93 ~]# sysctl -p

net.ipv4.ip_forward = 1

NAT转换测试:

外网访问iptables10.0.3.1端口时,iptables均把地址DNAT成内网10.0.2.100服务器的httpd服务,注意,这里外网不知道内网有10.0.2.100这个地址,只知道10.0.3.1

       DNAT 转换;==========》一个IP可实现多个功能

[root@station93 ~]# iptables-t  nat -A  PREROUTING  -s 10.0.3.100 -d 10.0.3.1 -p tcp --dport 80 -j DNAT--to-dest 10.0.2.100

[root@station93 ~]# iptables-t  nat -A  PREROUTING  -s 10.0.3.100 -d 10.0.3.1 -p tcp --dport 22 -j DNAT --to-dest 10.0.1.100

SNAT转化测试:=========è内网用户只需要一个IP地址即可全部上网

       内网用户通过iptables外网网关实现SNAT转化的功能

[root@station93 ~]# iptables  -t  nat-A  POSTROUTING  -s 10.0.2.100 -p tcp --dport 80 -j SNAT--to-source 10.0.3.1

[root@3 httpd]# tailaccess_log============》这里查看日志时我们会法相其实是10.0.3.1来访问外网服务器的,即iptables的外网网关

10.0.3.1 - -[09/Mar/2010:20:43:59 +0800] "GET / HTTP/1.1" 403 3985 "-" "ELinks/0.11.1(textmode; Linux; 77x24-2)"

 

 

基于状态的限制

v     -m state

Ü     NEW

Ü     ESTABLISHED

Ü     RELATED

Ü     INVALID

 

只允许3.100访问2.100web服务,不允许2.100自发的回应3.100

       主要用来防止本机中毒,自发的向外发出信息泄密

[root@station93 ~]# iptables  -A FORWARD -s 10.0.3.100 -d 10.0.2.100  -p tcp --dport 80 -m state --state NEW,ESTABLISHED -j ACCEPT

[root@station93 ~]# iptables -R FORWARD 2-s 10.0.2.100 -d 10.0.3.100 -p tcp --sport 80-m  state --state ESTABLISHED,RELATED -j ACCEPT

测试

[root@3 ~]# elinks 10.0.2.100           ======》出现测试页

 

[root@2 ~]# elinks 10.0.3.100         ========》失败

 

 

v      -m multiport

Ü     --source-portsport1,port2,port3,…

Ü     --destination-portsport1,port2,port3,…

Ü     --ports port1,port2,port3,…

 

 

 

企业中防火墙的实际应用

在实际的企业应用中,我们以上学习的iptables只是使远远不够的,举个简单的例子,我们在平时的工作中往往需要限制qqmsn,迅雷,快车等聊天下载工具的使用,而我们以上学的都是写非常简单点的限制,而这这些工具的服务器的众多,端口多变,我们通过普通的方法是很难控制住的,银次我们需要给予Layer的第七层应用的控制,这里我们需要重新编译升级内核。

      需要的软件包:

v      The 2.4 or 2.6 Linux kernel source (2.6 strongly preferred) fromkernel.org

v      The iptables source from netfilter.org

v      "l7-filter kernel version" package(netfilter-layer7-vX.Y.tar.gz)

v      "Protocol definitions"package (l7-protocols-YYYY-MM-DD.tar.gz)

 

步骤如下:

 

Ü     #tar zxvf  linux-2.6.28.10.tar.gz  -C /usr/src

Ü     # tar zxvf  netfilter-layer7-v2.22.tar.gz  -C /usr/src

Ü     #ln –s  /usr/src/linux-2.6.28.10/   /usr/src/linux

Ü     # cd /usr/src/linux/

Ü     # patch -p1  < ../netfilter-layer7-v2.22/kernel-2.6.25-2.6.28-layer7-2.22.patch

# cp /boot/config-2.6.18-164.el5  /usr/src/linux/.config

# make menuconfig            这里我们需要实现安装好对应的开发包  pirut & 命令编辑

 

我们需要选择好下面的这些模块:

v      Networking support Networking Options Network packet filtering framework Code Netfilter Configuration

 

Ü     <M>  Netfilter connectiontracking support

Ü     <M>  “layer7” match support

Ü     <M>  “string” match support

Ü      <M>  FTP protocol support

Ü     <M>  “time” match support

Ü     <M>  “iprange” match support

Ü     <M>  “connlimit” match support

Ü     <M>  “state” match support

Ü     <M>  “conntrack” connection  match support

Ü     <M>  “mac” address  match support

Ü     <M>   "multiport" Multiple port matchsupport

 

 

 

v      Networking support Networking Options Network packet filtering framework IP: Netfilter Configuration

Ü     <M> IPv4 connectiontracking support (required for NAT)

Ü     <M>   Full NAT

î     <M>     MASQUERADE target support                                                                                  <M>     NETMAP targetsupport                                                                              <M>     REDIRECT targetsupport

 

v      Start compiling and installing

Ü     make

Ü     make modules_install

Ü     make install

 

v      Edit the /boot/grub/grub.conf, set the default booting kernel to thenew kernel

v      Restart

v      # cp /etc/rc.d/init.d/iptables ~/iptables

v      # rpm  -e  iptables-ipv6 iptables  iptstate  --nodeps

v      # tar jxvf iptables-1.4.6.tar.bz2 –C /usr/src

v      # cd /usr/src/iptables-1.4.6

v      # cp ../netfilter-layer7-v2.22/iptables-1.4.3forward-for-kernel-2.6.20forward/libxt_layer7.*   ./extensions/

v      ./configure --prefix=/usr --with-ksource=/usr/src/linux

v      make

v      make install

v      # tar zxvfl7-protocols-2009-05-28.tar.gz

v      # cd l7-protocols-2009-05-28

v      # make install

 

v      # mv ~/iptables  /etc/rc.d/init.d/

v      #ln –sv /usr/sbin/iptables  /sbin/iptables

v     注意这里第一次启动无法service iptables start 需要先setup,再service iptables start

2.6.28.10 内核中 ip_conntrack_ftp  改名为 nf_conntrack_ftp

  加模块:  modprobe nf_conntrack_ftp

支持的协议种类:

v      bittorrent

Ü     P2P filesharing / publishingtool

v      edonkey

Ü     eDonkey2000 - P2P filesharing

v      kugoo

Ü     KuGoo - a Chinese P2P program

v      msn-filetransfer

Ü     MSN (Micosoft Network)Messenger file transfers

v      msnmessenger

Ü     Microsoft Network chat client

v      pplive

Ü     Chinese P2P streaming video

v      qq

v      xunlei

用法

Ü     iptables [specify table & chain] -m layer7--l7proto [protocol name] -j [action]

 

 

禁止外网访问firewallweb sshtelnet服务

[root@station93~]# iptables -A INPUT -p tcp  -m multiport --source-ports 22,25,80 -jDROP

      

v      connlimit                      

v      [!] --connlimit-above n          最大连接数

Ü     Allows you to restrict thenumber of parallel connections to a server per client IP address (or clientaddress block).

Ü      Example:

î     iptables -A INPUT -p tcp --syn--dport 22 -m connlimit --connlimit-above 2 -j REJECT

î     Allow 2 ssh connections perclient host

限制外网的最大连接数是2

[root@station93~]# iptables -A OUTPUT  -p tcp --syn--dport 22 -m connlimit--connlimit-above 2 -j REJECT

 

v      String

Ü      有两种算法:bm  kmp

Ü     This modules matches a givenstring by using some pattern matching strategy.

Ü     It requires a linux kernel>= 2.6.14.

Ü     [!] --string pattern

î     Matches the given pattern.

Ü     --algo {bm|kmp}

î     Select the pattern matchingstrategy. (bm = Boyer-Moore, kmp = Knuth-Pratt-Morris)

Ü     Examples:

î     iptables –A OUTPUT –p udp  --dport 53  -m string --string“verycd”  --algo bm  -j DROP

î     iptables  -A OUTPUT  -p tcp  --dport 80  -m string  --string 法轮功  --algo kmp  -j  DROP

限制内网浏览外网上包含secert 字符串的网页:

       [root@3 html]# echo"secert" >> index2.html

[root@3 html]# cat index2.html

secret

this  is the second test

secret

 

[root@station93 ~]# iptables -A FORWARD -s 10.0.2.100 -d 10.0.3.100-p tcp --sport 80 -m string --string "secert" --algo bm -jDROP

v      time

Ü     This matches if the packetarrival time/date is within a given range.

Ü     --datestart YYYY[-MM[-DD[Thh[:mm[:ss]]]]]

Ü     --datestopYYYY[-MM[-DD[Thh[:mm[:ss]]]]]

î     Only  match during  the given time, Thepossible time range is 1970-01-01 T00:00:00 to 2038-01-19 T04:17:07

Ü     --timestart hh:mm[:ss]

Ü     --timestop hh:mm[:ss]

î     The possible time range is00:00:00 to 23:59:59.

î      Leading zeroes are allowed.

v      time

Ü     [!] --monthdays day[,day...]

î     Only  match on  the  given days of the month. Possible values are1 to 31.

Ü     [!] --weekdays day[,day...]

î     Only match on the givenweekdays. Possible values are Mon, Tue, Wed, Thu, Fri, Sat, Sun, or values from1 to  7, respectively.

Ü     Examples:

î     -m time --weekdays Sa,Su

î     -m time --timestart 12:30--timestop 13:30

 

[root@station93~]# iptables -A FORWARD  -m time --timestart 00:00 --timestop 8:00  -j DROP

 

v      -j LOG

Ü      --log-level level

î     Level of logging

Ü      --log-prefix prefix

î     Prefix log messages with thespecified prefix; up to 29 letters long, and useful for distinguishing messagesin the logs.

Ü     --log-tcp-options

î     Log options from the TCP packetheader.

Ü     --log-ip-options

î     Log options from the IP packetheader.

 

[root@station93~]# iptables -A FORWARD  -s  10.0.3.100 –d 10.0.2.100 –p tcp –dport -j  LOG --log-prefix "abc"

 

 

基于l7layer的规则则十分类似,在其内部已经为我们定义好,我们只需要调用其就行了。

例如:禁止内网用户在上班时间使用qq

 

[root@station93 ~]# iptables -A FORWARD -s 10.0.2.100 -d10.0.3.100 -p tcp --dport 80 -m time --timestart 8:00 --timestop 18:00  -m layer7 --l7proto qq   -j DROP

 

 

 

原创粉丝点击