0% found this document useful (0 votes)
87 views9 pages

Ip Tables: Presented By)

Iptables is a tool used to configure firewall rules and network address translation (NAT) in the Linux kernel. It contains several tables (filter, nat, mangle) that each have built-in chains and user-defined chains containing rules. Rules specify matching criteria for packets and a target action. If a packet matches a rule, the next rule in the chain is determined by the target. The iptables command is used to list, add, delete, and modify rules across these tables and chains. Common options specify the table, chain, protocol, ports, and IP addresses to configure packet filtering and NAT rules.

Uploaded by

Mamoon Mohd
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views9 pages

Ip Tables: Presented By)

Iptables is a tool used to configure firewall rules and network address translation (NAT) in the Linux kernel. It contains several tables (filter, nat, mangle) that each have built-in chains and user-defined chains containing rules. Rules specify matching criteria for packets and a target action. If a packet matches a rule, the next rule in the chain is determined by the target. The iptables command is used to list, add, delete, and modify rules across these tables and chains. Common options specify the table, chain, protocol, ports, and IP addresses to configure packet filtering and NAT rules.

Uploaded by

Mamoon Mohd
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

IP TABLES

Presented by
MOHD MUKEEM( 08CSS42 )
MOHD MUDASSIR(08CSS41)
What is iptable?
 Description :---
• Iptables is used to set up and maintain the tables for ip
packet filter rules in the linux kernel
• Several tables are defined.
• each tables contains built-in chain.
• There may be also user define.
• Each chain has the list of rules
which can match with the set of packet.
• Each rules specified what to do with the matching
packets. This is called the “TARGET”.
TARGET:-
• Firewall specified the criteria for the packet and the
target.

• If the packet does not matches then the next rule


is examined in the chain .if it does matches then the
next rule in the ipchain is specified by the value of the
target.
• These ipchain may be user define ipchain or built-in
ipchain such as INPUT ,OUTPUT,PREROUTING.
Iptable:--
 The iptable command is used in the following form.
“iptabble –t or iptable –table followed by the ipchain name
INPUT ,OUTPUT etc.
• There are thee type of the iptables

1. filter :--
• This is the default table when no –t option is uesd
• It has three built-in chain
1) INPUT :-- for packet destined to local socket.
2) FORWARD :-- for packet being routed through the box.
3) OUTPUT:-- For the packet which generated locally.
 NAT(Network address translation)
 This table is used when the new connection is
created.
 There is three type of the built chain
1. PREROUTING:-- for altering the as soon as they
come.
2. POSROUTING:-- for altering the packet as they
are about to go.
3. OUTPUT:-- for altering locally generated packet.
4. the following commands are used to list all the
rules in the iptables
Iptables -L
Iptables -L –t nat
Iptables -L –t mangle
Iptable(conti….)
Mangle :--
 this table is used to modify the specialized packets.
 Kernel 2.4.17 has two built-in chain(PRERUOTING and
OUTPUT) while kernel 2.4.18 has three more built-in chain
(INPUT ,POSTROUTING and FORWARD)
PREROUTING:--for modification of the incoming packet
before the routing.
OUTPUT:-- for modification of locally generated packet
before the routing.
INPUT :--for modification of incoming packet into the box
itself.
FORWARD:-- for altering the packet being routed through
the box.
POSTROUTING:-- for altering the packet as they are
about to go.
Implementation :--
commands:-
Short form
Short form Long form
iptables -L iptables --list
iptables -A iptables --append
iptables -D iptables --delete
iptables -R iptables --replace
iptables -F iptables --flush
iptables -N iptables –new-chain
iptables –E old-chain new-chain iptables –rename chain
iptables -h iptables –help
iptables –X chain iptables –delete-chain
commands (conti…) :-
Short form
Short form Long form
iptables -p protocol iptables –protocol protocol
iptables –-dport port add iptables –-destination -port
iptables –-sport port add. iptables -–source-port
iptables –s ip add iptables –-source
iptables –d ip add. iptables –destination
THE END

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy