Home > 備忘録(Fedora) > firewall > Direct Options( 140 )
firewall-cmd --permanent --direct --add-chain ipv4 filter INPUT_custom
firewall-cmd --permanent --direct --add-chain ipv4 filter LOG_PINGDEATH
firewall-cmd --permanent --direct --add-chain ipv4 filter port-scanfirewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 0 -m set --match-set BLACKLIST src -j DROPfirewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 0 -m set ! --match-set WHITELIST src -j DROPfirewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 1 -p tcp --dport 22 -j ACCEPTfirewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 1 -p tcp --dport 80 -j ACCEPTfirewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 1 -p tcp --dport 443 -j ACCEPTfirewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 1 -p tcp --dport 123 -j ACCEPTfirewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 1 -p tcp --dport 22 -m set --match-set WHITELIST src -j ACCEPTfirewall-cmd --permanent --direct --add-rule ipv4 nat PREROUTING 0 -p tcp --dport 80 -j DNAT --to 192.168.1.10:80firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 1 -p tcp -m multiport --dport 22,80,443,123 -j ACCEPTfirewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 1 -p udp -m multiport --dport 3478:3481,50000:60000 -j ACCEPT
firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 1 -p tcp -m multiport --dport 1000:10000,50000:65000,16000:26000 -j ACCEPTfirewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 1 -p tcp --tcp-flags ALL NONE -j DROPfirewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 1 -p tcp ! --syn -m state --state NEW -j DROPfirewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 1 -p tcp --tcp-flags ALL ALL -j DROPfirewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 1 -i lo -j ACCEPTfirewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 0 -m pkttype --pkt-type multicast -j DROPfirewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 0 -m state --state INVALID -j DROP
firewall-cmd --permanent --direct --add-rule ipv4 filter FORWARD 0 -m state --state INVALID -j DROP
firewall-cmd --permanent --direct --add-rule ipv4 filter OUTPUT 0 -m state --state INVALID -j DROPfirewall-cmd --permanent --direct --add-chain ipv4 filter port-scan
firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 1 -i wlp2s0 -p tcp --tcp-flags SYN,ACK,FIN,RST SYN -j port-scan
firewall-cmd --permanent --direct --add-rule ipv4 filter port-scan 1 -m limit --limit 1/s --limit-burst 4 -j RETURN
firewall-cmd --permanent --direct --add-rule ipv4 filter port-scan 1 -j LOG --log-prefix "IPTABLES PORT-SCAN:"
firewall-cmd --permanent --direct --add-rule ipv4 filter port-scan 1 -j DROP