当前位置:网站首页>Hedhat firewall
Hedhat firewall
2022-07-05 01:11:00 【weixin_ fifty-one million four hundred and twenty-eight thousan】
The firewall will read the configured policy rules from top to bottom , Immediately after the match is found, the matching work is finished and the behavior defined in the match is executed ( To release or prevent ). If there is no match after reading all the policy rules , Go ahead and implement the default strategy . generally speaking , There are two kinds of firewall policy rules :“ through ”( Let's go ) and “ Block up ”( That is to prevent ). When the default policy of firewall is reject ( Block up ), It's about setting the allow rule ( through ), Otherwise no one can come in ; If the default policy of the firewall is allow , It's about setting rejection rules , Otherwise everyone can come in , Firewall also lost the role of prevention .
iptables The service refers to the policy entries used to process or filter traffic as rules , Multiple rules can form a rule chain , The rule chain is classified according to the location of packet processing , As follows :
Process packets before routing (PREROUTING);
Process incoming packets (INPUT);
Process outgoing packets (OUTPUT);
Process forwarded packets (FORWARD);
Process packets after routing (POSTROUTING).
Generally speaking , The traffic sent from the intranet to the Internet is generally controllable and benign , So the most used is INPUT Rule chain , The rule chain can make it more difficult for hackers to invade the intranet from the external network .
For example, in the community where you live , Property management companies have two provisions : Prohibit hawkers from entering the community ; All kinds of vehicles must be registered when entering the community . Obvious , These two rules should be applied to the front door of the community ( Where the flow must pass ), Not on the security door of every house . According to the matching order of firewall policies mentioned above , There may be many situations . such as , The visitors are vendors , Will be directly rejected by the security of the property company , There is no need to register the vehicle . If visitors enter the main gate of the community in a car , be “ Prohibit hawkers from entering the community ” The first rule of is not matched , So match the second strategy in order , That is, the vehicle needs to be registered . If you are a community resident, you need to enter the main entrance , Then these two provisions will not match , Therefore, the default release policy will be implemented .
however , Only policy rules cannot guarantee the safety of the community , The security guard should also know what actions to take to deal with these matching traffic , such as “ allow ”“ Refuse ”“ registration ”“ Ignore it ”. These actions correspond to iptables The terms of service are ACCEPT( Allow flow through )、REJECT( Reject traffic through )、LOG( Logging information )、DROP( Reject traffic through ).“ Allow flow through ” and “ Logging information ” It's easy to understand , What needs to be emphasized here is REJECT and DROP The difference between . Just DROP Come on , It directly discards traffic and does not respond ;REJECT Then it will reply one more message after rejecting the traffic “ The message has been received , But it was thrown away ” Information , So that the traffic sender can clearly see the response information of data rejected .
边栏推荐
- Hand drawn video website
- 那些一门心思研究自动化测试的人,最后都怎样了?
- Apifox (postman + swagger + mock + JMeter), an artifact of full stack development and efficiency improvement
- Ruby tutorial
- Database postragesql client authentication
- 当产业互联网时代真正发展完善之后,将会在每一个场景见证巨头的诞生
- 【Unity】InputSystem
- Mongodb series learning notes tutorial summary
- Database performance optimization tool
- Insert sort of sort
猜你喜欢
Delaying wages to force people to leave, and the layoffs of small Internet companies are a little too much!
Database performance optimization tool
Armv8-a programming guide MMU (3)
SAP UI5 应用开发教程之一百零七 - SAP UI5 OverflowToolbar 容器控件介绍的试读版
Yyds dry goods inventory kubernetes management business configuration methods? (08)
Yyds dry goods inventory [Gan Di's one week summary: the most complete and detailed in the whole network]; detailed explanation of MySQL index data structure and index optimization; remember collectio
pycharm专业版下载安装教程
Basic operations of database and table ----- create index
Call Huawei order service to verify the purchase token interface and return connection reset
7. Scala process control
随机推荐
小程序直播 + 电商,想做新零售电商就用它吧!
Check if this is null - checking if this is null
SAP UI5 应用开发教程之一百零六 - 如何提高 SAP UI5 应用路由 url 的可读性试读版
Take you ten days to easily complete the go micro service series (IX. link tracking)
Behind the cluster listing, to what extent is the Chinese restaurant chain "rolled"?
Mongodb series learning notes tutorial summary
MongoDB系列之学习笔记教程汇总
7. Scala process control
[development of large e-commerce projects] performance pressure test - Performance Monitoring - heap memory and garbage collection -39
What if the programmer's SQL data script coding ability is weak and Bi can't do it?
dotnet-exec 0.6.0 released
Arbitrum:二维费用
無心劍英譯席慕容《無怨的青春》
Discrete mathematics: reasoning rules
[STM32] (I) overview and GPIO introduction
Basic operations of database and table ----- create index
测试部新来了个00后卷王,上了年纪的我真的干不过了,已经...
Four pits in reentrantlock!
node工程中package.json文件作用是什么?里面的^尖括号和~波浪号是什么意思?
Database postragesql lock management