Criando regras simples com IP6Tables
Este artigo demonstra como configurar regras de Firewall, usando o IP6Tables.
[ Hits: 19.168 ]
Por: Alex Vitola em 30/08/2013 | Blog: http://www.vitola.net.br
ip6tables v1.4.7: can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?) Perhaps ip6tables or your kernel needs to be upgraded.Já o comando:
Chain PREROUTING (policy ACCEPT) target prot opt source destination Chain INPUT (policy ACCEPT) target prot opt source destination Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain POSTROUTING (policy ACCEPT) target prot opt source destination
# Firewall configuration written by system-config-firewall *filter # Configurando a politica padrao :INPUT DROP [0:0] :FORWARD DROP [0:0] :OUTPUT DROP [0:0] # Permitir ICMPv6 de qualquer local -A INPUT -p ipv6-icmp -j ACCEPT # Permitir qualquer coisa no loopback -A INPUT -i lo -j ACCEPT # Permitir Statefull -A INPUT -i sixxs -m state --state RELATED,ESTABLISHED -j ACCEPT # Filtrar todos os pacotes que tem cabeçalhos RH0 -A INPUT -m rt --rt-type 0 -j DROP # Permitir enderecos Link-Local -A INPUT -s fe80::/10 -j ACCEPT # Permitir multicast -A INPUT -d ff00::/8 -j ACCEPT # Permitir ICMPv6 de qualquer local -A FORWARD -p ipv6-icmp -j ACCEPT # Filtrar todos os pacotes que tem cabeçalhos RH0 -A FORWARD -m rt --rt-type 0 -j DROP # Permitir o forwarding para minha subrede -A FORWARD -s 2001:0000:2d2::/48 -i eth0 -o sixxs -m state --state NEW -j ACCEPT # Permitir Statefull -A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT # Permitir SSH, HTTP e HTTPs -A INPUT -d 2001:0000:2d2::254/128 -i eth0 -p tcp -m tcp --dport 22 -j ACCEPT -A INPUT -d 2001:0000:2d2::254/128 -i eth0 -p tcp -m tcp --dport 80 -j ACCEPT -A INPUT -d 2001:0000:2d2::254/128 -i eth0 -p tcp -m tcp --dport 443 -j ACCEPT # Permitir ICMPv6 de qualquer local -A OUTPUT -p ipv6-icmp -j ACCEPT # Permitir qualquer coisa no loopback -A OUTPUT -o lo -j ACCEPT # Permitindo qualquer saida para a Internet -A OUTPUT -o sixxs -j ACCEPT # Filtrar todos os pacotes que tem cabeçalhos RH0 -A OUTPUT -m rt --rt-type 0 -j DROP # Permitir enderecos Link-Local -A OUTPUT -s fe80::/10 -j ACCEPT # Permitir multicast -A OUTPUT -d ff00::/8 -j ACCEPT # Permitindo qualquer saida -A OUTPUT -o eth0 -j ACCEPT COMMITPara listar as regras, você pode usar o ip6tables-save, ou o ip6tables -L -n:
Chain INPUT (policy DROP) target prot opt source destination ACCEPT icmpv6 ::/0 ::/0 ACCEPT all ::/0 ::/0 ACCEPT all ::/0 ::/0 state RELATED,ESTABLISHED DROP all ::/0 ::/0 rt type:0 ACCEPT all fe80::/10 ::/0 ACCEPT all ::/0 ff00::/8 ACCEPT tcp ::/0 2001:0000:2d2::254/128 tcp dpt:22 ACCEPT tcp ::/0 2001:0000:2d2::254/128 tcp dpt:80 ACCEPT tcp ::/0 2001:0000:2d2::254/128 tcp dpt:443 Chain FORWARD (policy DROP) target prot opt source destination ACCEPT icmpv6 ::/0 ::/0 DROP all ::/0 ::/0 rt type:0 ACCEPT all 2001:0000:2d2::/48 ::/0 state NEW ACCEPT all ::/0 ::/0 state RELATED,ESTABLISHED Chain OUTPUT (policy DROP) target prot opt source destination ACCEPT icmpv6 ::/0 ::/0 ACCEPT all ::/0 ::/0 ACCEPT all ::/0 ::/0 DROP all ::/0 ::/0 rt type:0 ACCEPT all fe80::/10 ::/0 ACCEPT all ::/0 ff00::/8 ACCEPT all ::/0 ::/0
Observium - Monitoramento de Rede
Cliente Nagios no Windows - Instalação e Configuração
PABX IP Asterisk - Instalação no Debian/Ubuntu
Configurando Placa Wireless Broadcom BCM43142 no SlackWare 14.2
Transforme seu PC em um roteador Wi-Fi com Hostapd em modo Bridged
Atualizando o Passado: Linux no Lenovo G460 em 2025
aaPanel - Um Painel de Hospedagem Gratuito e Poderoso
O macete do Warsaw no Linux Mint e cia
O que você quer para sua vida ao usar o Linux?
Visualizar arquivos em formato markdown (ex.: README.md) pelo terminal
Dando - teoricamente - um gás no Gnome-Shell do Arch Linux