`
cakin24
  • 浏览: 1328107 次
  • 性别: Icon_minigender_1
  • 来自: 西安
社区版块
存档分类
最新评论

iptables规则中DNAT规则设置

阅读更多
一 场景模拟


 
 
二 规则配置
[root@localhost ~]# iptables -t nat -A PREROUTING -d 10.10.188.232 -p tcp --dport 80 -j DNAT --to 10.10.177.233:80
 
三 测试

<!--5f39ae17-8c62-4a45-bc43-b32064c9388a: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-->



 
  • 大小: 70.9 KB
  • 大小: 32.7 KB
分享到:
评论

相关推荐

    Iptables 中文指南

    2.1. 哪里能取得iptables 2.2. 内核配置 2.3. 编译与安装 2.3.1. 编译 2.3.2. 在Red Hat 7.1上安装 3. 表和链 3.1. 概述 3.2. mangle 表 3.3. nat 表 3.4. Filter 表 4. 状态机制 4.1. 概述 4.2. ...

    iptables指南1.1.19电子书

    6.5.2. DNAT target 6.5.3. DROP target 6.5.4. LOG target 6.5.5. MARK target 6.5.6. MASQUERADE target 6.5.7. MIRROR target 6.5.8. QUEUE target 6.5.9. REDIRECT target 6.5.10. REJECT target 6.5....

    iptables命令参数大全

    1. 打开ip包转发功能  echo 1 &gt; /proc/sys/...2. 在NAT/防火墙计算机上的NAT表中添加目的地址转换规则: iptables -t nat -I PREROUTING -i eth0 -p tcp --dport 80 -j DNAT --to-destination 202.96.134.130:80

    Iptables 指南 1.1.19

    6.5.2. DNAT target 6.5.3. DROP target 6.5.4. LOG target 6.5.5. MARK target 6.5.6. MASQUERADE target 6.5.7. MIRROR target 6.5.8. QUEUE target 6.5.9. REDIRECT target 6.5.10. REJECT target 6.5.11. RETURN...

    实用iptables 示例

    本文是我自己的一些学习iptables的心得,给大家拿出来来晒晒! filter #用于过滤 nat #做NAT input =&gt;filter #目的ip是本机的...iptables -t 要操作的表 操作命令 要操作的链 规则号码 匹配条件 -j 匹配到以后的命令

    构筑Linux防火墙之IPtables的概念与用法

    通过使用iptables系统提供的特殊命令 iptables,建立这些规则,并将其添加到内核空间的特定信息包过滤表内的链中。关于添加、除去、编辑规则的命令的一般语法如下: iptables [-t table] command [match] [target...

    Docker高级教程之智能添加与修改防火墙规则

    资料简介:如果你有以下痛苦: ...2、在容器运行中,获取容器的ip,然后在宿主机的iptables力通过nat链做dnat设置 我之前一直使用第2个方法,但随着我docker项目的增加(目前我这里研发使用docker的容器做测试机),防

    企业级Linux服务攻略

    8.3.3 查看iptables规则 8.3.4 添加、删除、修改规则 8.3.5 保存规则与恢复 8.3.6 常用实例及技巧分析 8.3.7 使用日志监控iptables 8.4 NAT(网络地址转换) 8.4.1 iptables实现NAT 8.4.2 配置SNAT 8.4.3 配置DNAT ...

    flaxton:使用Linux ipTable负载均衡Docker容器和子服务器,而无需处理容器ip地址

    Flaxton守护程序通过向ipTables添加DNAT规则来实现负载平衡。 Flaxton CLI:小型程序,用于使用Flaxton守护程序进行操作,而无需处理服务器IP地址 Flaxton Daemon后端:基于Node.js的服务器端程序(可能会切换到...

    家庭服务器

    sudo iptables -t nat -A PREROUTING -d 192.168.16.198 -p tcp --dport 80 -j DNAT --to-destination 192.168.16.1:80 sudo iptables -t nat -A POSTROUTING -d 192.168.16.1 -p tcp- -dport 80 -j SNAT-至192.168....

    aws-metadata-proxy:AWS Metadata Proxy可防止SSRF

    创建一个iptable规则,该规则可防止直接与AWS Metadata Service对话,但特定示例中的特定用户proxy_user除外。 这是您在服务器上运行代理的用户。 /sbin/iptables -t nat -A OUTPUT -m owner ! --uid-owner proxy_...

Global site tag (gtag.js) - Google Analytics