svin0:
Разрешить и запретить подключения можно на страницах с названием ACL, Access Control, Rules или что-нибудь подобное либо через командную строку. Пройдитесь по меню, возможно это ARP table. Там указывается ip и/или mac.
Покажите результат команды
- код выделить все
iptables -S
Вкладка Simple shaper слишком simple , поэтому в ней только глобальные настройки.
~ # iptables -S
iptables v1.2.7a: Unknown arg `-S'
Try `iptables -h' or 'iptables --help' for more information.
~ # iptables -h
iptables v1.2.7a
Usage: iptables -[AD] chain rule-specification [options]
iptables -[RI] chain rulenum rule-specification [options]
iptables -D chain rulenum [options]
iptables -[LFZ] [chain] [options]
iptables -[NX] chain
iptables -E old-chain-name new-chain-name
iptables -P chain target [options]
iptables -h (print this help information)
Commands:
Either long or short options are allowed.
--append -A chain Append to chain
--delete -D chain Delete matching rule from chain
--delete -D chain rulenum
Delete rule rulenum (1 = first) from chain
--insert -I chain [rulenum]
Insert in chain as rulenum (default 1=first)
--replace -R chain rulenum
Replace rule rulenum (1 = first) in chain
--list -L [chain] List the rules in a chain or all chains
--flush -F [chain] Delete all rules in chain or all chains
--zero -Z [chain] Zero counters in chain or all chains
--new -N chain Create a new user-defined chain
--delete-chain
-X [chain] Delete a user-defined chain
--policy -P chain target
Change policy on chain to target
--rename-chain
-E old-chain new-chain
Change chain name, (moving any references)
Options:
--proto -p [!] proto protocol: by number or name, eg. `tcp'
--source -s [!] address
source specification
--destination -d [!] address
destination specification
--in-interface -i [!] input name[+]
network interface name ([+] for wildcard)
--jump -j target
target for rule (may load target extension)
--match -m match
extended match (may load extension)
--numeric -n numeric output of addresses and ports
--out-interface -o [!] output name[+]
network interface name ([+] for wildcard)
--table -t table table to manipulate (default: `filter')
--verbose -v verbose mode
--line-numbers print line numbers when listing
--exact -x expand numbers (display exact values)
[!] --fragment -f match second or further fragments only
--modprobe=<command> try to insert modules using this command
--set-counters PKTS BYTES set the counter during insert/append
[!] --version -V print package version.
ACCOUNT v1.2.7a options:
--addr ip/netmask Base network IP and netmask used for this table
--tname name Table name for the userspace library
TTL target v1.2.7a options
--ttl-set value Set TTL to <value>
--ttl-dec value Decrement TTL by <value>
--ttl-inc value Increment TTL by <value>
CONNMARK target v1.2.7a options:
--set-mark value Set conntrack mark value
--save-mark Save the packet nfmark on the connection
--restore-mark Restore saved nfmark value
NOTRACK target v1.2.7a takes no options
CLASSIFY target v1.2.7a options:
--set-class [MAJOR:MINOR] Set skb->priority value
TRIGGER v1.2.7a options:
--trigger-type (dnat|in|out)
Trigger type
--trigger-proto proto
Trigger protocol
--trigger-match port[-port]
Trigger destination port range
--trigger-relate port[-port]
Port range to map related destination port range
to.
ULOG v1.2.7a options:
--ulog-nlgroup nlgroup NETLINK group used for logging
--ulog-cprange size Bytes of each packet to be passed
--ulog-qthreshold Threshold of in-kernel queue
--ulog-prefix prefix Prefix log messages with this prefix.
TOS target v1.2.7a options:
--set-tos value Set Type of Service field to one of the
following numeric or descriptive values:
Minimize-Delay 16 (0x10)
Maximize-Throughput 8 (0x0
Maximize-Reliability 4 (0x04)
Minimize-Cost 2 (0x02)
Normal-Service 0 (0x00)
TCPMSS target v1.2.7a mutually-exclusive options:
--set-mss value explicitly set MSS option to specified value
--clamp-mss-to-pmtu automatically clamp MSS value to (path_MTU - 40)
SNAT v1.2.7a options:
--to-source <ipaddr>[-<ipaddr>][:port-port]
Address to map source to.
(You can use this more than once)
SAME v1.2.7a options:
--to <ipaddr>-<ipaddr>
Addresses to map source to.
May be specified more than
once for multiple ranges.
--nodst
Don't use destination-ip in
source selection
REJECT options:
--reject-with type drop input packet and send back
a reply packet according to type:
Valid reject types:
icmp-net-unreachable ICMP network unreachable
net-unreach alias
icmp-host-unreachable ICMP host unreachable
host-unreach alias
icmp-proto-unreachable ICMP protocol unreachable
proto-unreach alias
icmp-port-unreachable ICMP port unreachable (default)
port-unreach alias
icmp-net-prohibited ICMP network prohibited
net-prohib alias
icmp-host-prohibited ICMP host prohibited
host-prohib alias
tcp-reset TCP RST packet
tcp-reset alias
icmp-admin-prohibited ICMP administratively prohibited (*)
admin-prohib alias
(*) See man page or read the INCOMPATIBILITES file for compatibility issues.
REDIRECT v1.2.7a options:
--to-ports <port>[-<port>]
Port (range) to map to.
MIRROR target v1.2.7a takes no options
MASQUERADE v1.2.7a options:
--to-ports <port>[-<port>]
Port (range) to map to.
MARK target v1.2.7a options:
--set-mark value Set nfmark value
LOG v1.2.7a options:
--log-level level Level of logging (numeric or see syslog.conf)
--log-prefix prefix Prefix log messages with this prefix.
--log-tcp-sequence Log TCP sequence numbers.
--log-tcp-options Log TCP options.
--log-ip-options Log IP options.
ECN target v1.2.7a options
--ecn-tcp-remove Remove all ECN bits from TCP header
DSCP target options
--set-dscp value Set DSCP field in packet header to value
This value can be in decimal (ex: 32)
or in hex (ex: 0x20)
--set-dscp-class class Set the DSCP field in packet header to the
value represented by the DiffServ class value.
This class may be EF,BE or any of the CSxx o
r AFxx classes.
These two options are mutually exclusive !
DNAT v1.2.7a options:
--to-destination <ipaddr>[-<ipaddr>][:port-port]
Address to map destination to.
(You can use this more than once)
Standard v1.2.7a options:
(If target is DROP, ACCEPT, RETURN or nothing)
AH v1.2.7a options:
--ahspi [!] spi[:spi]
match spi (range)
conntrack match v1.2.7a options:
[!] --ctstate [INVALID|ESTABLISHED|NEW|RELATED|UNTRACKED|SNAT|DNAT][,...]
State(s) to match
[!] --ctproto proto Protocol to match; by number or name, eg. `tcp'
--ctorigsrc [!] address[/mask]
Original source specification
--ctorigdst [!] address[/mask]
Original destination specification
--ctreplsrc [!] address[/mask]
Reply source specification
--ctrepldst [!] address[/mask]
Reply destination specification
[!] --ctstatus [NONE|EXPECTED|SEEN_REPLY|ASSURED|CONFIRMED][,...]
Status(es) to match
[!] --ctexpire time[:time] Match remaining lifetime in seconds against
value or range of values (inclusive)
DSCP match v1.2.7a options
[!] --dscp value Match DSCP codepoint with numerical value
This value can be in decimal (ex: 32)
or in hex (ex: 0x20)
[!] --dscp-class name Match the DiffServ class. This value may
be any of the BE,EF, AFxx or CSx classes
These two options are mutually exclusive !
ECN match v1.2.7a options
[!] --ecn-tcp-cwr Match CWR bit of TCP header
[!] --ecn-tcp-ece Match ECE bit of TCP header
[!] --ecn-ip-ect [0..3] Match ECN codepoint in IPv4 header
ESP v1.2.7a options:
--espspi [!] spi[:spi]
match spi (range)
helper match v1.2.7a options:
[!] --helper string Match helper identified by string
ICMP v1.2.7a options:
--icmp-type [!] typename match icmp type
(or numeric type or type/code)
Valid ICMP Types:
any
echo-reply (pong)
destination-unreachable
network-unreachable
host-unreachable
protocol-unreachable
port-unreachable
fragmentation-needed
source-route-failed
network-unknown
host-unknown
network-prohibited
host-prohibited
TOS-network-unreachable
TOS-host-unreachable
communication-prohibited
host-precedence-violation
precedence-cutoff
source-quench
redirect
network-redirect
host-redirect
TOS-network-redirect
TOS-host-redirect
echo-request (ping)
router-advertisement
router-solicitation
time-exceeded (ttl-exceeded)
ttl-zero-during-transit
ttl-zero-during-reassembly
parameter-problem
ip-header-bad
required-option-missing
timestamp-request
timestamp-reply
address-mask-request
address-mask-reply
iprange match v1.2.7a options:
[!] --src-range ip-ip Match source IP in the specified range
[!] --dst-range ip-ip Match destination IP in the specified range
length v1.2.7a options:
[!] --length length[:length] Match packet length against value or range
of values (inclusive)
limit v1.2.7a options:
--limit avg max average match rate: default 3/hour
[Packets per second unless followed by
/sec /minute /hour /day postfixes]
--limit-burst number number to match in a burst, default 5
MAC v1.2.7a options:
--mac-source [!] XX:XX:XX:XX:XX:XX
Match source MAC address
--src-mask XX:XX:XX:XX:XX:XX
Source MAC mask
--mac-dst [!] XX:XX:XX:XX:XX:XX
Match destination MAC address
--dst-mask XX:XX:XX:XX:XX:XX
Destination MAC mask
MARK match v1.2.7a options:
[!] --mark value[/mask] Match nfmark value with optional mask
multiport v1.2.7a options:
--source-ports port[,port,port...]
--sports ...
match source port(s)
--destination-ports port[,port,port...]
--dports ...
match destination port(s)
--ports port[,port,port]
match both source and destination port(s)
OWNER match v1.2.7a options:
[!] --uid-owner userid Match local uid
[!] --gid-owner groupid Match local gid
[!] --pid-owner processid Match local pid
[!] --sid-owner sessionid Match local sid
[!] --cmd-owner name Match local command name
pkt_type v0.1 options:
--pkt-type [!] packettype match packet type
Valid packet types:
unicast to us
broadcast to all
multicast to group
state v1.2.7a options:
[!] --state [INVALID|ESTABLISHED|NEW|RELATED|UNTRACKED][,...]
State(s) to match
TCP v1.2.7a options:
--tcp-flags [!] mask comp match when TCP flags & mask == comp
(Flags: SYN ACK FIN RST URG PSH ALL NONE)
[!] --syn match when only SYN flag set
(equivalent to --tcp-flags SYN,RST,ACK SYN)
--source-port [!] port[:port]
--sport ...
match source port(s)
--destination-port [!] port[:port]
--dport ...
match destination port(s)
--tcp-option [!] number match if TCP option set
tcpmss match v1.2.7a options:
[!] --mss value[:value] Match TCP MSS range.
(only valid for TCP SYN or SYN/ACK packets)
TOS match v1.2.7a options:
[!] --tos value Match Type of Service field from one of the
following numeric or descriptive values:
Minimize-Delay 16 (0x10)
Maximize-Throughput 8 (0x0
Maximize-Reliability 4 (0x04)
Minimize-Cost 2 (0x02)
Normal-Service 0 (0x00)
UDP v1.2.7a options:
--source-port [!] port[:port]
--sport ...
match source port(s)
--destination-port [!] port[:port]
--dport ...
match destination port(s)
unclean v1.2.7a takes no options
recent v1.2.7a options:
[!] --set Add source address to list, always matches.
[!] --rcheck Match if source address in list.
[!] --update Match if source address in list, also update las
t-seen time.
[!] --remove Match if source address in list, also removes th
at address from list.
--seconds seconds For check and update commands above.
Specifies that the match will only occur if sour
ce address last seen within
the last 'seconds' seconds.
--hitcount hits For check and update commands above.
Specifies that the match will only occur if sour
ce address seen hits times.
May be used in conjunction with the seconds opti
on.
--rttl For check and update commands above.
Specifies that the match will only occur if the
source address and the TTL
match between this packet and the one which was
set.
Useful if you have problems with people spoofing
their source address in order
to DoS you via this module.
--name name Name of the recent list to be used. DEFAULT use
d if none given.
--rsource Match/Save the source address of each packet in
the recent list table (default).
--rdest Match/Save the destination address of each packe
t in the recent list table.
ipt_recent v0.3.1: Stephen Frost <sfrost@snowman.net>. http://snowman.net/proje
cts/ipt_recent/
CONNMARK match v1.2.7a options:
[!] --mark value[/mask] Match nfmark value with optional mask
TTL match v1.2.7a options:
--ttl-eq value Match time to live value
--ttl-lt value Match TTL < value
--ttl-gt value Match TTL > value
connlimit v1.2.7a options:
[!] --connlimit-above n match if the number of existing tcp connections
is (not) above n
--connlimit-mask n group hosts using mask
udplimit v1.2.7a options:
[!] --udplimit-above n match if the number of existing udp connections
is (not) above n
--udplimit-mask n group hosts using mask
STRING match v--urlalw [!]string Match a url allow string in a packet
1.2.7a options:
--from Offset to start searching from
--to Offset to stop searching
--algo Algorithm
--string [!] string Match a string in a packet
--url [!] string Match a url string in a packet
--domain [!] string Match a Domain string in a packet
IPP2P v0.8.1_rc1 options:
--ipp2p Grab all known p2p packets
--edk [TCP&UDP] All known eDonkey/eMule/Overnet packets
--dc [TCP] All known Direct Connect packets
--kazaa [TCP&UDP] All known KaZaA packets
--gnu [TCP&UDP] All known Gnutella packets
--bit [TCP&UDP] All known BitTorrent packets
--apple [TCP] All known AppleJuice packets
--winmx [TCP] All known WinMX
--soul [TCP] All known SoulSeek
--ares [TCP] All known Ares
EXPERIMENTAL protocols (please send feedback to: ipp2p@ipp2p.org) :
--mute [TCP] All known Mute packets
--waste [TCP] All known Waste packets
--xdcc [TCP] All known XDCC packets (only xdcc login)
DEBUG SUPPPORT, use only if you know why
--debug Generate kernel debug output, THIS WILL SLOW DOWN THE FI
LTER
Note that the follwing options will have the same meaning:
'--ipp2p' is equal to '--edk --dc --kazaa --gnu --bit --apple --winmx --soul --
ares'
IPP2P was intended for TCP only. Due to increasing usage of UDP we needed to cha
nge this.
You can now use -p udp to search UDP packets only or without -p switch to search
UDP and TCP packets.
See README included with this package for more details or visit http://www.ipp2p
.org
Examples:
iptables -A FORWARD -m ipp2p --ipp2p -j MARK --set-mark 0x01
iptables -A FORWARD -p udp -m ipp2p --kazaa --bit -j DROP
iptables -A FORWARD -p tcp -m ipp2p --edk --soul -j DROP
LAYER7 match v1.2.7a options:
--l7dir <directory> : Look for patterns here instead of /etc/l7-protocols/
(--l7dir must be specified before --l7proto if used!)
--l7proto [!] <name> : Match the protocol defined in /etc/l7-protocols/name.pat
account v1.2.7a options:
--aaddr network/netmask
defines network/netmask for which make statistics.
--aname name
defines name of list where statistics will be kept. If no is
specified DEFAULT will be used.
--ashort
table will colect only short statistics (only total counters
without splitting it into protocols.
~ #
Подумаю как сделать скрины остальных вкладок