sport >>
Web | Articles | News | Videos | Home
SPORT Web Results
 | linux - iptables error: unknown option --dport - Server Fault
First give a -p option like -p tcp or -p udp. Examples: iptables -A INPUT -p tcp --dport 22 -m state --state NEW -j DROP iptables -A INPUT -p udp --dport 53 --sport 1024:65535 -j ACCEPT You could also try -p all but I've never done that and don't find too much support for it in the examples.
|
 | What port should I open to allow remote desktop? - Server Fault
@BrianZ This is Windows 7/8/10 and to get there, just open Start Menu search for "Firewall" and click on "Advanced Settings" on the left-side panel, click on Inbound Rules on left-side panel and on the main panel find Remote Desktop - User Mode (TCP-In) and Remote Desktop - User Mode (UDP-In) and Allow edge traversal for both of them.
|
 | Drop ALL the TCP connections (ESTABLISHED,RELATED) in Ubuntu
Also mind the spaces between parenthesis): ss --kill -tn 'dst == 192.0.2.2 and ( sport == 80 or sport == 443 )' (or just the destination, it's about an attacker anyway). Unlike tcpkill this doesn't involve sending custom packets anywhere, it's directly done to the socket using a kernel API.
|
 | Route all traffic through Wireguard peer - Server Fault
I'm unable to comment due to too-low reputation, but I came across this post when trying to accomplish a similar goal. It's not entirely clear if the OP would prefer to keep local traffic local (i.e. accessing a network printer) or if the setup actually wishes to send ALL traffic to Wireguard. If trying to achieve the former, see How do I route all public traffic through Wireguard but not ...
|
 | What is the correct way to open a range of ports in iptables
What you've been told is right, although you've written it wrong (you've forgotten --dport). iptables -A INPUT -p tcp --dport 1000:2000 will open up inbound traffic to TCP ports 1000 to 2000 inclusive. -m multiport --dports is only needed if the range you want to open is not continuous, eg -m multiport --dports 80,443, which will open up HTTP and HTTPS only - not the ones in between. Note that ...
|
|