Created
November 12, 2010 07:44
-
-
Save lajunta/673848 to your computer and use it in GitHub Desktop.
some rules for iptables
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
iptables -F | |
iptables -X | |
iptables -P INPUT DROP | |
iptables -P FORWARD DROP | |
iptables -P OUTPUT DROP | |
iptables -t nat -F | |
iptables -t nat -P PREROUTING ACCEPT | |
iptables -t nat -P POSTROUTING ACCEPT | |
iptables -t nat -P OUTPUT ACCEPT | |
#syn | |
iptables -N syn-flood | |
iptables -A INPUT -p tcp --syn -j syn-flood | |
iptables -I syn-flood -p tcp -m limit --limit 3/s --limit-burst 6 -j RETURN | |
iptables -A syn-flood -j REJECT | |
#dos#allow external card 15 connlink | |
iptables -A INPUT -i eth0 -p tcp --syn -m connlimit --connlimit-above 15 -j DROP | |
iptables -A INPUT -p tcp -m state --state ESTABLISHED,RELATED -j ACCEPT | |
#ddos | |
iptables -A INPUT -p tcp --syn -m limit --limit 12/s --limit-burst 24 -j ACCEPT | |
iptables -A FORWARD -p tcp --syn -m limit --limit 1/s -j ACCEPT | |
#cc | |
#singleipmaxconn | |
iptables -I INPUT -p tcp --dport 80 -m connlimit --connlimit-above 30 -j REJECT | |
#singleipmaxconnwithintimes | |
iptables -A INPUT -p tcp --dport 80 -m recent --name BAD_HTTP_ACCESS --update --seconds 60 --hitcount 30 -j REJECT | |
iptables -A INPUT -p tcp --dport 80 -m recent --name BAD_HTTP_ACCESS --set -j ACCEPT | |
#normal | |
iptables -A INPUT -p tcp -s 0/0 --dport 80 -j ACCEPT | |
iptables -A INPUT -p tcp --dport 22 -j ACCEPT | |
iptables -A INPUT -p udp --sport 53 -j ACCEPT | |
iptables -A OUTPUT -p udp --dport 53 -j ACCEPT | |
iptables -A OUTPUT -p tcp --sport 22 -m state --state ESTABLISHED -j ACCEPT | |
iptables -A OUTPUT -p tcp --sport 80 -m state --state ESTABLISHED -j ACCEPT | |
iptables -A INPUT -s 127.0.0.1 -d 127.0.0.1 -j ACCEPT | |
iptables -A OUTPUT -s 127.0.0.1 -d 127.0.0.1 -j ACCEPT | |
#some rules | |
sysctl -w net.ipv4.tcp_synack_retries=3 | |
sysctl -w net.ipv4.tcp_syn_retries=3 | |
sysctl -w net.ipv4.tcp_max_syn_backlog=2048 | |
sysctl -w net.ipv4.tcp_syncookies=1 | |
exit 0 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment