Moxa DA-682A-C7-W7E [33/112] Netfilter iptables

Moxa DA-682A-C1-LX [33/112] Netfilter iptables
DA-682A Linux Softrware Managing Communications
3-16
</Directory>
6. For webpages that will be connecting using the secure sockets layer, you will need to edit the SSL configuration
file. Open the config file using the following command:
moxa@MOXA:~#/etc# sudo vi /etc/apache2/sites-avaliable/default-ssl
7. Make the changes to your config file so that it matches the lines shown in red below:
<VirtualHost *:443>
...
DocumentRoot /media/usb0/www
<Directory />
Options FollowSymLinks
AllowOverride None
</Directory>
...
ScriptAlias /cgi-bin/ /media/usb0/www/cgi-bin/
<Directory “/media/usb0/www/cgi-bin/”>
AllowOverride None
Options ExecCGI -MultiViews +SymLinksIfOwnerMatch
Order allow,deny
Allow from all
</Directory>
...
</VirtualHost>
8. Use the following compound command to restart the Apache web server:
moxa@MOXA:~# cd /etc/init.d && apache2 restart
9. Start your browser and connect to the DA-682A-LX by typing the current LAN1 IP address in the browser’s
address box.
ATTENTION
Visit the Apache website at
http://httpd.apache.org/docs/ for more information about setting up Apache
servers.
If you would like to check your website for HTML compliance, click on the following link to download the web
page test suite
from the World Wide Web Consortium:
http://www.w3.org/MarkUp/Test/HTML401.zip
Netfilter/iptables
Netfilter is an administrative tool for setting up, maintaining, and inspecting the Linux kernels packet filtering
rule tables. Netfilter is a stateful firewall, which means that it filters packets by tracking connections, rather
than each and every individual packet. For more information on connection tracking, see the section
Connection Tracking, in this same chapter, below.
In Netfilter, a few fundamental rule tables are pre-defined, with each table containing built-in chains and
user-defined chains. Tables form the highest layer of organization for Netfilter’s rule sets, and rule chains
form the middle layer, by which individual rules are ordered. Each chain is a list of rules that are applied (or not)
to a packets as they traverse the chains. Each rule specifies what to do with a matching packet. A rule (such
as a jump to a user-defined chain in the same table, or an order to drop a certain type of packet) is also called
a target.
Netfilter is based around three fundamental tables: Filter tables, NAT tables, and Mangle tables. These
tables in turn are structured around a few basic, built-in rule chains. There are five basic rule chains:
PREROUTING, INPUT, FORWARDING, OUTPUT, and POSTROUTING. In addition to these five built-in chains, it

Содержание

Похожие устройства