Moxa UC-8410A-T-LX [50/86] Modprobe iptable_filter

Moxa UC-8410A-T-LX [50/86] Modprobe iptable_filter
UC-8410A Series Linux Software General Debian Package Usage
5-10
The UC-8410A-LX supports the following sub-modules. Be sure to use the module that matches your
application.
The most common modules are already built in to the kernel:
ip6t_eui64.ko ip6t_ipv6header.ko nf_conntrack_ipv6.ko xfrm4_mode_tunnel.ko
ip6t_rt.ko ip6t_LOG.ko xfrm6_mode_beet.ko ah4.ko
ip6table_security.ko ip6t_ah.ko sit.ko xfrm4_mode_beet.ko
ip6table_filter.ko ip6_tables.ko ipv6.ko xfrm4_mode_transport.ko
ip6t_frag.ko ip6table_raw.ko xfrm6_mode_tunnel.ko esp4.ko
ip6t_hbh.ko nf_defrag_ipv6.ko xfrm6_mode_transport.ko ipcomp.ko
ip6t_REJECT.ko ip6t_mh.ko xfrm_ipcomp.ko tcp_diag.ko
inet_lro.ko xfrm4_tunnel.ko inet_diag.ko
The basic syntax to enable and load an IPTABLES module is as follows:
Use
lsmod to check if the ip_tables module has already been loaded in the UC-8410A-LX series. Use
modprobe to insert and enable the module.
Use the following command to load the modules (iptable_filter, iptable_mangle, iptable_nat):
#modprobe iptable_filter
Use iptables, iptables-restore, and iptables-save commands to maintain the database.
NOTE
IPTABLES plays the role of packet filtering or NAT. Take care when setting up the IPTABLES rules. If the rules
are not correct, r
emote hosts that connect via a LAN or PPP might
be denied access. We recommend using the
serial console to set up the IPTABLES.
Click on the following links for more information on iptables:
http://www.li
nuxguruz.com/iptables/
http://www.netfilter.org/documentation/HOWTO//packet
-filtering-HOWTO.html
https://wiki.de
bian.org/DebianFirewall
https://wiki.debian.org/iptables
Since the IPTABLES command is very complex, to illustrate the IPTABLES syntax we have divided our
discussion of the various rules into three categories: Observe and erase chain rules, Define policy rules,
and Append or delete rules.

Содержание

Скачать