Home
last modified time | relevance | path

Searched refs:iptables (Results 1 – 25 of 37) sorted by relevance

12

/Linux-v6.6/tools/testing/selftests/netfilter/
Drpath.sh8 if iptables-legacy --version >/dev/null 2>&1; then
9 iptables='iptables-legacy'
10 elif iptables --version >/dev/null 2>&1; then
11 iptables='iptables'
13 iptables=''
30 if [ -z "$iptables$ip6tables$nft" ]; then
65 [ -n "$iptables" ] && {
67 ip netns exec "$ns2" "$iptables" $common -m rpfilter
68 ip netns exec "$ns2" "$iptables" $common -m rpfilter --invert
116 [ -n "$iptables" ] && ip netns exec "$ns2" "$iptables" -t raw -Z
[all …]
Dnf_nat_edemux.sh27 iptables --version > /dev/null 2>&1
71 ip netns exec $ns2 iptables -t nat -A OUTPUT -d 10.96.0.1/32 -p tcp --dport 443 -j DNAT --to-destin…
Dconntrack_sctp_collision.sh58 ip net exec $ROUTER_NS iptables -A FORWARD -m state --state INVALID,UNTRACKED -j DROP
59 ip net exec $ROUTER_NS iptables -A INPUT -p sctp -j DROP
Dconntrack_tcp_unreplied.sh79 ip netns exec $ns1 iptables -A INPUT -m state --state established,related -j ACCEPT
Dipip-conntrack-mtu.sh206 ip netns exec ${r_a} iptables -A FORWARD -m conntrack --ctstate NEW
/Linux-v6.6/Documentation/networking/
Dtproxy.rst19 # iptables -t mangle -N DIVERT
20 # iptables -t mangle -A PREROUTING -p tcp -m socket -j DIVERT
21 # iptables -t mangle -A DIVERT -j MARK --set-mark 1
22 # iptables -t mangle -A DIVERT -j ACCEPT
59 usually done with the iptables REDIRECT target; however, there are serious
67 add rules like this to the iptables ruleset above::
69 # iptables -t mangle -A PREROUTING -p tcp --dport 80 -j TPROXY \
87 To use tproxy you'll need to have the following modules compiled for iptables:
105 the HTTP listener you redirect traffic to with the TPROXY iptables
/Linux-v6.6/tools/testing/selftests/net/mptcp/
Dmptcp_sockopt.sh15 iptables="iptables"
30 for t in ${iptables} ${ip6tables}; do
101 if iptables-legacy -V &> /dev/null; then
102 iptables="iptables-legacy"
104 elif ! iptables -V &> /dev/null; then
117 local tables=${iptables}
Dmptcp_join.sh28 iptables="iptables"
163 if iptables-legacy -V &> /dev/null; then
164 iptables="iptables-legacy"
166 elif ! iptables -V &> /dev/null; then
353 tables="${iptables}"
419 tables="${iptables}"
480 if ! ip netns exec "${ns}" ${iptables} \
/Linux-v6.6/Documentation/admin-guide/cgroup-v1/
Dnet_cls.rst10 Also, Netfilter (iptables) can use this tag to perform
42 configuring iptables, basic example::
44 iptables -A OUTPUT -m cgroup ! --cgroup 0x100001 -j DROP
/Linux-v6.6/net/ipv4/netfilter/
DKconfig124 iptables is a general, extensible packet identification framework.
179 local output. See the man page for iptables(8).
210 tristate "iptables NAT support"
216 This enables the `nat' table in iptables. This allows masquerading,
256 This option adds a `mangle' table to iptables: see the man page for
257 iptables(8). This table is used for various packet alterations
267 This option adds a `ECN' target, which can be used in the iptables mangle
290 This option adds a `raw' table to iptables. This table is the very
303 This option adds a `security' table to iptables, for use
/Linux-v6.6/tools/testing/selftests/bpf/prog_tests/
Dbpf_nf.c52 const char *iptables = "iptables-legacy -t raw %s PREROUTING -j CONNMARK --set-mark 42/0"; in test_bpf_nf_ct() local
71 snprintf(cmd, sizeof(cmd), iptables, "-A"); in test_bpf_nf_ct()
133 snprintf(cmd, sizeof(cmd), iptables, "-D"); in test_bpf_nf_ct()
/Linux-v6.6/tools/testing/selftests/wireguard/
Dnetns.sh199 n0 iptables -A INPUT -m length --length 1360 -j DROP
205 n0 iptables -F INPUT
337 n0 iptables -t nat -A POSTROUTING -s 192.168.1.0/24 -d 10.0.0.0/24 -j SNAT --to 10.0.0.1
351 n1 iptables -t mangle -I OUTPUT -j MARK --set-xmark 1
354 n1 iptables -t mangle -D OUTPUT -j MARK --set-xmark 1
388 n2 iptables -t nat -A POSTROUTING -s 10.0.0.0/24 -d 192.168.241.0/24 -j SNAT --to 192.168.241.2
389 n0 iptables -t filter -A INPUT \! -s 10.0.0.0/24 -i vethrs -j DROP # Manual rpfilter just to be exp…
395 n0 iptables -t nat -F
396 n0 iptables -t filter -F
397 n2 iptables -t nat -F
/Linux-v6.6/tools/testing/selftests/net/
Dxfrm_policy.sh186 ip netns exec $ns iptables-save -c |grep policy | ( read c rest
187 ip netns exec $ns iptables -Z
344 iptables --version 2>/dev/null >/dev/null
402 ip netns exec ns3 iptables -p icmp -A FORWARD -m policy --dir out --pol ipsec
403 ip netns exec ns4 iptables -p icmp -A FORWARD -m policy --dir out --pol ipsec
Dudpgro_fwd.sh100 local ipt=iptables
186 IPT=iptables
Dudpgro.sh77 ipt_cmd=iptables
Damt.sh162 ip netns exec "${RELAY}" iptables -t mangle -I PREROUTING \
/Linux-v6.6/samples/bpf/
Drun_cookie_uid_helper_example.sh8 iptables -D OUTPUT -m bpf --object-pinned ${mnt_dir}/bpf_prog -j ACCEPT
/Linux-v6.6/net/bridge/
DKconfig25 If you enable iptables support along with the bridge support then you
27 iptables will then see the IP packets being bridged, so you need to
/Linux-v6.6/net/ipv6/netfilter/
DKconfig192 local output. See the man page for iptables(8).
225 This option adds a `mangle' table to iptables: see the man page for
226 iptables(8). This table is used for various packet alterations
247 This option adds a `security' table to iptables, for use
/Linux-v6.6/net/bridge/netfilter/
DKconfig132 equivalent of the iptables limit match.
142 This value is the same as the one used in the iptables mark match and
197 This value is the same as the one used in the iptables mark match and
/Linux-v6.6/tools/testing/selftests/wireguard/qemu/
DMakefile43 $(eval $(call tar_download,IPTABLES,iptables,1.8.7,.tar.bz2,https://www.netfilter.org/projects/ipta…
341 …)/bash $(IPROUTE2_PATH)/misc/ss $(IPROUTE2_PATH)/ip/ip $(IPTABLES_PATH)/iptables/xtables-legacy-mu…
430 $(IPTABLES_PATH)/iptables/xtables-legacy-multi: | $(IPTABLES_PATH)/.installed $(USERSPACE_DEPS)
/Linux-v6.6/net/netfilter/
DKconfig435 controlled by iptables, ip6tables or nft.
824 This option adds a `CHECKSUM' target, which can be used in the iptables mangle
830 This target can be used to fill in the checksum using iptables
954 iptables -A INPUT -p tcp --dport 22 -j LED --led-trigger-id ssh --led-delay 1000
969 any iptables table which records the packet header to the syslog.
1093 For it to work you will have to configure certain iptables rules
1143 iptables -A FORWARD -p tcp --tcp-flags SYN,RST SYN \
1202 If you say Y or M here, try `iptables -m cluster --help` for
1210 comments in your iptables ruleset.
1285 With this option enabled, you will be able to use the iptables
[all …]
/Linux-v6.6/Documentation/translations/it_IT/process/
Dchanges.rst59 iptables 1.4.2 iptables -V
297 strumenti come nelle versioni del kernel antecedenti la 2.4.x (iptables).
505 - <https://netfilter.org/projects/iptables/index.html>
/Linux-v6.6/Documentation/process/
Dchanges.rst58 iptables 1.4.2 iptables -V
329 kernel series (iptables). It still includes backwards-compatibility modules
553 - <https://netfilter.org/projects/iptables/index.html>
/Linux-v6.6/Documentation/
DChanges58 iptables 1.4.2 iptables -V
329 kernel series (iptables). It still includes backwards-compatibility modules
553 - <https://netfilter.org/projects/iptables/index.html>

12