Why he entered the above line?

Bob is a Junior Administrator at ABC Company. On One of Linux machine he entered the following firewall rules:

iptables t filter A INPUT -p tcp –dport 23 j DROP

Why he entered the above line?

Bob is a Junior Administrator at ABC Company. On One of Linux machine he entered the following firewall rules:

iptables t filter A INPUT -p tcp –dport 23 j DROP

Why he entered the above line?

A.
To accept the Telnet connection

B.
To deny the Telnet connection

C.
The accept all connection except telnet connection

D.
None of Above

Explanation:
-t, –table
This option specifies the packet matching table which the command should operate on. If the kernel is configured with automatic module loading, an attempt will be made to load the appropriate module for that table if it is not already there. The tables are as follows: filter This is the default table, and contains the built-in chains INPUT (for packets coming into the box itself), FORWARD (for packets being routed through the box), and OUTPUT (for locally-generated packets). nat This table is consulted when a packet which is creates a new connection is encountered. It consists of three built-ins: PREROUTING (for altering packets as soon as they come in), OUTPUT (for altering locally-generated packets before routing), and POSTROUTING (for altering packets as they are about to go out). mangle This table is used for specialized packet alteration. It has two built-in chains: PREROUTING (for altering incoming packets before routing) and OUTPUT (for altering locally-generated packets before routing).
-A, –append
Append one or more rules to the end of the selected chain. When the source and/or destination names resolve to more than one address, a rule will be added for each possible address combination.
-p, –protocol [!] protocol
The protocol of the rule or of the packet to check. The specified protocol can be one of tcp, udp, icmp, or all, or it can be a numeric value, representing one of these protocols or a different one. Also a protocol name from /etc/protocols is allowed. A "!" argument before the protocol inverts the test. The number zero is equivalent to all. Protocol all will match with all protocols and is taken as default when this option is omitted. All may not be used in in combination with the check command.
–destination-port [!] [port[:port]]
Destination port or port range specification. The flag –dport is an alias for this option.
-j, –jump target
This specifies the target of the rule; ie. what to do if the packet matches it. The target can be a user-defined chain (not the one this rule is in), one of the special builtin targets which decide the fate of the packet immediately, or an extension (see EXTENSIONS below). If this option is omitted in a rule, then matching the rule will have no effect on the packet’s fate, but the counters on the rule will be incremented.



Leave a Reply 0

Your email address will not be published. Required fields are marked *