{"id":17,"date":"2022-09-05T11:44:11","date_gmt":"2023-08-07T05:50:40","guid":{"rendered":"https:\/\/www.silicloud.com\/zh\/blog\/index.php\/2023\/11\/30\/%e5%a6%82%e4%bd%95%e8%ae%be%e7%bd%aeiptables%e9%98%b2%e7%81%ab%e5%a2%99%e4%bb%a5%e4%bf%9d%e6%8a%a4%e6%9c%8d%e5%8a%a1%e5%99%a8%e4%b9%8b%e9%97%b4%e7%9a%84%e6%b5%81%e9%87%8f\/"},"modified":"2025-07-31T09:00:56","modified_gmt":"2025-07-31T01:00:56","slug":"%e5%a6%82%e4%bd%95%e8%ae%be%e7%bd%aeiptables%e9%98%b2%e7%81%ab%e5%a2%99%e4%bb%a5%e4%bf%9d%e6%8a%a4%e6%9c%8d%e5%8a%a1%e5%99%a8%e4%b9%8b%e9%97%b4%e7%9a%84%e6%b5%81%e9%87%8f","status":"publish","type":"post","link":"https:\/\/www.silicloud.com\/zh\/blog\/%e5%a6%82%e4%bd%95%e8%ae%be%e7%bd%aeiptables%e9%98%b2%e7%81%ab%e5%a2%99%e4%bb%a5%e4%bf%9d%e6%8a%a4%e6%9c%8d%e5%8a%a1%e5%99%a8%e4%b9%8b%e9%97%b4%e7%9a%84%e6%b5%81%e9%87%8f\/","title":{"rendered":"Iptables\u9632\u706b\u5899\u914d\u7f6e\u8be6\u89e3\uff1a\u4fdd\u62a4\u670d\u52a1\u5668\u95f4\u901a\u4fe1\u5b89\u5168"},"content":{"rendered":"<h3>\u5f15\u8a00<\/h3>\n<p>\u5c06\u5e94\u7528\u7a0b\u5e8f\u7684\u79bb\u6563\u7ec4\u4ef6\u90e8\u7f72\u5230\u4e0d\u540c\u8282\u70b9\u4e0a\u662f\u964d\u4f4e\u8d1f\u8f7d\u5e76\u5b9e\u73b0\u6a2a\u5411\u6269\u5c55\u7684\u5e38\u89c1\u505a\u6cd5\u3002\u4e00\u4e2a\u5178\u578b\u7684\u4f8b\u5b50\u662f\u5c06\u6570\u636e\u5e93\u914d\u7f6e\u5728\u4e0e\u5e94\u7528\u7a0b\u5e8f\u5206\u79bb\u7684\u670d\u52a1\u5668\u4e0a\u3002\u867d\u7136\u8fd9\u79cd\u67b6\u6784\u6709\u8bb8\u591a\u4f18\u52bf\uff0c\u4f46\u901a\u8fc7\u7f51\u7edc\u8fde\u63a5\u4e5f\u5e26\u6765\u4e86\u65b0\u7684\u5b89\u5168\u6311\u6218\u3002<\/p>\n<p>\u5728\u672c\u6307\u5357\u4e2d\uff0c\u6211\u4eec\u5c06\u6f14\u793a\u5982\u4f55\u5728\u5206\u5e03\u5f0f\u73af\u5883\u4e2d\u4e3a\u6bcf\u53f0\u670d\u52a1\u5668\u8bbe\u7f6e\u9632\u706b\u5899\u3002\u6211\u4eec\u5c06\u914d\u7f6e\u7279\u5b9a\u7684\u7b56\u7565\uff0c\u5141\u8bb8\u7ec4\u4ef6\u4e4b\u95f4\u8fdb\u884c\u9884\u671f\u6d41\u91cf\u4f20\u8f93\uff0c\u540c\u65f6\u963b\u6b62\u5176\u4ed6\u6240\u6709\u672a\u7ecf\u6388\u6743\u7684\u8bbf\u95ee\u3002<\/p>\n<p>\u60a8\u4e5f\u53ef\u4ee5\u914d\u7f6eSilicon Cloud\u7684\u4e91\u9632\u706b\u5899\uff0c\u5b83\u5728Silicon Cloud\u57fa\u7840\u8bbe\u65bd\u4e0a\u7684\u670d\u52a1\u5668\u5916\u90e8\u8fd0\u884c\uff0c\u4f5c\u4e3a\u989d\u5916\u7684\u4fdd\u62a4\u5c42\u3002\u901a\u8fc7\u8fd9\u79cd\u65b9\u6cd5\uff0c\u60a8\u65e0\u9700\u5728\u670d\u52a1\u5668\u672c\u8eab\u914d\u7f6e\u9632\u706b\u5899\u3002<\/p>\n<p>\u672c\u6307\u5357\u7684\u6f14\u793a\u5c06\u4f7f\u7528\u4e24\u53f0Ubuntu 22.04\u670d\u52a1\u5668\u3002\u4e00\u53f0\u5c06\u8fd0\u884cNginx\u63d0\u4f9bWeb\u5e94\u7528\u7a0b\u5e8f\uff0c\u53e6\u4e00\u53f0\u5c06\u6258\u7ba1\u8be5\u5e94\u7528\u7a0b\u5e8f\u7684MySQL\u6570\u636e\u5e93\u3002\u5c3d\u7ba1\u6211\u4eec\u4f7f\u7528\u6b64\u8bbe\u7f6e\u4f5c\u4e3a\u793a\u4f8b\uff0c\u4f46\u6240\u6d89\u53ca\u7684\u6280\u672f\u53ef\u4ee5\u9002\u5e94\u60a8\u81ea\u5df1\u7684\u670d\u52a1\u5668\u9700\u6c42\u3002<\/p>\n<h3>\u5148\u51b3\u6761\u4ef6<\/h3>\n<p>\u8981\u5f00\u59cb\u5b9e\u8df5\uff0c\u60a8\u9700\u8981\u51c6\u5907\u4e24\u53f0\u5168\u65b0\u7684Ubuntu 22.04\u670d\u52a1\u5668\u3002\u5728\u6bcf\u53f0\u670d\u52a1\u5668\u4e0a\u6dfb\u52a0\u4e00\u4e2a\u5177\u6709sudo\u6743\u9650\u7684\u666e\u901a\u7528\u6237\u8d26\u6237\u3002\u4e3a\u6b64\uff0c\u8bf7\u6309\u7167\u6211\u4eec\u7684Ubuntu 22.04\u521d\u59cb\u670d\u52a1\u5668\u8bbe\u7f6e\u6307\u5357\u8fdb\u884c\u64cd\u4f5c\u3002<\/p>\n<p>\u6211\u4eec\u8981\u4fdd\u62a4\u7684\u5e94\u7528\u7a0b\u5e8f\u8bbe\u7f6e\u57fa\u4e8e\u8fd9\u4e2a\u6307\u5357\u3002\u5982\u679c\u60a8\u60f3\u6309\u7167\u8be5\u793a\u4f8b\u64cd\u4f5c\uff0c\u8bf7\u6309\u7167\u6559\u7a0b\u4e2d\u7684\u6307\u793a\u8bbe\u7f6e\u60a8\u7684\u5e94\u7528\u7a0b\u5e8f\u548c\u6570\u636e\u5e93\u670d\u52a1\u5668\u3002\u5426\u5219\uff0c\u60a8\u53ef\u4ee5\u5c06\u672c\u6587\u4f5c\u4e3a\u901a\u7528\u53c2\u8003\u3002<\/p>\n<h2>\u6b65\u9aa41\u2014\u2014\u8bbe\u7f6e\u9632\u706b\u5899<\/h2>\n<p>\u9996\u5148\uff0c\u60a8\u5c06\u4e3a\u6bcf\u53f0\u670d\u52a1\u5668\u5b9e\u65bd\u57fa\u7ebf\u9632\u706b\u5899\u914d\u7f6e\u3002\u6211\u4eec\u5c06\u91c7\u7528\u4ee5\u5b89\u5168\u4e3a\u4f18\u5148\u7684\u7b56\u7565\u3002\u9664SSH\u6d41\u91cf\u5916\uff0c\u6211\u4eec\u5c06\u51e0\u4e4e\u963b\u6b62\u6240\u6709\u5176\u4ed6\u6d41\u91cf\uff0c\u7136\u540e\u4e3a\u7279\u5b9a\u5e94\u7528\u7a0b\u5e8f\u5728\u9632\u706b\u5899\u4e0a\u6253\u5f00\u5fc5\u8981\u7684\u7aef\u53e3\u3002<\/p>\n<p>\u672c\u6307\u5357\u9075\u5faaiptables\u7684\u8bed\u6cd5\u3002\u5728Ubuntu 22.04\u4e0a\uff0ciptables\u4f1a\u81ea\u52a8\u5b89\u88c5\u5e76\u4f7f\u7528nftables\u540e\u7aef\uff0c\u56e0\u6b64\u60a8\u65e0\u9700\u5b89\u88c5\u4efb\u4f55\u989d\u5916\u5305\u3002<\/p>\n<p>\u4f7f\u7528nano\u6216\u60a8\u559c\u6b22\u7684\u6587\u672c\u7f16\u8f91\u5668\uff0c\u6253\u5f00\/etc\/iptables\/rules.v4\u6587\u4ef6\u3002<\/p>\n<pre class=\"post-pre\"><code><ol><li data-prefix=\"$\"><span class=\"token function\">sudo<\/span> <span class=\"token function\">nano<\/span> \/etc\/iptables\/rules.v4\r\n<\/li><\/ol>\r\n<\/code><\/pre>\n<p>\u4ece\u9632\u706b\u5899\u6a21\u677f\u6307\u5357\u4e2d\u590d\u5236\u914d\u7f6e\u5185\u5bb9\u3002<\/p>\n<div>iptables\u89c4\u5219\u6587\u4ef6\u7684\u8def\u5f84\u4e3a\/etc\/iptables\/rules.v4\u3002<\/div>\n<pre class=\"post-pre\"><code>*filter\r\n# Allow all outgoing, but drop incoming and forwarding packets by default\r\n:INPUT DROP [0:0]\r\n:FORWARD DROP [0:0]\r\n:OUTPUT ACCEPT [0:0]\r\n\r\n# Custom per-protocol chains\r\n:UDP - [0:0]\r\n:TCP - [0:0]\r\n:ICMP - [0:0]\r\n\r\n# Acceptable UDP traffic\r\n\r\n# Acceptable TCP traffic\r\n-A TCP -p tcp --dport 22 -j ACCEPT\r\n\r\n# Acceptable ICMP traffic\r\n\r\n# Boilerplate acceptance policy\r\n-A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT\r\n-A INPUT -i lo -j ACCEPT\r\n\r\n# Drop invalid packets\r\n-A INPUT -m conntrack --ctstate INVALID -j DROP\r\n\r\n# Pass traffic to protocol-specific chains\r\n## Only allow new connections (established and related should already be handled)\r\n## For TCP, additionally only allow new SYN packets since that is the only valid\r\n## method for establishing a new TCP connection\r\n-A INPUT -p udp -m conntrack --ctstate NEW -j UDP\r\n-A INPUT -p tcp --syn -m conntrack --ctstate NEW -j TCP\r\n-A INPUT -p icmp -m conntrack --ctstate NEW -j ICMP\r\n\r\n# Reject anything that's fallen through to this point\r\n## Try to be protocol-specific w\/ rejection message\r\n-A INPUT -p udp -j REJECT --reject-with icmp-port-unreachable\r\n-A INPUT -p tcp -j REJECT --reject-with tcp-reset\r\n-A INPUT -j REJECT --reject-with icmp-proto-unreachable\r\n\r\n# Commit the changes\r\nCOMMIT\r\n\r\n*raw\r\n:PREROUTING ACCEPT [0:0]\r\n:OUTPUT ACCEPT [0:0]\r\nCOMMIT\r\n\r\n*nat\r\n:PREROUTING ACCEPT [0:0]\r\n:INPUT ACCEPT [0:0]\r\n:OUTPUT ACCEPT [0:0]\r\n:POSTROUTING ACCEPT [0:0]\r\nCOMMIT\r\n\r\n*security\r\n:INPUT ACCEPT [0:0]\r\n:FORWARD ACCEPT [0:0]\r\n:OUTPUT ACCEPT [0:0]\r\nCOMMIT\r\n\r\n*mangle\r\n:PREROUTING ACCEPT [0:0]\r\n:INPUT ACCEPT [0:0]\r\n:FORWARD ACCEPT [0:0]\r\n:OUTPUT ACCEPT [0:0]\r\n:POSTROUTING ACCEPT [0:0]\r\nCOMMIT\r\n<\/code><\/pre>\n<p>\u4fdd\u5b58\u5e76\u5173\u95ed\u6587\u4ef6\u3002\u5982\u679c\u60a8\u6b63\u5728\u4f7f\u7528nano\u7f16\u8f91\u5668\uff0c\u8bf7\u6309Ctrl+X\u9000\u51fa\uff0c\u7136\u540e\u5728\u63d0\u793a\u65f6\u6309Y\uff0c\u5e76\u6309Enter\u952e\u786e\u8ba4\u3002<\/p>\n<p>\u5982\u679c\u60a8\u5728\u5b9e\u9645\u73af\u5883\u4e2d\u8fdb\u884c\u5b9e\u65bd\uff0c\u8bf7\u6682\u65f6\u4e0d\u8981\u91cd\u65b0\u52a0\u8f7d\u9632\u706b\u5899\u89c4\u5219\u3002\u6309\u7167\u8fd9\u91cc\u63d0\u4f9b\u7684\u89c4\u5219\u96c6\u52a0\u8f7d\u540e\uff0c\u5c06\u7acb\u5373\u4e2d\u65ad\u5e94\u7528\u7a0b\u5e8f\u548c\u6570\u636e\u5e93\u670d\u52a1\u5668\u4e4b\u95f4\u7684\u8fde\u63a5\u3002\u5728\u91cd\u65b0\u52a0\u8f7d\u4e4b\u524d\uff0c\u60a8\u9700\u8981\u8c03\u6574\u89c4\u5219\u4ee5\u7b26\u5408\u5b9e\u9645\u8fd0\u8425\u9700\u6c42\u3002<\/p>\n<h2>\u7b2c\u4e8c\u6b65\u2014\u2014\u53d1\u73b0\u670d\u52a1\u6b63\u5728\u4f7f\u7528\u7684\u7aef\u53e3<\/h2>\n<p>\u4e3a\u4e86\u5141\u8bb8\u7ec4\u4ef6\u4e4b\u95f4\u901a\u4fe1\uff0c\u60a8\u9700\u8981\u4e86\u89e3\u6b63\u5728\u4f7f\u7528\u7684\u7f51\u7edc\u7aef\u53e3\u3002\u60a8\u53ef\u4ee5\u901a\u8fc7\u68c0\u67e5\u914d\u7f6e\u6587\u4ef6\u627e\u51fa\u6b63\u786e\u7684\u7f51\u7edc\u7aef\u53e3\uff0c\u4f46\u4e00\u4e2a\u4e0d\u4f9d\u8d56\u5177\u4f53\u5e94\u7528\u7684\u7aef\u53e3\u67e5\u627e\u65b9\u6cd5\u662f\u68c0\u67e5\u6bcf\u53f0\u673a\u5668\u4e0a\u54ea\u4e9b\u670d\u52a1\u6b63\u5728\u76d1\u542c\u8fde\u63a5\u3002<\/p>\n<p>\u60a8\u53ef\u4ee5\u4f7f\u7528netstat\u5de5\u5177\u627e\u51fa\u8fd9\u4e9b\u4fe1\u606f\u3002\u7531\u4e8e\u60a8\u7684\u5e94\u7528\u7a0b\u5e8f\u4ec5\u901a\u8fc7IPv4\u901a\u4fe1\uff0c\u6211\u4eec\u5c06\u6dfb\u52a0-4\u53c2\u6570\uff0c\u4f46\u5982\u679c\u60a8\u4e5f\u4f7f\u7528IPv6\uff0c\u53ef\u4ee5\u5c06\u5176\u5220\u9664\u3002\u67e5\u627e\u6b63\u5728\u8fd0\u884c\u7684\u670d\u52a1\u6240\u9700\u7684\u5176\u4ed6\u53c2\u6570\u662f-p\u3001-l\u3001-u\u3001-n\u548c-t\uff0c\u60a8\u53ef\u4ee5\u7ec4\u5408\u4e3a-plunt\u3002<\/p>\n<p>\u8fd9\u4e9b\u53c2\u6570\u7684\u542b\u4e49\u5982\u4e0b\uff1a<\/p>\n<ul class=\"post-ul\">\n<li><strong>p<\/strong>: \u663e\u793a\u6bcf\u4e2a\u5957\u63a5\u5b57\u6240\u5c5e\u7a0b\u5e8f\u7684PID\u548c\u540d\u79f0\u3002<\/li>\n<li><strong>l<\/strong>: \u4ec5\u663e\u793a\u76d1\u542c\u4e2d\u7684\u5957\u63a5\u5b57\u3002<\/li>\n<li><strong>u<\/strong>: \u663e\u793aUDP\u6d41\u91cf\u3002<\/li>\n<li><strong>n<\/strong>: \u663e\u793a\u6570\u5b57\u8f93\u51fa\u800c\u975e\u670d\u52a1\u540d\u79f0\u3002<\/li>\n<li><strong>t<\/strong>: \u663e\u793aTCP\u6d41\u91cf\u3002<\/li>\n<\/ul>\n<pre class=\"post-pre\"><code><ol><li data-prefix=\"web_server$\"><span class=\"token function\">sudo<\/span> <span class=\"token function\">netstat<\/span> <span class=\"token parameter variable\">-4plunt<\/span>\r\n<\/li><\/ol>\r\n<\/code><\/pre>\n<p>\u5728\u60a8\u7684Web\u670d\u52a1\u5668\u4e0a\uff0c\u8f93\u51fa\u53ef\u80fd\u5982\u4e0b\u6240\u793a\uff1a<\/p>\n<pre class=\"post-pre\"><code><div class=\"secondary-code-label\" title=\"Output\">Output<\/div>Active Internet connections (only servers)\r\nProto Recv-Q Send-Q Local Address           Foreign Address         State       PID\/Program name\r\ntcp        0      0 <mark>0.0.0.0:22<\/mark>              0.0.0.0:*               LISTEN      1058\/<mark>sshd<\/mark>\r\ntcp        0      0 <mark>0.0.0.0:80<\/mark>              0.0.0.0:*               LISTEN      4187\/<mark>nginx<\/mark>\r\n<\/code><\/pre>\n<p>\u7b2c\u4e00\u4e2a\u7a81\u51fa\u663e\u793a\u7684\u5217\u663e\u793a\u4e86\u670d\u52a1\u76d1\u542c\u7684IP\u5730\u5740\u548c\u7aef\u53e3\u3002\u7279\u6b8a\u76840.0.0.0\u5730\u5740\u8868\u793a\u6240\u8ba8\u8bba\u7684\u670d\u52a1\u6b63\u5728\u76d1\u542c\u6240\u6709\u53ef\u7528\u5730\u5740\u3002<\/p>\n<p>\u5728\u60a8\u7684\u6570\u636e\u5e93\u670d\u52a1\u5668\u4e0a\uff0c\u8f93\u51fa\u53ef\u80fd\u5982\u4e0b\u6240\u793a\uff1a<\/p>\n<pre class=\"post-pre\"><code><ol><li data-prefix=\"db_server$\"><span class=\"token function\">sudo<\/span> <span class=\"token function\">netstat<\/span> <span class=\"token parameter variable\">-4plunt<\/span>\r\n<\/li><\/ol>\r\n<\/code><\/pre>\n<pre class=\"post-pre\"><code><div class=\"secondary-code-label\" title=\"Output\">Output<\/div>Active Internet connections (only servers)\r\nProto Recv-Q Send-Q Local Address           Foreign Address         State       PID\/Program name\r\ntcp        0      0 <mark>0.0.0.0:22<\/mark>              0.0.0.0:*               LISTEN      1097\/<mark>sshd<\/mark>\r\ntcp        0      0 <mark>192.0.2.30:3306<\/mark>     0.0.0.0:*               LISTEN      3112\/<mark>mysqld<\/mark>\r\n<\/code><\/pre>\n<p>\u672c\u4f8b\u4e2d\uff0c\u60a8\u53ef\u4ee5\u4ee5\u76f8\u540c\u65b9\u5f0f\u89e3\u8bfb\u8fd9\u4e9b\u5217\u3002192.0.2.30\u5730\u5740\u4ee3\u8868\u6570\u636e\u5e93\u670d\u52a1\u5668\u7684\u79c1\u6709IP\u5730\u5740\u3002\u5728\u5148\u51b3\u6761\u4ef6\u6559\u7a0b\u4e2d\uff0c\u51fa\u4e8e\u5b89\u5168\u8003\u8651\uff0c\u60a8\u5df2\u5c06MySQL\u9650\u5236\u4e3a\u79c1\u6709\u63a5\u53e3\u3002<\/p>\n<p>\u5728\u672c\u6b65\u9aa4\u4e2d\uff0c\u8bb0\u5f55\u60a8\u627e\u5230\u7684\u503c\u3002\u8fd9\u4e9b\u662f\u60a8\u8c03\u6574\u9632\u706b\u5899\u914d\u7f6e\u6240\u9700\u7684\u7f51\u7edc\u8be6\u7ec6\u4fe1\u606f\u3002<\/p>\n<p>\u5728\u60a8\u7684Web\u670d\u52a1\u5668\u4e0a\uff0c\u9700\u8981\u786e\u4fdd\u4ee5\u4e0b\u7aef\u53e3\u53ef\u8bbf\u95ee\uff1a<\/p>\n<ul class=\"post-ul\">\n<li>\u6240\u6709\u5730\u5740\u4e0a\u7684\u7aef\u53e380<\/li>\n<li>\u6240\u6709\u5730\u5740\u4e0a\u7684\u7aef\u53e322\uff08\u9632\u706b\u5899\u89c4\u5219\u4e2d\u5df2\u8003\u8651\uff09<\/li>\n<\/ul>\n<p>\u60a8\u7684\u6570\u636e\u5e93\u670d\u52a1\u5668\u9700\u8981\u786e\u4fdd\u4ee5\u4e0b\u7aef\u53e3\u53ef\u8bbf\u95ee\uff1a<\/p>\n<ul class=\"post-ul\">\n<li>\u5730\u5740192.0.2.30\u4e0a\u7684\u7aef\u53e33306\uff08\u6216\u4e0e\u5176\u5173\u8054\u7684\u63a5\u53e3\uff09<\/li>\n<li>\u6240\u6709\u5730\u5740\u4e0a\u7684\u7aef\u53e322\uff08\u9632\u706b\u5899\u89c4\u5219\u4e2d\u5df2\u8003\u8651\uff09<\/li>\n<\/ul>\n<h2>\u7b2c\u4e09\u6b65\u2014\u2014\u8c03\u6574Web\u670d\u52a1\u5668\u9632\u706b\u5899\u89c4\u5219<\/h2>\n<p>\u73b0\u5728\u60a8\u5df2\u83b7\u5f97\u6240\u9700\u7684\u7aef\u53e3\u4fe1\u606f\uff0c\u63a5\u4e0b\u6765\u5c06\u8c03\u6574Web\u670d\u52a1\u5668\u7684\u9632\u706b\u5899\u89c4\u5219\u96c6\u3002\u4ee5sudo\u6743\u9650\u5728\u7f16\u8f91\u5668\u4e2d\u6253\u5f00\u89c4\u5219\u6587\u4ef6\u3002<\/p>\n<pre class=\"post-pre\"><code><ol><li data-prefix=\"web_server$\"><span class=\"token function\">sudo<\/span> <span class=\"token function\">nano<\/span> \/etc\/iptables\/rules.v4\r\n<\/li><\/ol>\r\n<\/code><\/pre>\n<p>\u5728Web\u670d\u52a1\u5668\u4e0a\uff0c\u60a8\u9700\u8981\u5c06\u7aef\u53e380\u6dfb\u52a0\u5230\u53ef\u63a5\u53d7\u7684\u6d41\u91cf\u5217\u8868\u4e2d\u3002\u7531\u4e8e\u8be5\u670d\u52a1\u5668\u6b63\u5728\u76d1\u542c\u6240\u6709\u53ef\u7528\u5730\u5740\uff08\u901a\u5e38Web\u670d\u52a1\u5668\u5e0c\u671b\u4ece\u4efb\u4f55\u4f4d\u7f6e\u90fd\u80fd\u8bbf\u95ee\uff09\uff0c\u60a8\u4e0d\u4f1a\u901a\u8fc7\u63a5\u53e3\u6216\u76ee\u6807\u5730\u5740\u9650\u5236\u89c4\u5219\u3002<\/p>\n<p>\u60a8\u7684\u7f51\u7edc\u8bbf\u95ee\u8005\u5c06\u4f7f\u7528TCP\u534f\u8bae\u8fde\u63a5\u3002\u60a8\u7684\u6846\u67b6\u5df2\u6709\u4e00\u4e2a\u540d\u4e3aTCP\u7684\u81ea\u5b9a\u4e49\u94fe\u7528\u4e8e\u5904\u7406TCP\u5e94\u7528\u7a0b\u5e8f\u5f02\u5e38\u3002\u60a8\u53ef\u4ee5\u5728\u8be5\u94fe\u4e0a\u7684SSH\u7aef\u53e3\u5f02\u5e38\u540e\u6dfb\u52a0\u7aef\u53e380\u3002<\/p>\n<div>\/etc\/iptables\/rules.v4\uff1a<\/div>\n<pre class=\"post-pre\"><code>*filter\r\n. . .\r\n\r\n# Acceptable TCP traffic\r\n-A TCP -p tcp --dport 22 -j ACCEPT\r\n<mark>-A TCP -p tcp --dport 80 -j ACCEPT<\/mark>\r\n\r\n. . .\r\n<\/code><\/pre>\n<p>\u60a8\u7684Web\u670d\u52a1\u5668\u5c06\u53d1\u8d77\u4e0e\u6570\u636e\u5e93\u670d\u52a1\u5668\u7684\u8fde\u63a5\u3002\u60a8\u7684\u51fa\u7ad9\u6d41\u91cf\u5728\u9632\u706b\u5899\u4e2d\u6ca1\u6709\u4efb\u4f55\u9650\u5236\uff0c\u5df2\u5efa\u7acb\u8fde\u63a5\u76f8\u5173\u7684\u5165\u7ad9\u6d41\u91cf\u4e5f\u88ab\u5141\u8bb8\uff0c\u56e0\u6b64\u60a8\u65e0\u9700\u5728\u6b64\u670d\u52a1\u5668\u4e0a\u6253\u5f00\u4efb\u4f55\u989d\u5916\u7aef\u53e3\u6765\u5141\u8bb8\u6b64\u8fde\u63a5\u3002<\/p>\n<p>\u5b8c\u6210\u540e\uff0c\u4fdd\u5b58\u5e76\u5173\u95ed\u6587\u4ef6\u3002\u60a8\u7684Web\u670d\u52a1\u5668\u73b0\u5728\u62e5\u6709\u5141\u8bb8\u6240\u6709\u5408\u6cd5\u6d41\u91cf\u540c\u65f6\u963b\u6b62\u5176\u4ed6\u6240\u6709\u6d41\u91cf\u7684\u9632\u706b\u5899\u7b56\u7565\u3002<\/p>\n<p>\u6d4b\u8bd5\u60a8\u7684\u89c4\u5219\u6587\u4ef6\u662f\u5426\u6709\u8bed\u6cd5\u9519\u8bef\u3002<\/p>\n<pre class=\"post-pre\"><code><ol><li data-prefix=\"web_server$\"><span class=\"token function\">sudo<\/span> iptables-restore <span class=\"token parameter variable\">-t<\/span> <span class=\"token operator\">&lt;<\/span> \/etc\/iptables\/rules.v4\r\n<\/li><\/ol>\r\n<\/code><\/pre>\n<p>\u5982\u679c\u672a\u663e\u793a\u8bed\u6cd5\u9519\u8bef\uff0c\u8bf7\u91cd\u65b0\u52a0\u8f7d\u9632\u706b\u5899\u4ee5\u5b9e\u65bd\u65b0\u89c4\u5219\u96c6\u3002<\/p>\n<pre class=\"post-pre\"><code><ol><li data-prefix=\"web_server$\"><span class=\"token function\">sudo<\/span> <span class=\"token function\">service<\/span> iptables-persistent reload\r\n<\/li><\/ol>\r\n<\/code><\/pre>\n<h2>\u7b2c\u56db\u6b65 \u2014 \u8c03\u6574\u6570\u636e\u5e93\u670d\u52a1\u5668\u9632\u706b\u5899\u89c4\u5219<\/h2>\n<p>\u5728\u6570\u636e\u5e93\u670d\u52a1\u5668\u4e0a\uff0c\u60a8\u9700\u8981\u5141\u8bb8\u8bbf\u95ee\u670d\u52a1\u5668\u79c1\u6709IP\u5730\u5740\u4e0a\u76843306\u7aef\u53e3\u3002\u5728\u672c\u4f8b\u4e2d\uff0c\u8be5\u5730\u5740\u4e3a192.0.2.30\u3002\u60a8\u53ef\u4ee5\u6839\u636e\u8be5\u5730\u5740\u9650\u5236\u8bbf\u95ee\uff0c\u4e5f\u53ef\u4ee5\u901a\u8fc7\u5339\u914d\u5206\u914d\u4e86\u8be5\u5730\u5740\u7684\u63a5\u53e3\u6765\u9650\u5236\u8bbf\u95ee\u3002<\/p>\n<p>\u8981\u627e\u5230\u4e0e\u8be5\u5730\u5740\u5173\u8054\u7684\u7f51\u7edc\u63a5\u53e3\uff0c\u8bf7\u8fd0\u884c ip -4 addr show scope global\u3002<\/p>\n<pre class=\"post-pre\"><code><ol><li data-prefix=\"db_server$\"><span class=\"token function\">ip<\/span> <span class=\"token parameter variable\">-4<\/span> addr show scope global\r\n<\/li><\/ol>\r\n<\/code><\/pre>\n<pre class=\"post-pre\"><code><div class=\"secondary-code-label\" title=\"Output\">Output<\/div>2: eth0: &lt;BROADCAST,MULTICAST,UP,LOWER_UP&gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000\r\n    inet 203.0.113.5\/24 brd 104.236.113.255 scope global eth0\r\n       valid_lft forever preferred_lft forever\r\n3: <mark>eth1<\/mark>: &lt;BROADCAST,MULTICAST,UP,LOWER_UP&gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000\r\n    inet <mark>192.0.2.30<\/mark>\/24 brd 192.0.2.255 scope global eth1\r\n       valid_lft forever preferred_lft forever\r\n<\/code><\/pre>\n<p>\u7a81\u51fa\u663e\u793a\u7684\u533a\u57df\u8868\u660eeth1\u63a5\u53e3\u4e0e\u8be5\u5730\u5740\u5173\u8054\u3002<\/p>\n<p>\u63a5\u4e0b\u6765\uff0c\u60a8\u5c06\u8c03\u6574\u6570\u636e\u5e93\u670d\u52a1\u5668\u4e0a\u7684\u9632\u706b\u5899\u89c4\u5219\u3002\u5728\u6570\u636e\u5e93\u670d\u52a1\u5668\u4e0a\u4ee5sudo\u6743\u9650\u6253\u5f00\u89c4\u5219\u6587\u4ef6\u3002<\/p>\n<pre class=\"post-pre\"><code><ol><li data-prefix=\"db_server$\"><span class=\"token function\">sudo<\/span> <span class=\"token function\">nano<\/span> \/etc\/iptables\/rules.v4\r\n<\/li><\/ol>\r\n<\/code><\/pre>\n<p>\u540c\u6837\uff0c\u60a8\u5c06\u5728TCP\u94fe\u4e2d\u6dfb\u52a0\u4e00\u6761\u89c4\u5219\uff0c\u4e3aWeb\u548c\u6570\u636e\u5e93\u670d\u52a1\u5668\u95f4\u7684\u8fde\u63a5\u521b\u5efa\u4f8b\u5916\u3002<\/p>\n<p>\u8981\u6839\u636e\u5b9e\u9645\u5730\u5740\u9650\u5236\u8bbf\u95ee\u6743\u9650\uff0c\u60a8\u53ef\u4ee5\u6dfb\u52a0\u5982\u4e0b\u89c4\u5219\uff1a<\/p>\n<div>\/etc\/iptables\/rules.v4<\/div>\n<pre class=\"post-pre\"><code>*filter\r\n. . .\r\n\r\n# Acceptable TCP traffic\r\n-A TCP -p tcp --dport 22 -j ACCEPT\r\n<mark>-A TCP -p tcp --dport 3306 -d 192.0.2.30 -j ACCEPT<\/mark>\r\n\r\n. . .\r\n<\/code><\/pre>\n<p>\u5982\u679c\u60a8\u66f4\u503e\u5411\u4e8e\u6839\u636e\u5305\u542b\u8be5\u5730\u5740\u7684\u63a5\u53e3\u5141\u8bb8\u4f8b\u5916\u60c5\u51b5\uff0c\u53ef\u4ee5\u6dfb\u52a0\u7c7b\u4f3c\u6b64\u89c4\u5219\uff1a<\/p>\n<div>\/etc\/iptables\/rules.v4<\/div>\n<pre class=\"post-pre\"><code>*filter\r\n. . .\r\n\r\n# Acceptable TCP traffic\r\n-A TCP -p tcp --dport 22 -j ACCEPT\r\n<mark>-A TCP -p tcp --dport 3306 -i eth1 -j ACCEPT<\/mark>\r\n\r\n. . .\r\n<\/code><\/pre>\n<p>\u5b8c\u6210\u540e\u4fdd\u5b58\u5e76\u5173\u95ed\u6587\u4ef6\u3002<\/p>\n<p>\u4f7f\u7528\u6b64\u547d\u4ee4\u68c0\u67e5\u8bed\u6cd5\u9519\u8bef\u3002<\/p>\n<pre class=\"post-post-pre\"><code><ol><li data-prefix=\"db_server$\"><span class=\"token function\">sudo<\/span> iptables-restore <span class=\"token parameter variable\">-t<\/span> <span class=\"token operator\">&lt;<\/span> \/etc\/iptables\/rules.v4\r\n<\/li><\/ol>\r\n<\/code><\/pre>\n<p>\u51c6\u5907\u5c31\u7eea\u540e\uff0c\u91cd\u65b0\u52a0\u8f7d\u9632\u706b\u5899\u89c4\u5219\u3002<\/p>\n<pre class=\"post-pre\"><code><ol><li data-prefix=\"db_server$\"><span class=\"token function\">sudo<\/span> <span class=\"token function\">service<\/span> iptables-persistent reload\r\n<\/li><\/ol>\r\n<\/code><\/pre>\n<p>\u60a8\u7684\u4e24\u53f0\u670d\u52a1\u5668\u73b0\u5728\u5e94\u8be5\u90fd\u5f97\u5230\u4e86\u59a5\u5584\u4fdd\u62a4\uff0c\u540c\u65f6\u5fc5\u8981\u7684\u6570\u636e\u6d41\u4e0d\u53d7\u9650\u5236\u3002<\/p>\n<h2>\u7ed3\u8bba<\/h2>\n<p>\u5728\u8bbe\u7f6e\u5e94\u7528\u7a0b\u5e8f\u65f6\uff0c\u59cb\u7ec8\u5c06\u5b9e\u65bd\u9002\u5f53\u7684\u9632\u706b\u5899\u4f5c\u4e3a\u90e8\u7f72\u8ba1\u5212\u7684\u91cd\u8981\u7ec4\u6210\u90e8\u5206\u3002\u5c3d\u7ba1\u6211\u4eec\u5728\u4e0a\u8ff0\u6f14\u793a\u4e2d\u4f7f\u7528\u4e86\u8fd0\u884cNginx\u548cMySQL\u7684\u4e24\u53f0\u670d\u52a1\u5668\uff0c\u4f46\u6240\u6f14\u793a\u7684\u6280\u672f\u65e0\u8bba\u60a8\u9009\u62e9\u4f55\u79cd\u5177\u4f53\u6280\u672f\u90fd\u9002\u7528\u3002<\/p>\n<p>\u8981\u66f4\u6df1\u5165\u4e86\u89e3\u9632\u706b\u5899\u548ciptables\uff0c\u8bf7\u53c2\u8003\u4ee5\u4e0b\u6307\u5357\uff1a<\/p>\n<ul class=\"post-ul\">\n<li>How To Choose an Effective Firewall Policy to Secure your Servers<\/li>\n<li>A Deep Dive into Iptables and Netfilter Architecture<\/li>\n<li>How To Test your Firewall Configuration with Nmap and Tcpdump<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u5f15\u8a00 \u5c06\u5e94\u7528\u7a0b\u5e8f\u7684\u79bb\u6563\u7ec4\u4ef6\u90e8\u7f72\u5230\u4e0d\u540c\u8282\u70b9\u4e0a\u662f\u964d\u4f4e\u8d1f\u8f7d\u5e76\u5b9e\u73b0\u6a2a\u5411\u6269\u5c55\u7684\u5e38\u89c1\u505a\u6cd5\u3002\u4e00\u4e2a\u5178\u578b\u7684\u4f8b\u5b50\u662f\u5c06\u6570\u636e\u5e93\u914d\u7f6e\u5728\u4e0e [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[212,218,215,213,216,214,217],"class_list":["post-17","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-iptables","tag-linux","tag-ubuntu","tag-213","tag-216","tag-214","tag-217"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.5 (Yoast SEO v21.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Iptables\u9632\u706b\u5899\u914d\u7f6e\u8be6\u89e3\uff1a\u4fdd\u62a4\u670d\u52a1\u5668\u95f4\u901a\u4fe1\u5b89\u5168<\/title>\n<meta name=\"description\" content=\"\u8be6\u89e3\u5982\u4f55\u5728Ubuntu\u670d\u52a1\u5668\u4e0a\u914d\u7f6eIptables\u9632\u706b\u5899\uff0c\u4fdd\u62a4\u670d\u52a1\u5668\u95f4\u901a\u4fe1\u5b89\u5168\uff0c\u63a7\u5236\u7f51\u7edc\u6d41\u91cf\uff0c\u63d0\u5347\u7cfb\u7edf\u5b89\u5168\u6027\u3002\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.silicloud.com\/zh\/blog\/\u5982\u4f55\u8bbe\u7f6eiptables\u9632\u706b\u5899\u4ee5\u4fdd\u62a4\u670d\u52a1\u5668\u4e4b\u95f4\u7684\u6d41\u91cf\/\" \/>\n<meta property=\"og:locale\" content=\"zh_CN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Iptables\u9632\u706b\u5899\u914d\u7f6e\u8be6\u89e3\uff1a\u4fdd\u62a4\u670d\u52a1\u5668\u95f4\u901a\u4fe1\u5b89\u5168\" \/>\n<meta property=\"og:description\" content=\"\u8be6\u89e3\u5982\u4f55\u5728Ubuntu\u670d\u52a1\u5668\u4e0a\u914d\u7f6eIptables\u9632\u706b\u5899\uff0c\u4fdd\u62a4\u670d\u52a1\u5668\u95f4\u901a\u4fe1\u5b89\u5168\uff0c\u63a7\u5236\u7f51\u7edc\u6d41\u91cf\uff0c\u63d0\u5347\u7cfb\u7edf\u5b89\u5168\u6027\u3002\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.silicloud.com\/zh\/blog\/\u5982\u4f55\u8bbe\u7f6eiptables\u9632\u706b\u5899\u4ee5\u4fdd\u62a4\u670d\u52a1\u5668\u4e4b\u95f4\u7684\u6d41\u91cf\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog - Silicon Cloud\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-07T05:50:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-31T01:00:56+00:00\" \/>\n<meta name=\"author\" content=\"\u5b87, \u534e\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"\u5b87, \u534e\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 \u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.silicloud.com\/zh\/blog\/%e5%a6%82%e4%bd%95%e8%ae%be%e7%bd%aeiptables%e9%98%b2%e7%81%ab%e5%a2%99%e4%bb%a5%e4%bf%9d%e6%8a%a4%e6%9c%8d%e5%8a%a1%e5%99%a8%e4%b9%8b%e9%97%b4%e7%9a%84%e6%b5%81%e9%87%8f\/\",\"url\":\"https:\/\/www.silicloud.com\/zh\/blog\/%e5%a6%82%e4%bd%95%e8%ae%be%e7%bd%aeiptables%e9%98%b2%e7%81%ab%e5%a2%99%e4%bb%a5%e4%bf%9d%e6%8a%a4%e6%9c%8d%e5%8a%a1%e5%99%a8%e4%b9%8b%e9%97%b4%e7%9a%84%e6%b5%81%e9%87%8f\/\",\"name\":\"Iptables\u9632\u706b\u5899\u914d\u7f6e\u8be6\u89e3\uff1a\u4fdd\u62a4\u670d\u52a1\u5668\u95f4\u901a\u4fe1\u5b89\u5168\",\"isPartOf\":{\"@id\":\"https:\/\/www.silicloud.com\/zh\/blog\/#website\"},\"datePublished\":\"2023-08-07T05:50:40+00:00\",\"dateModified\":\"2025-07-31T01:00:56+00:00\",\"author\":{\"@id\":\"https:\/\/www.silicloud.com\/zh\/blog\/#\/schema\/person\/513018e4e121d3add1b7c5de8be21458\"},\"description\":\"\u8be6\u89e3\u5982\u4f55\u5728Ubuntu\u670d\u52a1\u5668\u4e0a\u914d\u7f6eIptables\u9632\u706b\u5899\uff0c\u4fdd\u62a4\u670d\u52a1\u5668\u95f4\u901a\u4fe1\u5b89\u5168\uff0c\u63a7\u5236\u7f51\u7edc\u6d41\u91cf\uff0c\u63d0\u5347\u7cfb\u7edf\u5b89\u5168\u6027\u3002\",\"breadcrumb\":{\"@id\":\"https:\/\/www.silicloud.com\/zh\/blog\/%e5%a6%82%e4%bd%95%e8%ae%be%e7%bd%aeiptables%e9%98%b2%e7%81%ab%e5%a2%99%e4%bb%a5%e4%bf%9d%e6%8a%a4%e6%9c%8d%e5%8a%a1%e5%99%a8%e4%b9%8b%e9%97%b4%e7%9a%84%e6%b5%81%e9%87%8f\/#breadcrumb\"},\"inLanguage\":\"zh-Hans\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.silicloud.com\/zh\/blog\/%e5%a6%82%e4%bd%95%e8%ae%be%e7%bd%aeiptables%e9%98%b2%e7%81%ab%e5%a2%99%e4%bb%a5%e4%bf%9d%e6%8a%a4%e6%9c%8d%e5%8a%a1%e5%99%a8%e4%b9%8b%e9%97%b4%e7%9a%84%e6%b5%81%e9%87%8f\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.silicloud.com\/zh\/blog\/%e5%a6%82%e4%bd%95%e8%ae%be%e7%bd%aeiptables%e9%98%b2%e7%81%ab%e5%a2%99%e4%bb%a5%e4%bf%9d%e6%8a%a4%e6%9c%8d%e5%8a%a1%e5%99%a8%e4%b9%8b%e9%97%b4%e7%9a%84%e6%b5%81%e9%87%8f\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9875\",\"item\":\"https:\/\/www.silicloud.com\/zh\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Iptables\u9632\u706b\u5899\u914d\u7f6e\u8be6\u89e3\uff1a\u4fdd\u62a4\u670d\u52a1\u5668\u95f4\u901a\u4fe1\u5b89\u5168\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.silicloud.com\/zh\/blog\/#website\",\"url\":\"https:\/\/www.silicloud.com\/zh\/blog\/\",\"name\":\"Blog - Silicon Cloud\",\"description\":\"\",\"inLanguage\":\"zh-Hans\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.silicloud.com\/zh\/blog\/#\/schema\/person\/513018e4e121d3add1b7c5de8be21458\",\"name\":\"\u5b87, \u534e\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\/\/www.silicloud.com\/zh\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/63cd45cbc05a35fc4ff7637a163c83c4962ef58d27472726c3a3e0c9c5194f0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/63cd45cbc05a35fc4ff7637a163c83c4962ef58d27472726c3a3e0c9c5194f0f?s=96&d=mm&r=g\",\"caption\":\"\u5b87, \u534e\"},\"url\":\"https:\/\/www.silicloud.com\/zh\/blog\/author\/yuhua\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\/\/www.silicloud.com\/zh\/blog\/%e5%a6%82%e4%bd%95%e8%ae%be%e7%bd%aeiptables%e9%98%b2%e7%81%ab%e5%a2%99%e4%bb%a5%e4%bf%9d%e6%8a%a4%e6%9c%8d%e5%8a%a1%e5%99%a8%e4%b9%8b%e9%97%b4%e7%9a%84%e6%b5%81%e9%87%8f\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Blog - Silicon Cloud\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Iptables\u9632\u706b\u5899\u914d\u7f6e\u8be6\u89e3\uff1a\u4fdd\u62a4\u670d\u52a1\u5668\u95f4\u901a\u4fe1\u5b89\u5168","description":"\u8be6\u89e3\u5982\u4f55\u5728Ubuntu\u670d\u52a1\u5668\u4e0a\u914d\u7f6eIptables\u9632\u706b\u5899\uff0c\u4fdd\u62a4\u670d\u52a1\u5668\u95f4\u901a\u4fe1\u5b89\u5168\uff0c\u63a7\u5236\u7f51\u7edc\u6d41\u91cf\uff0c\u63d0\u5347\u7cfb\u7edf\u5b89\u5168\u6027\u3002","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.silicloud.com\/zh\/blog\/\u5982\u4f55\u8bbe\u7f6eiptables\u9632\u706b\u5899\u4ee5\u4fdd\u62a4\u670d\u52a1\u5668\u4e4b\u95f4\u7684\u6d41\u91cf\/","og_locale":"zh_CN","og_type":"article","og_title":"Iptables\u9632\u706b\u5899\u914d\u7f6e\u8be6\u89e3\uff1a\u4fdd\u62a4\u670d\u52a1\u5668\u95f4\u901a\u4fe1\u5b89\u5168","og_description":"\u8be6\u89e3\u5982\u4f55\u5728Ubuntu\u670d\u52a1\u5668\u4e0a\u914d\u7f6eIptables\u9632\u706b\u5899\uff0c\u4fdd\u62a4\u670d\u52a1\u5668\u95f4\u901a\u4fe1\u5b89\u5168\uff0c\u63a7\u5236\u7f51\u7edc\u6d41\u91cf\uff0c\u63d0\u5347\u7cfb\u7edf\u5b89\u5168\u6027\u3002","og_url":"https:\/\/www.silicloud.com\/zh\/blog\/\u5982\u4f55\u8bbe\u7f6eiptables\u9632\u706b\u5899\u4ee5\u4fdd\u62a4\u670d\u52a1\u5668\u4e4b\u95f4\u7684\u6d41\u91cf\/","og_site_name":"Blog - Silicon Cloud","article_published_time":"2023-08-07T05:50:40+00:00","article_modified_time":"2025-07-31T01:00:56+00:00","author":"\u5b87, \u534e","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"\u5b87, \u534e","\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4":"1 \u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.silicloud.com\/zh\/blog\/%e5%a6%82%e4%bd%95%e8%ae%be%e7%bd%aeiptables%e9%98%b2%e7%81%ab%e5%a2%99%e4%bb%a5%e4%bf%9d%e6%8a%a4%e6%9c%8d%e5%8a%a1%e5%99%a8%e4%b9%8b%e9%97%b4%e7%9a%84%e6%b5%81%e9%87%8f\/","url":"https:\/\/www.silicloud.com\/zh\/blog\/%e5%a6%82%e4%bd%95%e8%ae%be%e7%bd%aeiptables%e9%98%b2%e7%81%ab%e5%a2%99%e4%bb%a5%e4%bf%9d%e6%8a%a4%e6%9c%8d%e5%8a%a1%e5%99%a8%e4%b9%8b%e9%97%b4%e7%9a%84%e6%b5%81%e9%87%8f\/","name":"Iptables\u9632\u706b\u5899\u914d\u7f6e\u8be6\u89e3\uff1a\u4fdd\u62a4\u670d\u52a1\u5668\u95f4\u901a\u4fe1\u5b89\u5168","isPartOf":{"@id":"https:\/\/www.silicloud.com\/zh\/blog\/#website"},"datePublished":"2023-08-07T05:50:40+00:00","dateModified":"2025-07-31T01:00:56+00:00","author":{"@id":"https:\/\/www.silicloud.com\/zh\/blog\/#\/schema\/person\/513018e4e121d3add1b7c5de8be21458"},"description":"\u8be6\u89e3\u5982\u4f55\u5728Ubuntu\u670d\u52a1\u5668\u4e0a\u914d\u7f6eIptables\u9632\u706b\u5899\uff0c\u4fdd\u62a4\u670d\u52a1\u5668\u95f4\u901a\u4fe1\u5b89\u5168\uff0c\u63a7\u5236\u7f51\u7edc\u6d41\u91cf\uff0c\u63d0\u5347\u7cfb\u7edf\u5b89\u5168\u6027\u3002","breadcrumb":{"@id":"https:\/\/www.silicloud.com\/zh\/blog\/%e5%a6%82%e4%bd%95%e8%ae%be%e7%bd%aeiptables%e9%98%b2%e7%81%ab%e5%a2%99%e4%bb%a5%e4%bf%9d%e6%8a%a4%e6%9c%8d%e5%8a%a1%e5%99%a8%e4%b9%8b%e9%97%b4%e7%9a%84%e6%b5%81%e9%87%8f\/#breadcrumb"},"inLanguage":"zh-Hans","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.silicloud.com\/zh\/blog\/%e5%a6%82%e4%bd%95%e8%ae%be%e7%bd%aeiptables%e9%98%b2%e7%81%ab%e5%a2%99%e4%bb%a5%e4%bf%9d%e6%8a%a4%e6%9c%8d%e5%8a%a1%e5%99%a8%e4%b9%8b%e9%97%b4%e7%9a%84%e6%b5%81%e9%87%8f\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.silicloud.com\/zh\/blog\/%e5%a6%82%e4%bd%95%e8%ae%be%e7%bd%aeiptables%e9%98%b2%e7%81%ab%e5%a2%99%e4%bb%a5%e4%bf%9d%e6%8a%a4%e6%9c%8d%e5%8a%a1%e5%99%a8%e4%b9%8b%e9%97%b4%e7%9a%84%e6%b5%81%e9%87%8f\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9875","item":"https:\/\/www.silicloud.com\/zh\/blog\/"},{"@type":"ListItem","position":2,"name":"Iptables\u9632\u706b\u5899\u914d\u7f6e\u8be6\u89e3\uff1a\u4fdd\u62a4\u670d\u52a1\u5668\u95f4\u901a\u4fe1\u5b89\u5168"}]},{"@type":"WebSite","@id":"https:\/\/www.silicloud.com\/zh\/blog\/#website","url":"https:\/\/www.silicloud.com\/zh\/blog\/","name":"Blog - Silicon Cloud","description":"","inLanguage":"zh-Hans"},{"@type":"Person","@id":"https:\/\/www.silicloud.com\/zh\/blog\/#\/schema\/person\/513018e4e121d3add1b7c5de8be21458","name":"\u5b87, \u534e","image":{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/www.silicloud.com\/zh\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/63cd45cbc05a35fc4ff7637a163c83c4962ef58d27472726c3a3e0c9c5194f0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/63cd45cbc05a35fc4ff7637a163c83c4962ef58d27472726c3a3e0c9c5194f0f?s=96&d=mm&r=g","caption":"\u5b87, \u534e"},"url":"https:\/\/www.silicloud.com\/zh\/blog\/author\/yuhua\/"},{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/www.silicloud.com\/zh\/blog\/%e5%a6%82%e4%bd%95%e8%ae%be%e7%bd%aeiptables%e9%98%b2%e7%81%ab%e5%a2%99%e4%bb%a5%e4%bf%9d%e6%8a%a4%e6%9c%8d%e5%8a%a1%e5%99%a8%e4%b9%8b%e9%97%b4%e7%9a%84%e6%b5%81%e9%87%8f\/#local-main-organization-logo","url":"","contentUrl":"","caption":"Blog - Silicon Cloud"}]}},"_links":{"self":[{"href":"https:\/\/www.silicloud.com\/zh\/blog\/wp-json\/wp\/v2\/posts\/17","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.silicloud.com\/zh\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.silicloud.com\/zh\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.silicloud.com\/zh\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.silicloud.com\/zh\/blog\/wp-json\/wp\/v2\/comments?post=17"}],"version-history":[{"count":5,"href":"https:\/\/www.silicloud.com\/zh\/blog\/wp-json\/wp\/v2\/posts\/17\/revisions"}],"predecessor-version":[{"id":109434,"href":"https:\/\/www.silicloud.com\/zh\/blog\/wp-json\/wp\/v2\/posts\/17\/revisions\/109434"}],"wp:attachment":[{"href":"https:\/\/www.silicloud.com\/zh\/blog\/wp-json\/wp\/v2\/media?parent=17"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.silicloud.com\/zh\/blog\/wp-json\/wp\/v2\/categories?post=17"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.silicloud.com\/zh\/blog\/wp-json\/wp\/v2\/tags?post=17"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}