/linux-6.3-rc2/tools/testing/selftests/netfilter/ |
A D | rpath.sh | 8 if iptables-legacy --version >/dev/null 2>&1; then 9 iptables='iptables-legacy' 10 elif iptables --version >/dev/null 2>&1; then 11 iptables='iptables' 13 iptables='' 30 if [ -z "$iptables$ip6tables$nft" ]; then 65 [ -n "$iptables" ] && { 67 ip netns exec "$ns2" "$iptables" $common -m rpfilter 68 ip netns exec "$ns2" "$iptables" $common -m rpfilter --invert 116 [ -n "$iptables" ] && ip netns exec "$ns2" "$iptables" -t raw -Z [all …]
|
A D | nf_nat_edemux.sh | 27 iptables --version > /dev/null 2>&1 71 ip netns exec $ns2 iptables -t nat -A OUTPUT -d 10.96.0.1/32 -p tcp --dport 443 -j DNAT --to-destin…
|
A D | conntrack_tcp_unreplied.sh | 79 ip netns exec $ns1 iptables -A INPUT -m state --state established,related -j ACCEPT
|
A D | ipip-conntrack-mtu.sh | 206 ip netns exec ${r_a} iptables -A FORWARD -m conntrack --ctstate NEW
|
/linux-6.3-rc2/Documentation/networking/ |
A D | tproxy.rst | 19 # iptables -t mangle -N DIVERT 20 # iptables -t mangle -A PREROUTING -p tcp -m socket -j DIVERT 21 # iptables -t mangle -A DIVERT -j MARK --set-mark 1 22 # iptables -t mangle -A DIVERT -j ACCEPT 59 usually done with the iptables REDIRECT target; however, there are serious 67 add rules like this to the iptables ruleset above:: 69 # iptables -t mangle -A PREROUTING -p tcp --dport 80 -j TPROXY \ 87 To use tproxy you'll need to have the following modules compiled for iptables: 105 the HTTP listener you redirect traffic to with the TPROXY iptables
|
/linux-6.3-rc2/Documentation/admin-guide/cgroup-v1/ |
A D | net_cls.rst | 10 Also, Netfilter (iptables) can use this tag to perform 42 configuring iptables, basic example:: 44 iptables -A OUTPUT -m cgroup ! --cgroup 0x100001 -j DROP
|
/linux-6.3-rc2/net/ipv4/netfilter/ |
A D | Kconfig | 124 iptables is a general, extensible packet identification framework. 179 local output. See the man page for iptables(8). 210 tristate "iptables NAT support" 216 This enables the `nat' table in iptables. This allows masquerading, 256 This option adds a `mangle' table to iptables: see the man page for 257 iptables(8). This table is used for various packet alterations 267 This option adds a `ECN' target, which can be used in the iptables mangle 290 This option adds a `raw' table to iptables. This table is the very 303 This option adds a `security' table to iptables, for use
|
/linux-6.3-rc2/tools/testing/selftests/bpf/prog_tests/ |
A D | bpf_nf.c | 52 const char *iptables = "iptables-legacy -t raw %s PREROUTING -j CONNMARK --set-mark 42/0"; in test_bpf_nf_ct() local 71 snprintf(cmd, sizeof(cmd), iptables, "-A"); in test_bpf_nf_ct() 132 snprintf(cmd, sizeof(cmd), iptables, "-D"); in test_bpf_nf_ct()
|
/linux-6.3-rc2/tools/testing/selftests/wireguard/ |
A D | netns.sh | 199 n0 iptables -A INPUT -m length --length 1360 -j DROP 205 n0 iptables -F INPUT 337 n0 iptables -t nat -A POSTROUTING -s 192.168.1.0/24 -d 10.0.0.0/24 -j SNAT --to 10.0.0.1 351 n1 iptables -t mangle -I OUTPUT -j MARK --set-xmark 1 354 n1 iptables -t mangle -D OUTPUT -j MARK --set-xmark 1 388 n2 iptables -t nat -A POSTROUTING -s 10.0.0.0/24 -d 192.168.241.0/24 -j SNAT --to 192.168.241.2 389 n0 iptables -t filter -A INPUT \! -s 10.0.0.0/24 -i vethrs -j DROP # Manual rpfilter just to be exp… 395 n0 iptables -t nat -F 396 n0 iptables -t filter -F 397 n2 iptables -t nat -F
|
/linux-6.3-rc2/tools/testing/selftests/net/mptcp/ |
A D | mptcp_sockopt.sh | 26 for t in iptables ip6tables; do 93 iptables -V > /dev/null 2>&1 110 local tables=iptables
|
/linux-6.3-rc2/samples/bpf/ |
A D | run_cookie_uid_helper_example.sh | 8 iptables -D OUTPUT -m bpf --object-pinned ${mnt_dir}/bpf_prog -j ACCEPT
|
/linux-6.3-rc2/tools/testing/selftests/net/ |
A D | xfrm_policy.sh | 186 ip netns exec $ns iptables-save -c |grep policy | ( read c rest 187 ip netns exec $ns iptables -Z 344 iptables --version 2>/dev/null >/dev/null 402 ip netns exec ns3 iptables -p icmp -A FORWARD -m policy --dir out --pol ipsec 403 ip netns exec ns4 iptables -p icmp -A FORWARD -m policy --dir out --pol ipsec
|
A D | udpgro_fwd.sh | 100 local ipt=iptables 186 IPT=iptables
|
A D | udpgro.sh | 77 ipt_cmd=iptables
|
A D | amt.sh | 162 ip netns exec "${RELAY}" iptables -t mangle -I PREROUTING \
|
/linux-6.3-rc2/net/bridge/ |
A D | Kconfig | 25 If you enable iptables support along with the bridge support then you 27 iptables will then see the IP packets being bridged, so you need to
|
/linux-6.3-rc2/net/ipv6/netfilter/ |
A D | Kconfig | 192 local output. See the man page for iptables(8). 225 This option adds a `mangle' table to iptables: see the man page for 226 iptables(8). This table is used for various packet alterations 247 This option adds a `security' table to iptables, for use
|
/linux-6.3-rc2/net/bridge/netfilter/ |
A D | Kconfig | 132 equivalent of the iptables limit match. 142 This value is the same as the one used in the iptables mark match and 197 This value is the same as the one used in the iptables mark match and
|
/linux-6.3-rc2/tools/testing/selftests/wireguard/qemu/ |
A D | Makefile | 43 $(eval $(call tar_download,IPTABLES,iptables,1.8.7,.tar.bz2,https://www.netfilter.org/projects/ipta… 341 …)/bash $(IPROUTE2_PATH)/misc/ss $(IPROUTE2_PATH)/ip/ip $(IPTABLES_PATH)/iptables/xtables-legacy-mu… 430 $(IPTABLES_PATH)/iptables/xtables-legacy-multi: | $(IPTABLES_PATH)/.installed $(USERSPACE_DEPS)
|
/linux-6.3-rc2/net/netfilter/ |
A D | Kconfig | 432 controlled by iptables, ip6tables or nft. 828 This target can be used to fill in the checksum using iptables 1091 For it to work you will have to configure certain iptables rules 1141 iptables -A FORWARD -p tcp --tcp-flags SYN,RST SYN \ 1200 If you say Y or M here, try `iptables -m cluster --help` for 1208 comments in your iptables ruleset. 1283 With this option enabled, you will be able to use the iptables 1512 iptables -A INPUT -m pkttype --pkt-type broadcast -j LOG 1542 key from the routing subsystem inside iptables. 1557 Short options are available by using 'iptables -m recent -h' [all …]
|
/linux-6.3-rc2/Documentation/translations/it_IT/process/ |
A D | changes.rst | 59 iptables 1.4.2 iptables -V 297 strumenti come nelle versioni del kernel antecedenti la 2.4.x (iptables). 505 - <https://netfilter.org/projects/iptables/index.html>
|
/linux-6.3-rc2/Documentation/ |
A D | Changes | 58 iptables 1.4.2 iptables -V 315 kernel series (iptables). It still includes backwards-compatibility modules 538 - <https://netfilter.org/projects/iptables/index.html>
|
/linux-6.3-rc2/Documentation/process/ |
A D | changes.rst | 58 iptables 1.4.2 iptables -V 315 kernel series (iptables). It still includes backwards-compatibility modules 538 - <https://netfilter.org/projects/iptables/index.html>
|
/linux-6.3-rc2/net/can/ |
A D | Kconfig | 54 by the netlink configuration interface known e.g. from iptables.
|
/linux-6.3-rc2/net/ |
A D | Kconfig | 164 a bridge with Network packet filtering enabled makes iptables "see" 172 <file:Documentation/Changes> under "iptables" for the location of 196 Enabling this option will let arptables resp. iptables see bridged
|