04-12-2020
@Neo: Basically if an IP (range of IP) is whitelisted, it should not be blocked, or may cloudflare are using other IPs than those mentioned in their file
10 More Discussions You Might Find Interesting
1. IP Networking
Hey guys, I have just started using IP tables and was wondering if anyone could direct me to any good online resources as I am totally new to this. Thanks. (1 Reply)
Discussion started by: 182x
1 Replies
2. IP Networking
Trying to create a whitelist to limit bandwidth. My sync speed is 1536/256 kbps.
Simple rules in order:
1. Do not limit (or set to 1536/256) MAC 00:00:00:00:00 (computer is in 192.168.1.0/24).
2. Do not limit (or set to 1536/256) MAC 00:00:00:00:01 (computer is in 192.168.1.0/24).
3. Do not... (1 Reply)
Discussion started by: kripz
1 Replies
3. IP Networking
Thanks in advance
I have to remove ip_tables_name from /proc/net/...
i was trying to do so and getting the following error
cmd : rm ip_tables_names
error : rm: remove regular empty file `ip_tables_names'? y
rm: cannot remove `ip_tables_names': Operation not permitted (4 Replies)
Discussion started by: sudeepiit
4 Replies
4. IP Networking
What should be the iptables rule so that only the subnet 64.61.11.224/255.255.255.248 may access the mysql port 3306 (1 Reply)
Discussion started by: proactiveaditya
1 Replies
5. IP Networking
Hello
We have one linux machine in the office which happens to be an important firewall. I just know the basics and need to make one change
Essentially it is forward mysql traffic to another internal machine.
This is the original rule (forward to 192.20.0.17) which is working
... (0 Replies)
Discussion started by: rina5392
0 Replies
6. UNIX for Dummies Questions & Answers
Hi,
On the IPTABLES, I did iptables --flush. I want to start fresh. Now I only want two things. Allow one ip address to this server. Allow port 443 as incoming from every where. Please advice how to do this.
This is what I did so for.
iptables -I INPUT -i eth0 -s 1.2.3.4 -j ACCEPT... (5 Replies)
Discussion started by: samnyc
5 Replies
7. UNIX for Dummies Questions & Answers
Hi, I just build a Linux server, I said yes to enable the firewall. I only choose SSH conneciton. When I check the iptables. I see all of this (see below). I want to reject every thing only allow SSH from subnet 192.168.1.xx. Can you advise, how to do.
Chain RH-Firewall-1-INPUT (2... (2 Replies)
Discussion started by: samnyc
2 Replies
8. IP Networking
photo... (1 Reply)
Discussion started by: beerpong1
1 Replies
9. Red Hat
Hi
I enable the IPtables but port 80 was not working. Below is my active configuration (10 Replies)
Discussion started by: ranjancom2000
10 Replies
10. Ubuntu
Hi
I need help with an iptables configuration, this is what I have
server A
Server B
A and B are using different gateways
i am sending port 22 from A to B, I see the packages coming in B but B is not sending the package to internet. please give me some examples. (0 Replies)
Discussion started by: lmartinez073
0 Replies
LEARN ABOUT DEBIAN
grepcidr
GREPCIDR(1) General Commands Manual GREPCIDR(1)
NAME
grepcidr -- Filter IP addresses matching IPv4 CIDR/network specification
SYNOPSIS
grepcidr [-V] [-c] [-v] [-e pattern | -f file]
DESCRIPTION
This manual page documents briefly the grepcidr command.
This manual page was written for the Debian distribution because the original program does not have a manual page.
grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbi-
trary networks specified by an address range. As with grep, there are options to invert matching and load patterns from a file. grepcidr
is capable of comparing thousands or even millions of IPs to networks with little memory usage and in reasonable computation time.
OPTIONS
-V Show software version
-c Display count of the matching lines, instead of showing the lines
-v Invert the sense of matching, to select non-matching IP addresses
-e Specify pattern(s) on command-line
-f Obtain CIDR and range pattern(s) from file
EXAMPLES
grepcidr -f ournetworks blocklist > abuse.log
Find our customers that show up in blocklists
grepcidr 127.0.0.0/8 iplog
Searches for any localnet IP addresses inside the iplog file
grepcidr "192.168.0.1-192.168.10.13" iplog
Searches for IPs matching indicated range in the iplog file
script | grepcidr -vf whitelist > blacklist
Create a blacklist, with whitelisted networks removed (inverse)
grepcidr -f list1 list2
Cross-reference two lists, outputs IPs common to both lists
AUTHOR
This manual page was written by Ryan Finnie ryan@finnie.org for the Debian system (but may be used by others). Permission is granted to
copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 2 any later version published by
the Free Software Foundation.
On Debian systems, the complete text of the GNU General Public License can be found in /usr/share/common-licenses/GPL.
GREPCIDR(1)