Sponsored Content
Full Discussion: Cloudflare and iptables
Top Forums UNIX for Beginners Questions & Answers Cloudflare and iptables Post 303045762 by Abu Rayane on Sunday 12th of April 2020 11:10:26 AM
Old 04-12-2020
@Neo: Basically if an IP (range of IP) is whitelisted, it should not be blocked, or may cloudflare are using other IPs than those mentioned in their file
 

10 More Discussions You Might Find Interesting

1. IP Networking

IPtables

Hey guys, I have just started using IP tables and was wondering if anyone could direct me to any good online resources as I am totally new to this. Thanks. (1 Reply)
Discussion started by: 182x
1 Replies

2. IP Networking

Need help with iptables

Trying to create a whitelist to limit bandwidth. My sync speed is 1536/256 kbps. Simple rules in order: 1. Do not limit (or set to 1536/256) MAC 00:00:00:00:00 (computer is in 192.168.1.0/24). 2. Do not limit (or set to 1536/256) MAC 00:00:00:00:01 (computer is in 192.168.1.0/24). 3. Do not... (1 Reply)
Discussion started by: kripz
1 Replies

3. IP Networking

Iptables

Thanks in advance I have to remove ip_tables_name from /proc/net/... i was trying to do so and getting the following error cmd : rm ip_tables_names error : rm: remove regular empty file `ip_tables_names'? y rm: cannot remove `ip_tables_names': Operation not permitted (4 Replies)
Discussion started by: sudeepiit
4 Replies

4. IP Networking

Iptables

What should be the iptables rule so that only the subnet 64.61.11.224/255.255.255.248 may access the mysql port 3306 (1 Reply)
Discussion started by: proactiveaditya
1 Replies

5. IP Networking

iptables changes

Hello We have one linux machine in the office which happens to be an important firewall. I just know the basics and need to make one change Essentially it is forward mysql traffic to another internal machine. This is the original rule (forward to 192.20.0.17) which is working ... (0 Replies)
Discussion started by: rina5392
0 Replies

6. UNIX for Dummies Questions & Answers

help with iptables

Hi, On the IPTABLES, I did iptables --flush. I want to start fresh. Now I only want two things. Allow one ip address to this server. Allow port 443 as incoming from every where. Please advice how to do this. This is what I did so for. iptables -I INPUT -i eth0 -s 1.2.3.4 -j ACCEPT... (5 Replies)
Discussion started by: samnyc
5 Replies

7. UNIX for Dummies Questions & Answers

Help with iptables

Hi, I just build a Linux server, I said yes to enable the firewall. I only choose SSH conneciton. When I check the iptables. I see all of this (see below). I want to reject every thing only allow SSH from subnet 192.168.1.xx. Can you advise, how to do. Chain RH-Firewall-1-INPUT (2... (2 Replies)
Discussion started by: samnyc
2 Replies

8. IP Networking

Help with iptables

photo... (1 Reply)
Discussion started by: beerpong1
1 Replies

9. Red Hat

iptables help for port 80

Hi I enable the IPtables but port 80 was not working. Below is my active configuration (10 Replies)
Discussion started by: ranjancom2000
10 Replies

10. Ubuntu

iptables

Hi I need help with an iptables configuration, this is what I have server A Server B A and B are using different gateways i am sending port 22 from A to B, I see the packages coming in B but B is not sending the package to internet. please give me some examples. (0 Replies)
Discussion started by: lmartinez073
0 Replies
sigprocmask(2)							System Calls Manual						    sigprocmask(2)

NAME
sigprocmask() - examine and change blocked signals SYNOPSIS
DESCRIPTION
The function allows the calling thread to examine and/or change its signal mask. If the argument set is not a null pointer, it points to a set of signals to be used to change the currently blocked set. The argument how indicates the way in which the set is changed and consists of one of the following values: The resulting set will be the union of the current set and the signal set pointed to by set. The resulting set will be the signal set pointed to by set. The resulting set will be the intersection of the current set and the complement of the signal set pointed to by set. If the argument oset is not a null pointer, the previous mask is stored in the location pointed to by oset. If set is a null pointer, the value of the argument how is not significant and the thread's signal mask is unchanged; thus the call can be used to inquire about cur- rently blocked signals. If there are any pending unblocked signals after the call to at least one of those signals will be delivered before the call to returns. It is not possible to block those signals which cannot be ignored. This is enforced by the system without causing an error to be indicated. If any of the or signals are generated while they are blocked, the result is undefined, unless the signal was generated by a call to or If fails, the thread's signal mask is not changed. RETURN VALUE
Upon successful completion, returns 0. Otherwise -1 is returned, is set to indicate the error, and the thread's signal mask will be unchanged. ERRORS
The function will fail if: The value of the how argument is not equal to one of the defined values. set or oset points to an invalid address. The reliable detection of this error is implementation dependent. APPLICATION USAGE
Threads Considerations Each thread maintains its own blocked signal mask. In a single-threaded process, modifies only the calling thread's blocked signal mask. Use of this function is unspecified in a multithreaded process. For more information regarding signals and threads, refer to signal(5). LWP (Lightweight Processes) Considerations modifies only the calling LWP's blocked signal mask. AUTHOR
was derived from the IEEE POSIX 1003.1-1988 Standard. SEE ALSO
sigaction(2), sigpending(2), sigsuspend(2), sigsetops(3C), pthread_sigmask(3T), signal(5). STANDARDS CONFORMANCE
sigprocmask(2)
All times are GMT -4. The time now is 11:40 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy