Unix and Linux Discussions Tagged with iptables |
|
Thread / Thread Starter |
Last Post |
Replies |
Views |
Forum |
|
|
|
2 |
6,890 |
UNIX for Beginners Questions & Answers |
|
|
|
1 |
15,766 |
UNIX for Beginners Questions & Answers |
|
|
|
45 |
58,322 |
UNIX for Advanced & Expert Users |
|
|
|
0 |
4,069 |
UNIX for Beginners Questions & Answers |
|
|
|
1 |
8,085 |
Cybersecurity |
|
|
|
0 |
8,002 |
Cybersecurity |
|
|
|
1 |
4,020 |
UNIX for Advanced & Expert Users |
|
|
|
3 |
2,119 |
What is on Your Mind? |
|
|
|
2 |
4,223 |
Red Hat |
|
|
|
6 |
8,621 |
Cybersecurity |
|
|
|
0 |
8,348 |
Cybersecurity |
|
|
|
2 |
2,459 |
UNIX for Dummies Questions & Answers |
|
|
|
0 |
3,688 |
UNIX for Dummies Questions & Answers |
|
|
|
1 |
3,116 |
UNIX for Advanced & Expert Users |
|
|
|
0 |
6,718 |
Cybersecurity |
|
|
|
0 |
5,127 |
IP Networking |
|
|
|
0 |
5,112 |
UNIX for Advanced & Expert Users |
|
|
|
0 |
4,729 |
IP Networking |
|
|
|
3 |
3,786 |
IP Networking |
|
|
|
3 |
9,118 |
Proxy Server |
|
|
|
2 |
7,093 |
Red Hat |
|
|
|
9 |
5,872 |
Shell Programming and Scripting |
|
|
|
5 |
5,073 |
Cybersecurity |
|
|
|
2 |
3,894 |
UNIX for Advanced & Expert Users |
|
|
|
4 |
2,647 |
IP Networking |
|
|
|
0 |
5,133 |
IP Networking |
|
|
|
3 |
3,096 |
Ubuntu |
|
|
|
1 |
8,254 |
UNIX for Advanced & Expert Users |
|
|
|
4 |
5,093 |
IP Networking |
|
|
|
8 |
4,910 |
UNIX for Advanced & Expert Users |
|
|
|
5 |
3,642 |
UNIX for Advanced & Expert Users |
|
|
|
0 |
8,610 |
Red Hat |
|
|
|
1 |
4,390 |
UNIX for Advanced & Expert Users |
|
|
|
0 |
2,941 |
IP Networking |
|
|
|
0 |
7,339 |
IP Networking |
|
|
|
1 |
3,925 |
Homework & Coursework Questions |
|
|
|
1 |
4,829 |
Cybersecurity |
|
|
|
0 |
3,476 |
Red Hat |
|
|
|
0 |
5,813 |
IP Networking |
|
|
|
0 |
4,017 |
Ubuntu |
iptables-apply(8) System Manager's Manual iptables-apply(8)
NAME
iptables-apply - a safer way to update iptables remotely
SYNOPSIS
iptables-apply [-hV] [-t timeout] ruleset-file
DESCRIPTION
iptables-apply will try to apply a new ruleset (as output by iptables-save/read by iptables-restore) to iptables, then prompt the user
whether the changes are okay. If the new ruleset cut the existing connection, the user will not be able to answer affirmatively. In this
case, the script rolls back to the previous ruleset after the timeout expired. The timeout can be set with -t.
When called as ip6tables-apply, the script will use ip6tables-save/-restore instead.
OPTIONS
-t seconds, --timeout seconds
Sets the timeout after which the script will roll back to the previous ruleset.
-h, --help
Display usage information.
-V, --version
Display version information.
SEE ALSO
iptables-restore(8), iptables-save(8), iptables(8).
LEGALESE
iptables-apply is copyright by Martin F. Krafft.
This manual page was written by Martin F. Krafft <madduck@madduck.net>
Permission is granted to copy, distribute and/or modify this document under the terms of the Artistic License 2.0.
2006-06-04 iptables-apply(8)