Öncelikle s.a
iptables ile alakali büyük bi sorun yaşıyorum
sunucu hergun duzenli olarak sabah 11 : 30 da donuyor ( kapanıyor ) .
ssh dan iptablesa restart atmadan aktif olmuyor ipler.
iptables kurallarını
iptables -F
komutuyla 0 ladıgım halde kendi kendine yeniden kurallar aktif oluyor ve ertesi gün yeniden kapaniyor sunucu
bi çok yerde araştırma yaptim ama hiçbir sonuc bulamadım bulduklarımda hiç bir sonuc vermedi. yardımlarınızı bekliyorum tşkler.
iPtable Lütfen bi bakın.
2
●669
- 22-12-2008, 20:09:31Herhangi bir firewall kullanıyormusunuz ?
- 22-12-2008, 20:36:54dedicate firmasinin kurdugu var sanirim fakat bunlar ne anlama geliyor hiçbi fikrim yok
[root@server ~]# iptables -L -n
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain HTTP_TRAFFIC (0 references)
target prot opt source destination
Chain SSH_TRAFFIC (0 references)
target prot opt source destination
Chain TCP_TRAFFIC (0 references)
target prot opt source destination
Chain UDP_TRAFFIC (0 references)
target prot opt source destination
Chain WHITELIST (0 references)
target prot opt source destination
Chain acctboth (0 references)
target prot opt source destination
[root@server ~]# iptables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain HTTP_TRAFFIC (0 references)
target prot opt source destination
Chain SSH_TRAFFIC (0 references)
target prot opt source destination
Chain TCP_TRAFFIC (0 references)
target prot opt source destination
Chain UDP_TRAFFIC (0 references)
target prot opt source destination
Chain WHITELIST (0 references)
target prot opt source destination
Chain acctboth (0 references)
target prot opt source destination
[root@server ~]# service iptables restart
Flushing firewall rules: [ OK ]
Setting chains to policy ACCEPT: filter [ OK ]
Unloading iptables modules: [ OK ]
Applying iptables firewall rules: [ OK ]
Loading additional iptables modules: ip_conntrack_netbios_n[ OK ]
[root@server ~]# iptables -L -n
Chain INPUT (policy ACCEPT)
target prot opt source destination
DROP all -- 78.187.102.56 0.0.0.0/0
DROP all -- 84.26.196.183 0.0.0.0/0
DROP all -- 87.126.181.94 0.0.0.0/0
DROP all -- 88.247.67.119 0.0.0.0/0
DROP all -- 85.102.67.9 0.0.0.0/0
DROP all -- 83.66.117.20 0.0.0.0/0
WHITELIST all -- 0.0.0.0/0 0.0.0.0/0
HTTP_TRAFFIC tcp -- 0.0.0.0/0 0.0.0.0/0 multiport ports 80
SSH_TRAFFIC tcp -- 0.0.0.0/0 0.0.0.0/0 multiport ports 2 2
TCP_TRAFFIC tcp -- 0.0.0.0/0 0.0.0.0/0
UDP_TRAFFIC udp -- 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain HTTP_TRAFFIC (1 references)
target prot opt source destination
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 limit: avg 5/sec bu rst 5 mode srcip tcp dpt:80 state NEW
tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 state NE W recent: SET name: DEFAULT side: source
DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 recent: UPDATE seconds: 5 hit_count: 10 name: DEFAULT side: source
Chain SSH_TRAFFIC (1 references)
target prot opt source destination
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 limit: avg 5/sec bu rst 5 mode srcip tcp dpt:22 state NEW
Chain TCP_TRAFFIC (1 references)
target prot opt source destination
Chain UDP_TRAFFIC (1 references)
target prot opt source destination
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 limit: avg 256/sec burst 5 mode srcip state NEW
Chain WHITELIST (1 references)
target prot opt source destination
[root@server ~]#