아래의 경우에는 필자의 서버에서 oops-firewall명령어를 직접 실행 시켰을
경우이다.
[root@bbuwoo oops-firewall]$ /etc/rc.d/init.d/oops-firewall stop
Destory Firewall Tables: [ OK ]
또는 직접 iptable 를 이용하여
[root@bbuwoo oops-firewall]$ /sbin/iptables -Z
[root@bbuwoo oops-firewall]$ /sbin/iptables -P INPUT ACCEPT
[root@bbuwoo oops-firewall]$ /sbin/iptables -F INPUT
[root@bbuwoo oops-firewall]$ /sbin/iptables -P PORWARD ACCEPT
[root@bbuwoo oops-firewall]$ /sbin/iptables -F PORWARD
[root@bbuwoo oops-firewall]$ /sbin/iptables -P OUTPUT ACCEPT
[root@bbuwoo oops-firewall]$ /sbin/iptables -F OUTPUT
[root@bbuwoo oops-firewall]$ /sbin/iptables -t nat -Z
[root@bbuwoo oops-firewall]$ /sbin/iptables -t nat -P PREROUTING ACCEPT
[root@bbuwoo oops-firewall]$ /sbin/iptables -t nat -F PREROUTING
[root@bbuwoo oops-firewall]$ /sbin/iptables -t nat -P POSTROUTING ACCEPT
[root@bbuwoo oops-firewall]$ /sbin/iptables -t nat -F POSTROUTING
[root@bbuwoo oops-firewall]$ /sbin/iptables -t mangle -Z
[root@bbuwoo oops-firewall]$ /sbin/iptables -t mangle -P PREROUTING ACCEPT
[root@bbuwoo oops-firewall]$ /sbin/iptables -t mangle -F PREROUTING
[root@bbuwoo oops-firewall]$ /sbin/iptables -t mangle -P OUTPUT ACCEPT
[root@bbuwoo oops-firewall]$ /sbin/iptables -t mangle -F OUTPUT
커널 2.4.18 이상에서는 다음의 명령도 포함을 한다.
[root@bbuwoo oops-firewall]$ /sbin/iptables -t mangle -P POSTROUTING ACCEPT
[root@bbuwoo oops-firewall]$ /sbin/iptables -t mangle -F POSTROUTING
[root@bbuwoo oops-firewall]$ /sbin/iptables -t mangle -P INPUT ACCEPT
[root@bbuwoo oops-firewall]$ /sbin/iptables -t mangle -F INPUT
[root@bbuwoo oops-firewall]$ /sbin/iptables -t mangle -P FORWARD ACCEPT
[root@bbuwoo oops-firewall]$ /sbin/iptables -t mangle -F FORWARD
와 같이 해제를 할수도 있다.
[root@bbuwoo oops-firewall]$ /etc/rc.d/init.d/oops-firewall status
[ REGULAR TABLE ]
-------------------------------------------------------------------
Chain INPUT (policy ACCEPT 22 packets, 1584 bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 1226733 packets, 834755592 bytes)
pkts bytes target prot opt in out source destination
[ NAT TABLE ]
-------------------------------------------------------------------
Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
[ MANGLE TABLE ]
-------------------------------------------------------------------
Chain PREROUTING (policy ACCEPT 105 packets, 8432 bytes)
pkts bytes target prot opt in out source destination
Chain INPUT (policy ACCEPT 105 packets, 8432 bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 100 packets, 8664 bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 100 packets, 8664 bytes)
pkts bytes target prot opt in out source destination
[root@bbuwoo oops-firewall]$
|