{"id":442227,"date":"2025-11-23T15:19:26","date_gmt":"2025-11-23T07:19:26","guid":{"rendered":"https:\/\/idc.net\/help\/?p=442227"},"modified":"2025-11-17T22:33:53","modified_gmt":"2025-11-17T14:33:53","slug":"%e9%a6%99%e6%b8%af%e6%9c%8d%e5%8a%a1%e5%99%a8%e9%98%b2%e7%81%ab%e5%a2%99%e9%85%8d%e7%bd%ae%e6%8c%87%e5%8d%97%ef%bc%9aiptables%e4%b8%8efirewalld%e5%ae%9e%e6%88%98%e6%95%99%e7%a8%8b%e5%8f%8a%e5%ae%89","status":"publish","type":"post","link":"https:\/\/idc.net\/help\/442227\/","title":{"rendered":"\u9999\u6e2f\u670d\u52a1\u5668\u9632\u706b\u5899\u914d\u7f6e\u6307\u5357\uff1aiptables\u4e0efirewalld\u5b9e\u6218\u6559\u7a0b\u53ca\u5b89\u5168\u52a0\u56fa"},"content":{"rendered":"<p>\u9632\u706b\u5899\u662f<strong>\u9999\u6e2f\u670d\u52a1\u5668<\/strong>\u5b89\u5168\u7b2c\u4e00\u9053\u9632\u7ebf\uff0c\u80fd\u6709\u6548\u963b\u6321\u626b\u63cf\u3001\u7206\u7834\u3001DDoS\u7b49\u653b\u51fb\u3002\u9999\u6e2f\u670d\u52a1\u5668\u4f4d\u4e8e\u56fd\u9645\u7f51\u7edc\u67a2\u7ebd\uff0cCN2 GIA\u7ebf\u8def\u867d\u4f4e\u5ef6\u8fdf\uff0c\u4f46\u66b4\u9732\u516c\u7f51\u98ce\u9669\u66f4\u9ad8\u3002\u672c\u6587\u56f4\u7ed5CentOS\/Ubuntu\u7cfb\u7edf\uff0c\u8be6\u7ec6\u79d1\u666eiptables\u4e0efirewalld\u914d\u7f6e\u65b9\u6cd5\uff0c\u63d0\u4f9bWeb\u3001\u6570\u636e\u5e93\u3001\u90ae\u4ef6\u7b49\u5e38\u89c1\u573a\u666f\u89c4\u5219\uff0c\u5e76\u7ed3\u5408<strong>\u9999\u6e2f\u670d\u52a1\u5668<\/strong>\u514d\u5907\u6848\u3001\u9ad8\u7a33\u5b9a\u6027\u7279\u70b9\uff0c\u7ed9\u51fa\u6700\u4f73\u5b9e\u8df5\u3002\u638c\u63e1\u8fd9\u4e9b\uff0c\u60a8\u53ef\u5728\u4ea4\u4ed8\u540e10\u5206\u949f\u5185\u5b8c\u6210\u5b89\u5168\u52a0\u56fa\uff0c\u907f\u514d99%\u5e38\u89c1\u5165\u4fb5\u3002<\/p>\n<h2>\u9632\u706b\u5899\u57fa\u7840\uff1a\u4e3a\u4ec0\u4e48\u9999\u6e2f\u670d\u52a1\u5668\u5fc5\u987b\u914d\u7f6e<\/h2>\n<p>\u88f8\u670d\u4e0a\u7ebf\u5373\u88ab\u626b\u63cf\uff1aSSH 22\u7aef\u53e3\u6bcf\u5206\u949f\u6570\u767e\u6b21\u7206\u7834\u3002<strong>\u9999\u6e2f\u670d\u52a1\u5668<\/strong>\u514d\u5907\u6848\u3001\u9690\u79c1\u4fdd\u62a4\uff0c\u5438\u5f15\u9ed1\u7070\u4ea7\u5173\u6ce8\u3002\u9632\u706b\u5899\u6838\u5fc3\u4f5c\u7528\uff1a<\/p>\n<ul>\n<li><strong>\u7aef\u53e3\u63a7\u5236<\/strong>\uff1a\u4ec5\u5f00\u653e\u4e1a\u52a1\u7aef\u53e3\uff0c\u9690\u85cf\u7ba1\u7406\u5165\u53e3\u3002<\/li>\n<li><strong>IP\u9650\u5236<\/strong>\uff1a\u767d\u540d\u5355\u4ec5\u5141\u8bb8\u529e\u516cIP\u767b\u5f55\u3002<\/li>\n<li><strong>\u901f\u7387\u9650\u5236<\/strong>\uff1a\u9632SYN\u6d2a\u6c34\u3001CC\u653b\u51fb\u3002<\/li>\n<li><strong>\u65e5\u5fd7\u5ba1\u8ba1<\/strong>\uff1a\u8bb0\u5f55\u5f02\u5e38\uff0c\u4fbf\u4e8e\u6eaf\u6e90\u3002<\/li>\n<\/ul>\n<p>\u540e\u6d6a\u4e91<strong>\u9999\u6e2f\u670d\u52a1\u5668<\/strong>\u4ea4\u4ed8\u65f6\u5df2\u5b8c\u6210\u4e00\u6b21\u6027\u5b89\u5168\u8bbe\u7f6e\uff08\u7aef\u53e3\u4f18\u5316\u3001\u9632\u706b\u5899\u89c4\u5219\u3001\u8d26\u53f7\u52a0\u56fa\uff09\uff0c\u4f46\u4e1a\u52a1\u53d8\u5316\u9700\u81ea\u884c\u8c03\u6574\u3002<\/p>\n<h3>iptables vs firewalld\uff1a\u9009\u578b\u5bf9\u6bd4<\/h3>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"5\">\n<tbody>\n<tr>\n<th>\u7279\u6027<\/th>\n<th>iptables<\/th>\n<th>firewalld<\/th>\n<th>\u63a8\u8350\u573a\u666f<\/th>\n<\/tr>\n<tr>\n<td>\u7cfb\u7edf\u652f\u6301<\/td>\n<td>\u6240\u6709Linux<\/td>\n<td>CentOS7+\/Ubuntu18+<\/td>\n<td>iptables\u8001\u7cfb\u7edf<\/td>\n<\/tr>\n<tr>\n<td>\u914d\u7f6e\u590d\u6742\u5ea6<\/td>\n<td>\u4e2d\u7b49<\/td>\n<td>\u7b80\u5355\uff08zone\uff09<\/td>\n<td>firewalld\u65b0\u624b<\/td>\n<\/tr>\n<tr>\n<td>\u52a8\u6001\u89c4\u5219<\/td>\n<td>\u9700\u811a\u672c<\/td>\n<td>\u539f\u751f\u652f\u6301<\/td>\n<td>firewalld\u4e1a\u52a1\u591a\u53d8<\/td>\n<\/tr>\n<tr>\n<td>\u6027\u80fd\u5f00\u9500<\/td>\n<td>\u4f4e<\/td>\n<td>\u7565\u9ad8<\/td>\n<td>iptables\u9ad8\u5e76\u53d1<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>\u9999\u6e2f\u670d\u52a1\u5668<\/strong>\u591a\u4e3a\u72ec\u7acb\u670d\u52a1\u5668\uff0c\u63a8\u8350CentOS8+\u7528firewalld\uff0cUbuntu\u7528ufw\uff08\u540e\u6587\u9644\uff09\u3002<\/p>\n<h2>\u4ea4\u4ed8\u540e\u7acb\u5373\u6267\u884c\uff1a\u57fa\u7840\u5b89\u5168\u52a0\u56fa<\/h2>\n<p>\u767b\u5f55<strong>\u9999\u6e2f\u670d\u52a1\u5668<\/strong>\u540e\uff0c\u5148\u6267\u884c\uff1a<\/p>\n<pre># 1. \u66f4\u65b0\u7cfb\u7edf\r\nyum update -y  # CentOS\r\napt update &amp;&amp; apt upgrade -y  # Ubuntu\r\n\r\n# 2. \u4fee\u6539SSH\u7aef\u53e3\uff08\u907f\u5f0022\uff09\r\nsed -i 's\/#Port 22\/Port 2222\/' \/etc\/ssh\/sshd_config\r\nsystemctl restart sshd\r\n\r\n# 3. \u7981\u7528root\u8fdc\u7a0b\u767b\u5f55\r\nsed -i 's\/PermitRootLogin yes\/PermitRootLogin no\/' \/etc\/ssh\/sshd_config\r\nsystemctl restart sshd\r\n\r\n# 4. \u521b\u5efa\u666e\u901a\u7528\u6237\r\nuseradd adminuser\r\npasswd adminuser\r\nusermod -aG wheel adminuser  # CentOS\r\nusermod -aG sudo adminuser   # Ubuntu\r\n<\/pre>\n<h3>firewalld\u5feb\u901f\u4e0a\u624b\uff08CentOS\uff09<\/h3>\n<pre># \u5b89\u88c5\r\nyum install firewalld -y\r\nsystemctl start firewalld\r\nsystemctl enable firewalld\r\n\r\n# \u67e5\u770b\u72b6\u6001\r\nfirewall-cmd --state\r\n\r\n# \u9ed8\u8ba4zone\r\nfirewall-cmd --set-default-zone=public\r\n<\/pre>\n<h2>\u5e38\u89c1\u4e1a\u52a1\u9632\u706b\u5899\u89c4\u5219\u914d\u7f6e<\/h2>\n<h3>Web\u670d\u52a1\u5668\uff08Nginx\/Apache\uff09<\/h3>\n<pre>firewall-cmd --permanent --add-service=http\r\nfirewall-cmd --permanent --add-service=https\r\nfirewall-cmd --permanent --add-port=80\/tcp\r\nfirewall-cmd --permanent --add-port=443\/tcp\r\nfirewall-cmd --reload\r\n<\/pre>\n<p>\u4ec5\u529e\u516cIP\u8bbf\u95ee\u7ba1\u7406\u540e\u53f0\uff1a<\/p>\n<pre>firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"\u516c\u53f8IP\/32\" port port=\"8080\" protocol=\"tcp\" accept'\r\nfirewall-cmd --reload\r\n<\/pre>\n<h3>\u6570\u636e\u5e93\uff08MySQL\/MariaDB\uff09<\/h3>\n<p>\u9ed8\u8ba4\u4ec5\u672c\u5730\u8bbf\u95ee\uff1a<\/p>\n<pre># \u7ed1\u5b9a127.0.0.1\r\nsed -i 's\/bind-address.*\/bind-address = 127.0.0.1\/' \/etc\/my.cnf\r\nsystemctl restart mysqld\r\n<\/pre>\n<p>\u9700\u8fdc\u7a0b\uff1a<\/p>\n<pre>firewall-cmd --permanent --add-port=3306\/tcp\r\nfirewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"\u5e94\u7528\u670d\u52a1\u5668IP\" port port=\"3306\" protocol=\"tcp\" accept'\r\nfirewall-cmd --reload\r\n<\/pre>\n<h3>\u90ae\u4ef6\u670d\u52a1\u5668\uff08Postfix\uff09<\/h3>\n<pre>firewall-cmd --permanent --add-service=smtp\r\nfirewall-cmd --permanent --add-service=smtps\r\nfirewall-cmd --permanent --add-service=submission\r\nfirewall-cmd --reload\r\n<\/pre>\n<h3>\u81ea\u5b9a\u4e49\u5e94\u7528\uff08Node.js 3000\u7aef\u53e3\uff09<\/h3>\n<pre>firewall-cmd --permanent --add-port=3000\/tcp\r\nfirewall-cmd --reload\r\n<\/pre>\n<h2>\u9ad8\u7ea7\u9632\u62a4\uff1a\u9632\u7206\u7834\u4e0eDDoS<\/h2>\n<h3>SSH\u9632\u7206\u7834\uff08fail2ban\uff09<\/h3>\n<pre>yum install fail2ban -y\r\ncp \/etc\/fail2ban\/jail.conf \/etc\/fail2ban\/jail.local\r\nsed -i 's\/bantime  = 10m\/bantime  = 1h\/' \/etc\/fail2ban\/jail.local\r\nsed -i 's\/maxretry = 5\/maxretry = 3\/' \/etc\/fail2ban\/jail.local\r\nsystemctl start fail2ban\r\nsystemctl enable fail2ban\r\n<\/pre>\n<h3>\u901f\u7387\u9650\u5236\uff08iptables\uff09<\/h3>\n<pre># \u9650\u5236\u65b0\u8fde\u63a5\r\niptables -A INPUT -p tcp --dport 80 -m connlimit --connlimit-above 50 -j DROP\r\niptables -A INPUT -p tcp --dport 80 -m state --state NEW -m recent --set\r\niptables -A INPUT -p tcp --dport 80 -m state --state NEW -m recent --update --seconds 60 --hitcount 20 -j DROP\r\n<\/pre>\n<p>\u4fdd\u5b58\u89c4\u5219\uff1a<\/p>\n<pre>service iptables save\r\n<\/pre>\n<h3>DDoS\u521d\u6b65\u9632\u5fa1<\/h3>\n<p><strong>\u9999\u6e2f\u670d\u52a1\u5668<\/strong>\u65e0\u786c\u4ef6\u9632\u5fa1\uff0c\u5efa\u8bae\uff1a<\/p>\n<ul>\n<li>\u8054\u7cfb\u540e\u6d6a\u4e91\u5ba2\u670d\u5347\u7ea7\u9ad8\u9632IP\u3002<\/li>\n<li>\u524d\u7aef\u52a0Cloudflare\u514d\u8d39CDN\u3002<\/li>\n<li>SYN Cookies\uff1a<\/li>\n<\/ul>\n<pre>echo 1 &gt; \/proc\/sys\/net\/ipv4\/tcp_syncookies\r\n<\/pre>\n<h2>iptables\u5b8c\u6574\u914d\u7f6e\u811a\u672c\uff08\u517c\u5bb9\u9999\u6e2f\u670d\u52a1\u5668\uff09<\/h2>\n<pre>#!\/bin\/bash\r\n# \u9002\u7528\u4e8eCentOS\u9999\u6e2f\u670d\u52a1\u5668\r\n\r\niptables -F\r\niptables -X\r\niptables -Z\r\n\r\n# \u7b56\u7565\r\niptables -P INPUT DROP\r\niptables -P FORWARD DROP\r\niptables -P OUTPUT ACCEPT\r\n\r\n# \u5efa\u7acb\u94fe\r\niptables -N SYN_FLOOD\r\n\r\n# \u5141\u8bb8loopback\r\niptables -A INPUT -i lo -j ACCEPT\r\n\r\n# \u5df2\u5efa\u7acb\u8fde\u63a5\r\niptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT\r\n\r\n# SSH\uff08\u65392222\u7aef\u53e3\uff09\r\niptables -A INPUT -p tcp --dport 2222 -m state --state NEW -m recent --set\r\niptables -A INPUT -p tcp --dport 2222 -m state --state NEW -m recent --update --seconds 60 --hitcount 4 -j DROP\r\niptables -A INPUT -p tcp --dport 2222 -j ACCEPT\r\n\r\n# Web\r\niptables -A INPUT -p tcp --dport 80 -j ACCEPT\r\niptables -A INPUT -p tcp --dport 443 -j ACCEPT\r\n\r\n# \u6570\u636e\u5e93\uff08\u4ec5\u5e94\u7528\u670d\u52a1\u5668\uff09\r\niptables -A INPUT -p tcp -s \u5e94\u7528\u670d\u52a1\u5668IP --dport 3306 -j ACCEPT\r\n\r\n# ICMP\uff08\u9650\u901f\uff09\r\niptables -A INPUT -p icmp --icmp-type echo-request -m limit --limit 1\/second -j ACCEPT\r\n\r\n# \u9632SYN\r\niptables -A SYN_FLOOD -m limit --limit 100\/second --limit-burst 200 -j RETURN\r\niptables -A SYN_FLOOD -j DROP\r\niptables -A INPUT -p tcp --syn -j SYN_FLOOD\r\n\r\n# \u8bb0\u5f55\u4e22\u5f03\r\niptables -A INPUT -j LOG --log-prefix \"IPTABLES-DROP: \" --log-level 7\r\niptables -A INPUT -j DROP\r\n\r\n# \u4fdd\u5b58\r\nservice iptables save\r\n<\/pre>\n<p>\u4fdd\u5b58\u4e3asetup_fw.sh\uff0cchmod +x\u540e\u6267\u884c\u3002<\/p>\n<h2>\u76d1\u63a7\u4e0e\u7ef4\u62a4\uff1a\u9632\u706b\u5899\u957f\u671f\u6709\u6548<\/h2>\n<ul>\n<li><strong>\u67e5\u770b\u89c4\u5219<\/strong>\uff1afirewall-cmd --list-all<\/li>\n<li><strong>\u65e5\u5fd7\u5206\u6790<\/strong>\uff1atail -f \/var\/log\/messages | grep DROP<\/li>\n<li><strong>\u81ea\u52a8\u5907\u4efd<\/strong>\uff1acrontab\u6bcf\u5468\u5907\u4efdiptables\u89c4\u5219<\/li>\n<li><strong>7x24\u652f\u6301<\/strong>\uff1a\u540e\u6d6a\u4e91\u5de5\u5355\u5feb\u901f\u54cd\u5e94<\/li>\n<\/ul>\n<h2>\u540e\u6d6a\u4e91\u9999\u6e2f\u670d\u52a1\u5668\uff1a\u5b89\u5168\u90e8\u7f72\u4f18\u9009<\/h2>\n<p>\u540e\u6d6a\u4e91<strong>\u9999\u6e2f\u670d\u52a1\u5668<\/strong>\u652f\u6301CentOS\/Ubuntu\/Windows\uff0cCN2 GIA\u7ebf\u8def\uff0c\u514d\u5907\u6848\u4ea4\u4ed8\u3002\u8bbf\u95ee<a href=\"https:\/\/idc.net\/hk\">\u540e\u6d6a\u4e91\u9999\u6e2f\u72ec\u7acb\u670d\u52a1\u5668<\/a>\uff0c\u63a8\u8350\u5b89\u5168\u914d\u7f6e\uff1a<\/p>\n<ul>\n<li><strong>\u5165\u95e8\u5efa\u7ad9<\/strong>\uff1aE3-1230 v2 16GB\/240GB SSD+1TB HDD\/30Mbps BGP\uff0c450\u5143\/\u6708\uff0812h\u8bd5\u7528\uff09\u3002\u4ea4\u4ed8\u5373\u542b\u9632\u706b\u5899\u89c4\u5219\u3002<\/li>\n<li><strong>\u4f01\u4e1a\u5e94\u7528<\/strong>\uff1a\u53ccE5-2660 32GB\/10Mbps CN2 GIA\uff0c1150\u5143\/\u6708\u3002\u6d4b\u8bd5IP\uff1a154.39.251.254\u3002<\/li>\n<li><strong>\u9ad8\u9632\u9700\u6c42<\/strong>\uff1a\u767e\u5146\u670d\u52a1\u5668\uff0c3180\u5143\u8d77\uff0c\u8054\u7cfb\u5ba2\u670d\u52a0\u9632\u5fa1\u3002<\/li>\n<\/ul>\n<p>\u603b\u4e4b\uff0c\u5408\u7406\u914d\u7f6e\u9632\u706b\u5899\uff0c<strong>\u9999\u6e2f\u670d\u52a1\u5668<\/strong>\u53ef\u5b9e\u73b0\u4f01\u4e1a\u7ea7\u5b89\u5168\u3002\u7acb\u5373\u8bbf\u95ee<a href=\"https:\/\/idc.net\/hk\">\u9999\u6e2f\u670d\u52a1\u5668<\/a>\uff0c\u5f00\u542f\u5b89\u5168\u4e4b\u65c5\uff01<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u9632\u706b\u5899\u662f\u9999\u6e2f\u670d\u52a1\u5668\u5b89\u5168\u7b2c\u4e00\u9053\u9632\u7ebf\uff0c\u80fd\u6709\u6548\u963b\u6321\u626b\u63cf\u3001\u7206\u7834\u3001DDoS\u7b49\u653b\u51fb\u3002\u9999\u6e2f\u670d\u52a1\u5668\u4f4d\u4e8e\u56fd\u9645\u7f51\u7edc\u67a2\u7ebd\uff0cCN2 G [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[202646],"tags":[],"class_list":["post-442227","post","type-post","status-publish","format-standard","hentry","category-hkserver"],"_links":{"self":[{"href":"https:\/\/idc.net\/help\/wp-json\/wp\/v2\/posts\/442227","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idc.net\/help\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idc.net\/help\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idc.net\/help\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/idc.net\/help\/wp-json\/wp\/v2\/comments?post=442227"}],"version-history":[{"count":2,"href":"https:\/\/idc.net\/help\/wp-json\/wp\/v2\/posts\/442227\/revisions"}],"predecessor-version":[{"id":442233,"href":"https:\/\/idc.net\/help\/wp-json\/wp\/v2\/posts\/442227\/revisions\/442233"}],"wp:attachment":[{"href":"https:\/\/idc.net\/help\/wp-json\/wp\/v2\/media?parent=442227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idc.net\/help\/wp-json\/wp\/v2\/categories?post=442227"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idc.net\/help\/wp-json\/wp\/v2\/tags?post=442227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}