{"id":7242,"date":"2019-05-31T12:33:19","date_gmt":"2019-05-31T09:33:19","guid":{"rendered":"http:\/\/unihost.com\/help\/?p=7242"},"modified":"2023-09-22T16:03:14","modified_gmt":"2023-09-22T13:03:14","slug":"common-iptables-firewall-rules","status":"publish","type":"post","link":"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/","title":{"rendered":"Common Iptables firewall rules"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11181 size-full\" src=\"https:\/\/unihost.com\/help\/minio.php?.\/New-Project-4.jpg\" alt=\"firewall\" width=\"1280\" height=\"720\" \/ title=\"Common Iptables firewall rules - Image 1\"><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">iptables is a command line utility for configuring Linux kernel firewall\u00a0implemented within the\u00a0Netfilter\u00a0project.<\/span><\/p>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"><!--more-->iptables is the software firewall that is included with most Linux distributions by default. To install it, just retrieve the iptables package:<\/span><\/p>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">RHEL\/CentOS:<\/span><\/p>\n<pre><em><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># yum install iptables-services<\/span><\/em><\/pre>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Debian\/Ubuntu:<\/span><\/p>\n<pre><em><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># apt-get install iptables<\/span><\/em><\/pre>\n<h3 style=\"text-align: center;\"><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Types of Chains<\/span><\/h3>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">iptables uses five different chains: PREROUTING, INPUT, FORWARD, OUTPUT and POSTROUTING.<\/span><\/p>\n<ul>\n<li><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">PREROUTING: Packets will enter this chain before a routing decision is made.<\/span><\/li>\n<li><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">INPUT: Packet is going to be locally delivered. It does not have anything to do with processes having an opened socket; local delivery is controlled by the &#8220;local-delivery&#8221; routing table:\u00a0ip route show table local.<\/span><\/li>\n<li><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">FORWARD: All packets that have been routed and were not for local delivery will traverse this chain.<\/span><\/li>\n<li><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">OUTPUT: Packets sent from the machine itself will be visiting this chain.<\/span><\/li>\n<li><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">POSTROUTING: Routing decision has been made. Packets enter this chain just before handing them off to the hardware.<\/span><\/li>\n<\/ul>\n<h3 style=\"text-align: center;\"><span id=\"List-iptables-Rules\" style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">List iptables Rules<\/span><\/h3>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">You can list the rules using -L flag:<\/span><\/p>\n<pre><em><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># iptables -L<\/span><\/em><\/pre>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">You can show the line numbers for rules using \u2013line-numbers:<\/span><\/p>\n<pre><em><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># iptables\u00a0-L \u00a0--line-numbers<\/span><\/em><\/pre>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">To list a specific table, use the -t flag with the table name like this:<\/span><\/p>\n<pre><em><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># iptables\u00a0-L\u00a0-t\u00a0nat<\/span><\/em><\/pre>\n<h3 style=\"text-align: center;\"><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Adding iptables rules<\/span><\/h3>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">With your policy chains configured, you can now configure iptables to allow or block specific addresses, address ranges, and ports. In these examples, we\u2019ll set the connections to\u00a0DROP, but you can switch them to\u00a0ACCEPT\u00a0or\u00a0REJECT, depending on your needs and how you configured your policy chains.<\/span><\/p>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Allow connections from a single IP address:<\/span><\/p>\n<pre><em><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># iptables -A INPUT -s &lt;IP_ADDRESS&gt; -j DROP<\/span><\/em><\/pre>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Allow connections to a specific port:<\/span><\/p>\n<pre><em><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># iptables -I INPUT &lt;NUMBER&gt; -s &lt;IP_ADDRESS&gt;\u00a0 --dport &lt;PORT_NUMBER&gt; -j ACCEPT<\/span><\/em><\/pre>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">&lt;NUMBER&gt; &#8211; number of inserted rule. It should be the first one.<\/span><\/p>\n<h3 style=\"text-align: center;\"><span id=\"SYN-Flooding\" style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">SYN Flooding<\/span><\/h3>\n<pre><em><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># iptables -A INPUT -p tcp -m state --state NEW -m recent --update --seconds 60 --hitcount 20 -j\u00a0DROP<\/span><\/em><br \/><em><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># iptables -A INPUT -p tcp -m state --state NEW -m recent --set -j ACCEPT<\/span><\/em><br \/><br \/><\/pre>\n<div><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">These rules limit the rate of SYN requests from one IP to 20 per minute. Do not use it on regular basis!\u00a0You can block legitimate traffic originating from networks behind NAT.<\/span><\/div>\n<div>\u00a0<\/div>\n<div><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Some SYN attacks are easy to filter because they have the same &#8216;unusual&#8217; parameters in the TCP header.<\/span><\/div>\n<h3 style=\"text-align: center;\"><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Remove iptables Rules<\/span><\/h3>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Determine the number of the rule and the name of the chain in the list:<\/span><\/p>\n<pre><em><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># iptables -L --line-numbers<\/span><\/em><\/pre>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Remove the rule:<\/span><\/p>\n<pre><em><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># iptables -D &lt;CHAIN&gt; &lt;RULE_NUMBER&gt;<\/span><\/em><\/pre>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Or you can remove the rule from the list directly:<\/span><\/p>\n<pre><em><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># iptables -S<\/span><\/em><\/pre>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Copy the line from the output:<\/span><\/p>\n<pre><em><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">#\u00a0 iptables -D INPUT -s 12.34.56.78\u00a0-j DROP<\/span><\/em><\/pre>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Delete all rules:<\/span><\/p>\n<pre><em><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">#\u00a0iptables -F<\/span><\/em><\/pre>\n<h2 style=\"text-align: center;\">Save iptables Rules<\/h2>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">RHEL\/CentOS:<\/span><\/p>\n<pre><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"><em># iptables-save &gt; \/etc\/sysconfig\/iptables<\/em><\/span><\/pre>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Debian\/Ubuntu:<\/span><\/p>\n<pre><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"><em># iptables-save &gt; \/etc\/iptables\/rules.v4<\/em><\/span><\/pre>\n<h3 style=\"text-align: center;\"><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Restore Firewall Rules<\/span><\/h3>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">RHEL\/CentOS:<\/span><\/p>\n<p><em><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># iptables-restore &lt; \/etc\/sysconfig\/iptables<\/span><\/em><\/p>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Debian\/Ubuntu:<\/span><\/p>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"><em># iptables-restore &lt; \/etc\/iptables\/rules.v4<\/em><\/span><\/p>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">If you need help with server administration, you can order the <a href=\"https:\/\/unihost.com\/en\/management\/\">Server Administration<\/a> service from Unihost<br \/><\/span><\/p>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0 iptables is a command line utility for configuring Linux kernel firewall\u00a0implemented within the\u00a0Netfilter\u00a0project.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[158],"tags":[508],"class_list":["post-7242","post","type-post","status-publish","format-standard","hentry","category-dedicated-servers","tag-iptables"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Common Iptables firewall rules - Unihost.FAQ<\/title>\n<meta name=\"description\" content=\"iptables is a command line utility for configuring Linux kernel firewall implemented within the Netfilter project.- Unihost.FAQ\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Common Iptables firewall rules - Unihost.FAQ\" \/>\n<meta property=\"og:description\" content=\"iptables is a command line utility for configuring Linux kernel firewall implemented within the Netfilter project.- Unihost.FAQ\" \/>\n<meta property=\"og:url\" content=\"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/\" \/>\n<meta property=\"og:site_name\" content=\"Unihost.FAQ\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/unihost\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-31T09:33:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-22T13:03:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/unihost.com\/help\/wp-content\/uploads\/New-Project-4.jpg\" \/>\n<meta name=\"author\" content=\"Unihost Support\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@unihost\" \/>\n<meta name=\"twitter:site\" content=\"@unihost\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Unihost Support\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/\"},\"author\":{\"name\":\"Unihost Support\",\"@id\":\"https:\/\/unihost.com\/help\/#\/schema\/person\/bb5ae95f38577c920e6a7507888b715a\"},\"headline\":\"Common Iptables firewall rules\",\"datePublished\":\"2019-05-31T09:33:19+00:00\",\"dateModified\":\"2023-09-22T13:03:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/\"},\"wordCount\":402,\"publisher\":{\"@id\":\"https:\/\/unihost.com\/help\/#organization\"},\"image\":{\"@id\":\"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/unihost.com\/help\/wp-content\/uploads\/New-Project-4.jpg\",\"keywords\":[\"iptables\"],\"articleSection\":[\"02. Dedicated servers\"],\"inLanguage\":\"en\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/\",\"url\":\"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/\",\"name\":\"Common Iptables firewall rules - Unihost.FAQ\",\"isPartOf\":{\"@id\":\"https:\/\/unihost.com\/help\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/unihost.com\/help\/wp-content\/uploads\/New-Project-4.jpg\",\"datePublished\":\"2019-05-31T09:33:19+00:00\",\"dateModified\":\"2023-09-22T13:03:14+00:00\",\"description\":\"iptables is a command line utility for configuring Linux kernel firewall implemented within the Netfilter project.- Unihost.FAQ\",\"breadcrumb\":{\"@id\":\"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/#primaryimage\",\"url\":\"https:\/\/unihost.com\/help\/minio.php?.\/New-Project-4.jpg\",\"contentUrl\":\"https:\/\/unihost.com\/help\/minio.php?.\/New-Project-4.jpg\",\"width\":1280,\"height\":720,\"caption\":\"firewall\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Unihost\",\"item\":\"https:\/\/unihost.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Help\",\"item\":\"https:\/\/unihost.com\/help\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Common Iptables firewall rules\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/unihost.com\/help\/#website\",\"url\":\"https:\/\/unihost.com\/help\/\",\"name\":\"Unihost.FAQ\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/unihost.com\/help\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/unihost.com\/help\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/unihost.com\/help\/#organization\",\"name\":\"Unihost\",\"alternateName\":\"Unihost\",\"url\":\"https:\/\/unihost.com\/help\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/unihost.com\/help\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/unihost.com\/help\/minio.php?2026\/01\/minio.png\",\"contentUrl\":\"https:\/\/unihost.com\/help\/minio.php?2026\/01\/minio.png\",\"width\":300,\"height\":300,\"caption\":\"Unihost\"},\"image\":{\"@id\":\"https:\/\/unihost.com\/help\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/unihost\/\",\"https:\/\/x.com\/unihost\",\"https:\/\/www.instagram.com\/unihost\/?hl=en\",\"https:\/\/www.linkedin.com\/company\/unihost-com\",\"https:\/\/www.youtube.com\/channel\/UCITKsxMDnslQY8brN3advgw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/unihost.com\/help\/#\/schema\/person\/bb5ae95f38577c920e6a7507888b715a\",\"name\":\"Unihost Support\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/unihost.com\/help\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a0c9db17c2a0d93e8a0d5ac123f8c5db750ad4d3d5657369c0c4e480f5af77b8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a0c9db17c2a0d93e8a0d5ac123f8c5db750ad4d3d5657369c0c4e480f5af77b8?s=96&d=mm&r=g\",\"caption\":\"Unihost Support\"},\"sameAs\":[\"https:\/\/unihost.com\/\"],\"url\":\"https:\/\/unihost.com\/help\/author\/support\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Common Iptables firewall rules - Unihost.FAQ","description":"iptables is a command line utility for configuring Linux kernel firewall implemented within the Netfilter project.- Unihost.FAQ","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/","og_locale":"en_US","og_type":"article","og_title":"Common Iptables firewall rules - Unihost.FAQ","og_description":"iptables is a command line utility for configuring Linux kernel firewall implemented within the Netfilter project.- Unihost.FAQ","og_url":"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/","og_site_name":"Unihost.FAQ","article_publisher":"https:\/\/www.facebook.com\/unihost\/","article_published_time":"2019-05-31T09:33:19+00:00","article_modified_time":"2023-09-22T13:03:14+00:00","og_image":[{"url":"https:\/\/unihost.com\/help\/wp-content\/uploads\/New-Project-4.jpg","type":"","width":"","height":""}],"author":"Unihost Support","twitter_card":"summary_large_image","twitter_creator":"@unihost","twitter_site":"@unihost","twitter_misc":{"Written by":"Unihost Support","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/#article","isPartOf":{"@id":"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/"},"author":{"name":"Unihost Support","@id":"https:\/\/unihost.com\/help\/#\/schema\/person\/bb5ae95f38577c920e6a7507888b715a"},"headline":"Common Iptables firewall rules","datePublished":"2019-05-31T09:33:19+00:00","dateModified":"2023-09-22T13:03:14+00:00","mainEntityOfPage":{"@id":"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/"},"wordCount":402,"publisher":{"@id":"https:\/\/unihost.com\/help\/#organization"},"image":{"@id":"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/#primaryimage"},"thumbnailUrl":"https:\/\/unihost.com\/help\/wp-content\/uploads\/New-Project-4.jpg","keywords":["iptables"],"articleSection":["02. Dedicated servers"],"inLanguage":"en"},{"@type":"WebPage","@id":"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/","url":"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/","name":"Common Iptables firewall rules - Unihost.FAQ","isPartOf":{"@id":"https:\/\/unihost.com\/help\/#website"},"primaryImageOfPage":{"@id":"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/#primaryimage"},"image":{"@id":"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/#primaryimage"},"thumbnailUrl":"https:\/\/unihost.com\/help\/wp-content\/uploads\/New-Project-4.jpg","datePublished":"2019-05-31T09:33:19+00:00","dateModified":"2023-09-22T13:03:14+00:00","description":"iptables is a command line utility for configuring Linux kernel firewall implemented within the Netfilter project.- Unihost.FAQ","breadcrumb":{"@id":"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/#primaryimage","url":"https:\/\/unihost.com\/help\/minio.php?.\/New-Project-4.jpg","contentUrl":"https:\/\/unihost.com\/help\/minio.php?.\/New-Project-4.jpg","width":1280,"height":720,"caption":"firewall"},{"@type":"BreadcrumbList","@id":"https:\/\/unihost.com\/help\/common-iptables-firewall-rules\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Unihost","item":"https:\/\/unihost.com\/"},{"@type":"ListItem","position":2,"name":"Help","item":"https:\/\/unihost.com\/help\/"},{"@type":"ListItem","position":3,"name":"Common Iptables firewall rules"}]},{"@type":"WebSite","@id":"https:\/\/unihost.com\/help\/#website","url":"https:\/\/unihost.com\/help\/","name":"Unihost.FAQ","description":"","publisher":{"@id":"https:\/\/unihost.com\/help\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/unihost.com\/help\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/unihost.com\/help\/#organization","name":"Unihost","alternateName":"Unihost","url":"https:\/\/unihost.com\/help\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/unihost.com\/help\/#\/schema\/logo\/image\/","url":"https:\/\/unihost.com\/help\/minio.php?2026\/01\/minio.png","contentUrl":"https:\/\/unihost.com\/help\/minio.php?2026\/01\/minio.png","width":300,"height":300,"caption":"Unihost"},"image":{"@id":"https:\/\/unihost.com\/help\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/unihost\/","https:\/\/x.com\/unihost","https:\/\/www.instagram.com\/unihost\/?hl=en","https:\/\/www.linkedin.com\/company\/unihost-com","https:\/\/www.youtube.com\/channel\/UCITKsxMDnslQY8brN3advgw"]},{"@type":"Person","@id":"https:\/\/unihost.com\/help\/#\/schema\/person\/bb5ae95f38577c920e6a7507888b715a","name":"Unihost Support","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/unihost.com\/help\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a0c9db17c2a0d93e8a0d5ac123f8c5db750ad4d3d5657369c0c4e480f5af77b8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a0c9db17c2a0d93e8a0d5ac123f8c5db750ad4d3d5657369c0c4e480f5af77b8?s=96&d=mm&r=g","caption":"Unihost Support"},"sameAs":["https:\/\/unihost.com\/"],"url":"https:\/\/unihost.com\/help\/author\/support\/"}]}},"_links":{"self":[{"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/posts\/7242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/comments?post=7242"}],"version-history":[{"count":11,"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/posts\/7242\/revisions"}],"predecessor-version":[{"id":16299,"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/posts\/7242\/revisions\/16299"}],"wp:attachment":[{"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/media?parent=7242"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/categories?post=7242"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/tags?post=7242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}