INSTALL IPTABLES IN DEBIAN 11 (BULLSEYE) Rumi, February 26, 2024February 26, 2024 In this article you will learn how to uninstall default nftables framework, install iptables Debian 11 (Bullseye) and basic rules initial configuration. Uninstall nftables and its Dependencies IPtables is being replaced by nftables starting with Debian 10 Buster. Debian 11 comes with nftables framework. To install iptables first we need uninstall nftables and its dependencies. SSH into your server and run the next commands: # apt-get remove --auto-remove nftables # apt-get purge nftables Install IPtables in Debian 11 To install iptables execute following commands: # apt-get update # apt-get install iptables Debian IPtables Status Check Now we can check the iptables status and list rules. For list all the rules we will use option -L. Run command: # iptables -L -v You will see the output: As you see on the screenshot just installed iptables firewall and it works. But all chains (INPUT, FORWARD, OUTPUT) are set to ACCEPT, and we have no security rules configured. Clear Iptables Rules То clear iptables rules (open all ports) use the following command sequence: # iptables -P INPUT ACCEPT # iptables -F # iptables -X Debian Iptables Persistent To make your iptables rules persistent install iptables-persistent package: # apt-get install iptables-persistent Now Iptables Configuration files rules.v4 and rules.v6 stored in /etc/iptables Debian IPtables Save To update iptables with new rules use IPtables Save command: # iptables-save > /etc/iptables/rules.v4 for IPV6: # ip6tables-save > /etc/iptables/rules.v6 Iptables Restore To restore iptables configuration form iptables configuration file. # iptables-restore < /etc/iptables/rules.v4 Ref: Install IPtables in Debian 11 (Bullseye) Related Administrations Configurations (Linux) Configurations (Windows) Debain iptablesDebianDebian 11iptables
Solving A remote code execution vulnerability exists in the Credential Security Support Provider protocol (CredSSP) on Windows RDP March 18, 2022 WORKAROUND Use the group policy settings changes described below to rollback the changes to ‘Vulnerable’ state to allow RDP access. 1. Open Group Policy Editor, by executing gpedit.msc 2. Policy path: Computer Configuration -> Administrative Templates -> System -> Credentials Delegation Run gpedit.msc and expand Administrative Templates Related Read More
vestacp open: /etc/named.conf: permission denied August 1, 2022 This was the error I was getting after a doing a little change in the named.conf in my newly installed vesta control panel. While restarting the named, I was getting this error- [root@vesta2 ~]# systemctl status named.service ● named.service – Berkeley Internet Name Domain (DNS) Loaded: loaded (/usr/lib/systemd/system/named.service; enabled; vendor… Read More
Zimbra – deleting all email in queue by sender August 17, 2018January 15, 2022 As root user execute: /opt/zimbra/postfix/sbin/postqueue -p | tail -n +2 | awk ‘BEGIN { RS = “” } / sender@mail\.com/ { print $1 }’ | tr -d ‘*’ | /opt/zimbra/postfix/sbin/postsuper -d – To Delete ALL Messages From Queue /opt/zimbra/postfix/sbin/postsuper -d ALL or /opt/zimbra/common/sbin/postsupe -d ALL Another way to do this:… Read More