# Generated by iptables-save v1.6.0 on Mon Mar 13 23:49:07 2017
*filter
:INPUT DROP [16083:4490680]
:FORWARD DROP [0:0]
:OUTPUT DROP [594:179712]
:BAN - [0:0]
:C_FILTER - [0:0]
:ICMP_TBL - [0:0]
:TCP_TBL - [0:0]
:UDP_TBL - [0:0]
:WH_LIST - [0:0]
-A INPUT -i lo -m comment --comment "ALLOW all LOOPBACK traffic by default" -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 22 -m state --state NEW,ESTABLISHED -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --sport 22 -m state --state ESTABLISHED -j ACCEPT
-A INPUT -i eth0 -m state --state NEW -j BAN
-A INPUT -p tcp -m comment --comment "Redirect to TCP rules table" -j TCP_TBL
-A INPUT -p udp -m comment --comment "Redirect to UDP rules table" -j UDP_TBL
-A INPUT -p icmp -m comment --comment "Redirect to ICMP rules table" -j ICMP_TBL
-A OUTPUT -o lo -m comment --comment "ALLOW all LOOPBACK traffic by default" -j ACCEPT
-A OUTPUT -o eth0 -p tcp -m tcp --sport 22 -m state --state ESTABLISHED -j ACCEPT
-A OUTPUT -o eth0 -p tcp -m tcp --dport 22 -m state --state NEW,ESTABLISHED -j ACCEPT
-A OUTPUT -p tcp -m comment --comment "Redirect to TCP rules table" -j TCP_TBL
-A OUTPUT -p udp -m comment --comment "Redirect to UDP rules table" -j UDP_TBL
-A OUTPUT -p icmp -m comment --comment "Redirect to ICMP rules table" -j ICMP_TBL
-A BAN -m set --match-set BAN src -j DROP
-A BAN -m set ! --match-set BAN src -j C_FILTER
-A BAN -j RETURN
-A C_FILTER -m set ! --match-set C_FILTER src -j WH_LIST
-A C_FILTER -m set --match-set C_FILTER src -j RETURN
-A ICMP_TBL -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A ICMP_TBL -p icmp -m icmp --icmp-type 0 -j ACCEPT
-A ICMP_TBL -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A ICMP_TBL -p icmp -m icmp --icmp-type 0 -j ACCEPT
-A TCP_TBL -i eth0 -p tcp -m tcp --dport 80 -m string --string "GET /w00tw00t" --algo bm --to 70 -m comment --comment "Logging web-bot" -j LOG --log-prefix "Web BOT #w00tw00t**" --log-level 6
-A TCP_TBL -i eth0 -p tcp -m tcp --dport 80 -m string --string "GET /w00tw00t" --algo bm --to 70 -m comment --comment "Blocking web-bot" -j DROP
-A TCP_TBL -i eth0 -p tcp -m multiport --dports 80,443 -m state --state NEW,ESTABLISHED -j ACCEPT
-A TCP_TBL -o eth0 -p tcp -m multiport --sports 80,443 -m state --state ESTABLISHED -j ACCEPT
-A TCP_TBL -o eth0 -p tcp -m multiport --dports 80,443 -m state --state NEW,ESTABLISHED -j ACCEPT
-A TCP_TBL -i eth0 -p tcp -m multiport --sports 80,443 -m state --state ESTABLISHED -j ACCEPT
-A TCP_TBL -i eth0 -p tcp -m multiport --dports 80,443 -m limit --limit 25/min --limit-burst 100 -j ACCEPT
-A TCP_TBL -o eth0 -p tcp -m tcp --sport 1024:65535 --dport 21 -m state --state NEW,ESTABLISHED -j ACCEPT
-A TCP_TBL -i eth0 -p tcp -m tcp --sport 21 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
-A TCP_TBL -o eth0 -p tcp -m tcp --sport 1024:65535 --dport 20 -m state --state NEW,ESTABLISHED -j ACCEPT
-A TCP_TBL -i eth0 -p tcp -m tcp --sport 20 --dport 1024:65535 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A TCP_TBL -o eth0 -p tcp -m tcp --sport 1024:65535 --dport 1024:65535 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A TCP_TBL -i eth0 -p tcp -m tcp --sport 1024:65535 --dport 1024:65535 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A TCP_TBL -o eth0 -p tcp -m tcp --dport 25 -m state --state NEW,ESTABLISHED -j ACCEPT
-A TCP_TBL -i eth0 -p tcp -m tcp --sport 25 -m state --state ESTABLISHED -j ACCEPT
-A UDP_TBL -o eth0 -p udp -m udp --dport 53 -j ACCEPT
-A UDP_TBL -i eth0 -p udp -m udp --sport 53 -j ACCEPT
-A WH_LIST -m set --match-set WH_LIST src -j RETURN
-A WH_LIST -m set ! --match-set WH_LIST src -j DROP
COMMIT
# Completed on Mon Mar 13 23:49:07 2017