07.06.2014 Views

2 - Raspberry PI Community Projects

2 - Raspberry PI Community Projects

2 - Raspberry PI Community Projects

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

➨ http://www.faqs.org/rfcs/rfc777.html<br />

➨ http://www.faqs.org/rfcs/rfc792.html<br />

For reference, a receive buffer is a small memory zone storing data between<br />

the time it arrives from the network and the time the kernel handles it. If this<br />

zone is full, new data cannot be received, and ICMP signals the problem, so<br />

that the emier can slow down its transfer rate (which should ideally reach<br />

an equilibrium aer some time).<br />

Note that although an IPv4 network can work without ICMP, ICMPv6 is<br />

strictly required for an IPv6 network, since it combines several functions that<br />

were, in the IPv4 world, spread across ICMPv4, IGMP (Internet Group Membership<br />

Protocol) and ARP (Address Resolution Protocol). ICMPv6 is defined in<br />

RFC4443.<br />

➨ http://www.faqs.org/rfcs/rfc4443.html<br />

• ACCEPT: allow the packet to go on its way;<br />

• REJECT: reject the packet with an ICMP error packet (the --reject-with type option to<br />

iptables allows selecting the type of error);<br />

• DROP: delete (ignore) the packet;<br />

• LOG: log (via syslogd) a message with a description of the packet; note that this action<br />

does not interrupt processing, and the execution of the chain continues at the next rule,<br />

which is why logging refused packets requires both a LOG and a REJECT/DROP rule;<br />

• ULOG: log a message via ulogd, which can be better adapted and more efficient than<br />

syslogd for handling large numbers of messages; note that this action, like LOG, also<br />

returns processing to the next rule in the calling chain;<br />

• chain_name: jump to the given chain and evaluate its rules;<br />

• RETURN: interrupt processing of the current chain, and return to the calling chain; in<br />

case the current chain is a standard one, there's no calling chain, so the default action<br />

(defined with the -P option to iptables) is executed instead;<br />

• SNAT (only in the nat table, therefore only in IPv4): apply Source NAT (extra options describe<br />

the exact changes to apply);<br />

• DNAT (only in the nat table, therefore only in IPv4): apply Destination NAT (extra options<br />

describe the exact changes to apply);<br />

• MASQUERADE (only in the nat table, therefore only in IPv4): apply masquerading (a<br />

special case of Source NAT);<br />

• REDIRECT (only in the nat table, therefore only in IPv4): redirect a packet to a given<br />

port of the firewall itself; this can be used to set up a transparent web proxy that works<br />

with no configuration on the client side, since the client thinks it connects to the recipient<br />

whereas the communications actually go through the proxy.<br />

378 The Debian Administrator's Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!