How do you block new incoming tcp connections on X port? The Next CEO of Stack OverflowUsing iptables to redirect incoming requests from port 2525 to port 25?how limit the number of open TCP streams from same IP to a local port?iptables rule to block incoming/outgoing traffic to a Xen containerConnection timed out after plenty of new TCP connections through Juniper firewallBlock incoming connections but outgoing UDP is also blocked?UFW/IPTables: how to securely allow authenticated git access with githubiptables - Block incoming on Eth1 and Allow All from eth0iptables error: unknown option --dportHow to apply port forwarding with iptables on existing connections?Disconnecting connections to TCP server by external means

Is it OK to decorate a log book cover?

Can this transistor (2N2222) take 6 V on emitter-base? Am I reading the datasheet incorrectly?

How to coordinate airplane tickets?

What is the difference between 'contrib' and 'non-free' packages repositories?

Physiological effects of huge anime eyes

Identify and count spells (Distinctive events within each group)

How do I secure a TV wall mount?

Free fall ellipse or parabola?

Why does freezing point matter when picking cooler ice packs?

Man transported from Alternate World into ours by a Neutrino Detector

Why can't we say "I have been having a dog"?

Compensation for working overtime on Saturdays

That's an odd coin - I wonder why

Arity of Primitive Recursive Functions

Calculate the Mean mean of two numbers

Is it correct to say moon starry nights?

How can I separate the number from the unit in argument?

Are British MPs missing the point, with these 'Indicative Votes'?

Is a linearly independent set whose span is dense a Schauder basis?

Why did early computer designers eschew integers?

Early programmable calculators with RS-232

Find the majority element, which appears more than half the time

Upgrading From a 9 Speed Sora Derailleur?

Masking layers by a vector polygon layer in QGIS



How do you block new incoming tcp connections on X port?



The Next CEO of Stack OverflowUsing iptables to redirect incoming requests from port 2525 to port 25?how limit the number of open TCP streams from same IP to a local port?iptables rule to block incoming/outgoing traffic to a Xen containerConnection timed out after plenty of new TCP connections through Juniper firewallBlock incoming connections but outgoing UDP is also blocked?UFW/IPTables: how to securely allow authenticated git access with githubiptables - Block incoming on Eth1 and Allow All from eth0iptables error: unknown option --dportHow to apply port forwarding with iptables on existing connections?Disconnecting connections to TCP server by external means










5















How do you block new incoming tcp connections on X port? Needs to be done with iptables. I actually have a working iptables command but we always reach ip_conntrack_max even when ip_conntrack_max isset at very high. There a way to do it without keeping track?










share|improve this question


























    5















    How do you block new incoming tcp connections on X port? Needs to be done with iptables. I actually have a working iptables command but we always reach ip_conntrack_max even when ip_conntrack_max isset at very high. There a way to do it without keeping track?










    share|improve this question
























      5












      5








      5


      0






      How do you block new incoming tcp connections on X port? Needs to be done with iptables. I actually have a working iptables command but we always reach ip_conntrack_max even when ip_conntrack_max isset at very high. There a way to do it without keeping track?










      share|improve this question














      How do you block new incoming tcp connections on X port? Needs to be done with iptables. I actually have a working iptables command but we always reach ip_conntrack_max even when ip_conntrack_max isset at very high. There a way to do it without keeping track?







      networking firewall iptables






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Feb 2 '10 at 19:17









      user30199user30199

      7416




      7416




















          4 Answers
          4






          active

          oldest

          votes


















          5














          If you want to block attempts to establish new sessions to a given port, but still allow packets to established sessions through, you'd need to do something like:



          iptables -A INPUT -j DROP -p tcp --syn --destination-port dport


          This should allow any connection initiated from the local machine, that happens to use dport as its local port number.






          share|improve this answer






























            1














            this should block the traffic without involving conn_track:



            iptables -A INPUT -j DROP -p tcp --destination-port <your port>


            connection tracking should only do its job when you specify -m state or --state in your rules.






            share|improve this answer


















            • 1





              The question was for blocking incoming TCP connections - that should have been a huge clue to filter on SYN

              – PP.
              Mar 10 '10 at 14:23











            • as i understand it: when you drop syn packets, there will be no connections, so you can drop every connection to the port.

              – Christian
              Mar 10 '10 at 14:50











            • If, for some reason, you have attempted to initiate a connection using that port number as the local port, dropping everything would drop the returning SYNACK, dropping SYN-only packets just stops non-locally-initiated packets. Admittedly, less of a problem when you have a specified destination port, but in the general case...

              – Vatine
              Mar 16 '10 at 11:29


















            0














            Dropping --syn will stop new connections and there shouldn't be any half-open connections to track. In general filtering "without keeping track" is possible at the -t raw -I PREROUTING stage.






            share|improve this answer






























              0














              You could accept everything other than SYN packets. One way to do it would be:



              iptables -A INPUT -p tcp '!' --syn --destination-port <your-port> -j ACCEPT





              share|improve this answer








              New contributor




              Arindam Mukherjee is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
              Check out our Code of Conduct.




















                Your Answer








                StackExchange.ready(function()
                var channelOptions =
                tags: "".split(" "),
                id: "2"
                ;
                initTagRenderer("".split(" "), "".split(" "), channelOptions);

                StackExchange.using("externalEditor", function()
                // Have to fire editor after snippets, if snippets enabled
                if (StackExchange.settings.snippets.snippetsEnabled)
                StackExchange.using("snippets", function()
                createEditor();
                );

                else
                createEditor();

                );

                function createEditor()
                StackExchange.prepareEditor(
                heartbeatType: 'answer',
                autoActivateHeartbeat: false,
                convertImagesToLinks: true,
                noModals: true,
                showLowRepImageUploadWarning: true,
                reputationToPostImages: 10,
                bindNavPrevention: true,
                postfix: "",
                imageUploader:
                brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
                contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
                allowUrls: true
                ,
                onDemand: true,
                discardSelector: ".discard-answer"
                ,immediatelyShowMarkdownHelp:true
                );



                );













                draft saved

                draft discarded


















                StackExchange.ready(
                function ()
                StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f108888%2fhow-do-you-block-new-incoming-tcp-connections-on-x-port%23new-answer', 'question_page');

                );

                Post as a guest















                Required, but never shown

























                4 Answers
                4






                active

                oldest

                votes








                4 Answers
                4






                active

                oldest

                votes









                active

                oldest

                votes






                active

                oldest

                votes









                5














                If you want to block attempts to establish new sessions to a given port, but still allow packets to established sessions through, you'd need to do something like:



                iptables -A INPUT -j DROP -p tcp --syn --destination-port dport


                This should allow any connection initiated from the local machine, that happens to use dport as its local port number.






                share|improve this answer



























                  5














                  If you want to block attempts to establish new sessions to a given port, but still allow packets to established sessions through, you'd need to do something like:



                  iptables -A INPUT -j DROP -p tcp --syn --destination-port dport


                  This should allow any connection initiated from the local machine, that happens to use dport as its local port number.






                  share|improve this answer

























                    5












                    5








                    5







                    If you want to block attempts to establish new sessions to a given port, but still allow packets to established sessions through, you'd need to do something like:



                    iptables -A INPUT -j DROP -p tcp --syn --destination-port dport


                    This should allow any connection initiated from the local machine, that happens to use dport as its local port number.






                    share|improve this answer













                    If you want to block attempts to establish new sessions to a given port, but still allow packets to established sessions through, you'd need to do something like:



                    iptables -A INPUT -j DROP -p tcp --syn --destination-port dport


                    This should allow any connection initiated from the local machine, that happens to use dport as its local port number.







                    share|improve this answer












                    share|improve this answer



                    share|improve this answer










                    answered Feb 3 '10 at 8:30









                    VatineVatine

                    4,8801622




                    4,8801622























                        1














                        this should block the traffic without involving conn_track:



                        iptables -A INPUT -j DROP -p tcp --destination-port <your port>


                        connection tracking should only do its job when you specify -m state or --state in your rules.






                        share|improve this answer


















                        • 1





                          The question was for blocking incoming TCP connections - that should have been a huge clue to filter on SYN

                          – PP.
                          Mar 10 '10 at 14:23











                        • as i understand it: when you drop syn packets, there will be no connections, so you can drop every connection to the port.

                          – Christian
                          Mar 10 '10 at 14:50











                        • If, for some reason, you have attempted to initiate a connection using that port number as the local port, dropping everything would drop the returning SYNACK, dropping SYN-only packets just stops non-locally-initiated packets. Admittedly, less of a problem when you have a specified destination port, but in the general case...

                          – Vatine
                          Mar 16 '10 at 11:29















                        1














                        this should block the traffic without involving conn_track:



                        iptables -A INPUT -j DROP -p tcp --destination-port <your port>


                        connection tracking should only do its job when you specify -m state or --state in your rules.






                        share|improve this answer


















                        • 1





                          The question was for blocking incoming TCP connections - that should have been a huge clue to filter on SYN

                          – PP.
                          Mar 10 '10 at 14:23











                        • as i understand it: when you drop syn packets, there will be no connections, so you can drop every connection to the port.

                          – Christian
                          Mar 10 '10 at 14:50











                        • If, for some reason, you have attempted to initiate a connection using that port number as the local port, dropping everything would drop the returning SYNACK, dropping SYN-only packets just stops non-locally-initiated packets. Admittedly, less of a problem when you have a specified destination port, but in the general case...

                          – Vatine
                          Mar 16 '10 at 11:29













                        1












                        1








                        1







                        this should block the traffic without involving conn_track:



                        iptables -A INPUT -j DROP -p tcp --destination-port <your port>


                        connection tracking should only do its job when you specify -m state or --state in your rules.






                        share|improve this answer













                        this should block the traffic without involving conn_track:



                        iptables -A INPUT -j DROP -p tcp --destination-port <your port>


                        connection tracking should only do its job when you specify -m state or --state in your rules.







                        share|improve this answer












                        share|improve this answer



                        share|improve this answer










                        answered Feb 3 '10 at 7:17









                        ChristianChristian

                        4,15211826




                        4,15211826







                        • 1





                          The question was for blocking incoming TCP connections - that should have been a huge clue to filter on SYN

                          – PP.
                          Mar 10 '10 at 14:23











                        • as i understand it: when you drop syn packets, there will be no connections, so you can drop every connection to the port.

                          – Christian
                          Mar 10 '10 at 14:50











                        • If, for some reason, you have attempted to initiate a connection using that port number as the local port, dropping everything would drop the returning SYNACK, dropping SYN-only packets just stops non-locally-initiated packets. Admittedly, less of a problem when you have a specified destination port, but in the general case...

                          – Vatine
                          Mar 16 '10 at 11:29












                        • 1





                          The question was for blocking incoming TCP connections - that should have been a huge clue to filter on SYN

                          – PP.
                          Mar 10 '10 at 14:23











                        • as i understand it: when you drop syn packets, there will be no connections, so you can drop every connection to the port.

                          – Christian
                          Mar 10 '10 at 14:50











                        • If, for some reason, you have attempted to initiate a connection using that port number as the local port, dropping everything would drop the returning SYNACK, dropping SYN-only packets just stops non-locally-initiated packets. Admittedly, less of a problem when you have a specified destination port, but in the general case...

                          – Vatine
                          Mar 16 '10 at 11:29







                        1




                        1





                        The question was for blocking incoming TCP connections - that should have been a huge clue to filter on SYN

                        – PP.
                        Mar 10 '10 at 14:23





                        The question was for blocking incoming TCP connections - that should have been a huge clue to filter on SYN

                        – PP.
                        Mar 10 '10 at 14:23













                        as i understand it: when you drop syn packets, there will be no connections, so you can drop every connection to the port.

                        – Christian
                        Mar 10 '10 at 14:50





                        as i understand it: when you drop syn packets, there will be no connections, so you can drop every connection to the port.

                        – Christian
                        Mar 10 '10 at 14:50













                        If, for some reason, you have attempted to initiate a connection using that port number as the local port, dropping everything would drop the returning SYNACK, dropping SYN-only packets just stops non-locally-initiated packets. Admittedly, less of a problem when you have a specified destination port, but in the general case...

                        – Vatine
                        Mar 16 '10 at 11:29





                        If, for some reason, you have attempted to initiate a connection using that port number as the local port, dropping everything would drop the returning SYNACK, dropping SYN-only packets just stops non-locally-initiated packets. Admittedly, less of a problem when you have a specified destination port, but in the general case...

                        – Vatine
                        Mar 16 '10 at 11:29











                        0














                        Dropping --syn will stop new connections and there shouldn't be any half-open connections to track. In general filtering "without keeping track" is possible at the -t raw -I PREROUTING stage.






                        share|improve this answer



























                          0














                          Dropping --syn will stop new connections and there shouldn't be any half-open connections to track. In general filtering "without keeping track" is possible at the -t raw -I PREROUTING stage.






                          share|improve this answer

























                            0












                            0








                            0







                            Dropping --syn will stop new connections and there shouldn't be any half-open connections to track. In general filtering "without keeping track" is possible at the -t raw -I PREROUTING stage.






                            share|improve this answer













                            Dropping --syn will stop new connections and there shouldn't be any half-open connections to track. In general filtering "without keeping track" is possible at the -t raw -I PREROUTING stage.







                            share|improve this answer












                            share|improve this answer



                            share|improve this answer










                            answered Dec 11 '14 at 21:19









                            Cedric KnightCedric Knight

                            939519




                            939519





















                                0














                                You could accept everything other than SYN packets. One way to do it would be:



                                iptables -A INPUT -p tcp '!' --syn --destination-port <your-port> -j ACCEPT





                                share|improve this answer








                                New contributor




                                Arindam Mukherjee is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                                Check out our Code of Conduct.
























                                  0














                                  You could accept everything other than SYN packets. One way to do it would be:



                                  iptables -A INPUT -p tcp '!' --syn --destination-port <your-port> -j ACCEPT





                                  share|improve this answer








                                  New contributor




                                  Arindam Mukherjee is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                                  Check out our Code of Conduct.






















                                    0












                                    0








                                    0







                                    You could accept everything other than SYN packets. One way to do it would be:



                                    iptables -A INPUT -p tcp '!' --syn --destination-port <your-port> -j ACCEPT





                                    share|improve this answer








                                    New contributor




                                    Arindam Mukherjee is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                                    Check out our Code of Conduct.










                                    You could accept everything other than SYN packets. One way to do it would be:



                                    iptables -A INPUT -p tcp '!' --syn --destination-port <your-port> -j ACCEPT






                                    share|improve this answer








                                    New contributor




                                    Arindam Mukherjee is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                                    Check out our Code of Conduct.









                                    share|improve this answer



                                    share|improve this answer






                                    New contributor




                                    Arindam Mukherjee is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                                    Check out our Code of Conduct.









                                    answered yesterday









                                    Arindam MukherjeeArindam Mukherjee

                                    1011




                                    1011




                                    New contributor




                                    Arindam Mukherjee is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                                    Check out our Code of Conduct.





                                    New contributor





                                    Arindam Mukherjee is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                                    Check out our Code of Conduct.






                                    Arindam Mukherjee is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                                    Check out our Code of Conduct.



























                                        draft saved

                                        draft discarded
















































                                        Thanks for contributing an answer to Server Fault!


                                        • Please be sure to answer the question. Provide details and share your research!

                                        But avoid


                                        • Asking for help, clarification, or responding to other answers.

                                        • Making statements based on opinion; back them up with references or personal experience.

                                        To learn more, see our tips on writing great answers.




                                        draft saved


                                        draft discarded














                                        StackExchange.ready(
                                        function ()
                                        StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f108888%2fhow-do-you-block-new-incoming-tcp-connections-on-x-port%23new-answer', 'question_page');

                                        );

                                        Post as a guest















                                        Required, but never shown





















































                                        Required, but never shown














                                        Required, but never shown












                                        Required, but never shown







                                        Required, but never shown

































                                        Required, but never shown














                                        Required, but never shown












                                        Required, but never shown







                                        Required, but never shown







                                        Popular posts from this blog

                                        Wikipedia:Vital articles Мазмуну Biography - Өмүр баян Philosophy and psychology - Философия жана психология Religion - Дин Social sciences - Коомдук илимдер Language and literature - Тил жана адабият Science - Илим Technology - Технология Arts and recreation - Искусство жана эс алуу History and geography - Тарых жана география Навигация менюсу

                                        Bruxelas-Capital Índice Historia | Composición | Situación lingüística | Clima | Cidades irmandadas | Notas | Véxase tamén | Menú de navegacióneO uso das linguas en Bruxelas e a situación do neerlandés"Rexión de Bruxelas Capital"o orixinalSitio da rexiónPáxina de Bruselas no sitio da Oficina de Promoción Turística de Valonia e BruxelasMapa Interactivo da Rexión de Bruxelas-CapitaleeWorldCat332144929079854441105155190212ID28008674080552-90000 0001 0666 3698n94104302ID540940339365017018237

                                        What should I write in an apology letter, since I have decided not to join a company after accepting an offer letterShould I keep looking after accepting a job offer?What should I do when I've been verbally told I would get an offer letter, but still haven't gotten one after 4 weeks?Do I accept an offer from a company that I am not likely to join?New job hasn't confirmed starting date and I want to give current employer as much notice as possibleHow should I address my manager in my resignation letter?HR delayed background verification, now jobless as resignedNo email communication after accepting a formal written offer. How should I phrase the call?What should I do if after receiving a verbal offer letter I am informed that my written job offer is put on hold due to some internal issues?Should I inform the current employer that I am about to resign within 1-2 weeks since I have signed the offer letter and waiting for visa?What company will do, if I send their offer letter to another company