{"id":14684,"date":"2024-02-04T14:10:03","date_gmt":"2024-02-04T10:40:03","guid":{"rendered":"https:\/\/www.itpiran.net\/blog\/?p=14684"},"modified":"2024-02-04T14:10:03","modified_gmt":"2024-02-04T10:40:03","slug":"how-to-list-and-delete-iptables-firewall-rules","status":"publish","type":"post","link":"https:\/\/www.itpiran.net\/blog\/tr\/tutorials\/how-to-list-and-delete-iptables-firewall-rules\/","title":{"rendered":"Iptables g\u00fcvenlik duvar\u0131 kurallar\u0131 nas\u0131l listelenir ve silinir"},"content":{"rendered":"<h2 id=\"%d9%85%d9%82%d8%af%d9%85%d9%87\">girii\u015f<\/h2>\n<p>Iptables, \u00e7o\u011fu Linux sistemi i\u00e7in a\u011f g\u00fcvenli\u011finde temel bir rol oynayan bir g\u00fcvenlik duvar\u0131d\u0131r. Bir\u00e7ok iptables e\u011fitimi, sunucunuzu g\u00fcvence alt\u0131na almak i\u00e7in g\u00fcvenlik duvar\u0131 kurallar\u0131n\u0131n nas\u0131l olu\u015fturulaca\u011f\u0131n\u0131 \u00f6\u011fretirken, bu e\u011fitim g\u00fcvenlik duvar\u0131 y\u00f6netiminin farkl\u0131 bir y\u00f6n\u00fcne, yani kurallar\u0131 listelemeye ve silmeye odaklanmaktad\u0131r.<\/p>\n<p>Bu e\u011fitimde, a\u015fa\u011f\u0131daki iptables g\u00f6revlerinin nas\u0131l ger\u00e7ekle\u015ftirilece\u011fini ele alaca\u011f\u0131z:<\/p>\n<ul>\n<li>Kurallar\u0131 listeleyin<\/li>\n<li>Paket ve bayt saya\u00e7lar\u0131n\u0131 temizle<\/li>\n<li>Kurallar\u0131 sil<\/li>\n<li>Bir zinciri temizleme (bir zincirdeki t\u00fcm kurallar\u0131 silme)<\/li>\n<li>T\u00fcm zincirleri ve tablolar\u0131 temizleyin, t\u00fcm zincirleri kald\u0131r\u0131n ve t\u00fcm trafi\u011fi kabul edin<\/li>\n<\/ul>\n<h5 id=\"%d9%be%db%8c%d8%b4-%d9%86%db%8c%d8%a7%d8%b2%d9%87%d8%a7\">\u00d6n ko\u015fullar<\/h5>\n<p>Bu e\u011fitim, iptables komutunun y\u00fckl\u00fc oldu\u011fu ve kullan\u0131c\u0131n\u0131z\u0131n sudo ayr\u0131cal\u0131klar\u0131na sahip oldu\u011fu bir Linux sunucusu kulland\u0131\u011f\u0131n\u0131z\u0131 varsayar. Bu ilk kurulumda yard\u0131ma ihtiyac\u0131n\u0131z olursa, l\u00fctfen Ubuntu 20.04 ile ilk sunucu kurulumu k\u0131lavuzuna bak\u0131n.<\/p>\n<h2 id=\"%d9%81%d9%87%d8%b1%d8%b3%d8%aa-%d8%a8%d9%86%d8%af%db%8c-%d9%82%d9%88%d8%a7%d9%86%db%8c%d9%86-%d8%a8%d8%b1-%d8%a7%d8%b3%d8%a7%d8%b3-%d9%85%d8%b4%d8%ae%d8%b5%d8%a7%d8%aa\">\u015eartnameye g\u00f6re listeleme kurallar\u0131<\/h2>\n<p>\u00d6ncelikle kurallar\u0131n nas\u0131l listelenece\u011fine bakal\u0131m. Etkin iptables kurallar\u0131n\u0131 g\u00f6r\u00fcnt\u00fclemenin iki farkl\u0131 yolu vard\u0131r: bir tabloda veya kural \u00f6zelliklerinin bir listesi olarak. Her iki y\u00f6ntem de a\u015fa\u011f\u0131 yukar\u0131 ayn\u0131 bilgileri farkl\u0131 bi\u00e7imlerde sa\u011flar.<\/p>\n<p>T\u00fcm etkin iptables kurallar\u0131n\u0131 belirtimlerine g\u00f6re listelemek i\u00e7in iptables komutunu -S se\u00e7ene\u011fiyle \u00e7al\u0131\u015ft\u0131r\u0131n:<\/p>\n<div class=\"hcb_wrap\" data-no-translation=\"\" data-no-auto-translation=\"\">\n<pre class=\"prism line-numbers lang-bash\" data-lang=\"Bash\"><code>sudo iptables -S<\/code><\/pre>\n<\/div>\n<div class=\"hcb_wrap\" data-no-translation=\"\" data-no-auto-translation=\"\">\n<pre class=\"prism line-numbers lang-bash\" data-lang=\"Bash\"><code>Output\r\n-P INPUT DROP\r\n-P FORWARD DROP\r\n-P OUTPUT ACCEPT\r\n-N ICMP\r\n-N TCP\r\n-N UDP\r\n-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n-A INPUT -i lo -j ACCEPT\r\n-A INPUT -m conntrack --ctstate INVALID -j DROP\r\n-A INPUT -p udp -m conntrack --ctstate NEW -j UDP\r\n-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m conntrack --ctstate NEW -j TCP\r\n-A INPUT -p icmp -m conntrack --ctstate NEW -j ICMP\r\n-A INPUT -p udp -j REJECT --reject-with icmp-port-unreachable\r\n-A INPUT -p tcp -j REJECT --reject-with tcp-reset\r\n-A INPUT -j REJECT --reject-with icmp-proto-unreachable\r\n-A TCP -p tcp -m tcp --dport 22 -j ACCEPT\r\n...<\/code><\/pre>\n<\/div>\n<p>G\u00f6rd\u00fc\u011f\u00fcn\u00fcz gibi, \u00e7\u0131kt\u0131, \u00f6nceki iptables komutu olmadan, bunlar\u0131 olu\u015fturmak i\u00e7in kullan\u0131lan komutlarla tamamen ayn\u0131d\u0131r. Daha \u00f6nce iptables-persistent veya iptables save kulland\u0131ysan\u0131z, bu da iptables kurallar\u0131 yap\u0131land\u0131rma dosyalar\u0131na benzer olacakt\u0131r.<\/p>\n<h2 id=\"%d9%81%d9%87%d8%b1%d8%b3%d8%aa-%da%a9%d8%b1%d8%af%d9%86-%db%8c%da%a9-%d8%b2%d9%86%d8%ac%db%8c%d8%b1%d9%87-%d8%ae%d8%a7%d8%b5\">Belirli bir zinciri listeleme<\/h2>\n<p>\u00c7\u0131kt\u0131y\u0131 belirli bir zincire (INPUT, OUTPUT, TCP, vb.) s\u0131n\u0131rlamak istiyorsan\u0131z, se\u00e7ene\u011fin hemen ard\u0131ndan zincir ad\u0131n\u0131 belirtebilirsiniz. <code>-S<\/code> \u00d6rne\u011fin, TCP zincirindeki t\u00fcm kurallar\u0131 g\u00f6stermek i\u00e7in \u015fu komutu \u00e7al\u0131\u015ft\u0131r\u0131n:<\/p>\n<div class=\"hcb_wrap\" data-no-translation=\"\" data-no-auto-translation=\"\">\n<pre class=\"prism line-numbers lang-bash\" data-lang=\"Bash\"><code>sudo iptables -S TCP<\/code><\/pre>\n<\/div>\n<div class=\"hcb_wrap\" data-no-translation=\"\" data-no-auto-translation=\"\">\n<pre class=\"prism line-numbers lang-bash\" data-lang=\"Bash\"><code>Output\r\n-N TCP\r\n-A TCP -p tcp -m tcp --dport 22 -j ACCEPT<\/code><\/pre>\n<\/div>\n<p>\u015eimdi aktif iptables kurallar\u0131n\u0131 kural tablosu olarak g\u00f6r\u00fcnt\u00fclemenin alternatif bir yoluna bakal\u0131m.<\/p>\n<h2 id=\"%d9%81%d9%87%d8%b1%d8%b3%d8%aa-%da%a9%d8%b1%d8%af%d9%86-%d9%82%d9%88%d8%a7%d9%86%db%8c%d9%86-%d8%a8%d9%87-%d8%b5%d9%88%d8%b1%d8%aa-%d8%ac%d8%af%d8%a7%d9%88%d9%84\">Tablolardaki liste kurallar\u0131<\/h2>\n<p>iptables kurallar\u0131n\u0131 bir tablo g\u00f6r\u00fcn\u00fcm\u00fcnde listelemek, farkl\u0131 kurallar\u0131 birbirleriyle kar\u015f\u0131la\u015ft\u0131rmak i\u00e7in faydal\u0131 olabilir. Bir tablodaki t\u00fcm etkin iptables kurallar\u0131n\u0131 \u00e7\u0131kt\u0131 olarak almak i\u00e7in iptables komutunu -L se\u00e7ene\u011fiyle \u00e7al\u0131\u015ft\u0131r\u0131n:<\/p>\n<div class=\"hcb_wrap\" data-no-translation=\"\" data-no-auto-translation=\"\">\n<pre class=\"prism line-numbers lang-bash\" data-lang=\"Bash\"><code>sudo iptables -L<\/code><\/pre>\n<\/div>\n<p>Bu, zincir baz\u0131nda s\u0131ralanm\u0131\u015f t\u00fcm mevcut kurallar\u0131 \u00fcretecektir.<\/p>\n<p>\u00c7\u0131kt\u0131y\u0131 belirli bir zincire (INPUT, OUTPUT, TCP, vb.) s\u0131n\u0131rlamak istiyorsan\u0131z, -L se\u00e7ene\u011finden hemen sonra zincir ad\u0131n\u0131 belirtebilirsiniz.<\/p>\n<p>Giri\u015f zinciri \u00f6rne\u011fine bakal\u0131m:<\/p>\n<div class=\"hcb_wrap\" data-no-translation=\"\" data-no-auto-translation=\"\">\n<pre class=\"prism line-numbers lang-bash\" data-lang=\"Bash\"><code>sudo iptables -L INPUT<\/code><\/pre>\n<\/div>\n<div class=\"hcb_wrap\" data-no-translation=\"\" data-no-auto-translation=\"\">\n<pre class=\"prism line-numbers lang-bash\" data-lang=\"Bash\"><code>Output\r\nChain INPUT (policy DROP)\r\ntarget prot opt source destination\r\nACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED\r\nACCEPT all -- anywhere anywhere\r\nDROP all -- anywhere anywhere ctstate INVALID\r\nUDP udp -- anywhere anywhere ctstate NEW\r\nTCP tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK\/SYN ctstate NEW\r\nICMP icmp -- anywhere anywhere ctstate NEW\r\nREJECT udp -- anywhere anywhere reject-with icmp-port-unreachable\r\nREJECT tcp -- anywhere anywhere reject-with tcp-reset\r\nREJECT all -- anywhere anywhere reject-with icmp-proto-unreachable<\/code><\/pre>\n<\/div>\n<p>\u00c7\u0131kt\u0131n\u0131n ilk sat\u0131r\u0131, zincirin ad\u0131n\u0131 (bu durumda INPUT) ve ard\u0131ndan varsay\u0131lan politikas\u0131n\u0131 (DROP) g\u00f6sterir. Sonraki sat\u0131r, tablodaki her s\u00fctunun ba\u015fl\u0131klar\u0131n\u0131 ve ard\u0131ndan zincir kurallar\u0131n\u0131 i\u00e7erir. Her ba\u015fl\u0131\u011f\u0131n neyi temsil etti\u011fini inceleyelim:<\/p>\n<ul>\n<li>Hedef: Bir paket bir kuralla e\u015fle\u015firse, hedef onunla ne yap\u0131laca\u011f\u0131n\u0131 belirtir. \u00d6rne\u011fin, bir paket kabul edilebilir, b\u0131rak\u0131labilir, kaydedilebilir veya daha fazla kuralla kar\u015f\u0131la\u015ft\u0131r\u0131lmak \u00fczere ba\u015fka bir zincire g\u00f6nderilebilir.<\/li>\n<li>prot: tcp, udp, icmp veya t\u00fcm\u00fc gibi protokol<\/li>\n<li>opt: Nadiren kullan\u0131lan bu s\u00fctun IP se\u00e7eneklerini g\u00f6sterir<\/li>\n<li>kaynak: Trafi\u011fin veya herhangi bir yerin kaynak IP adresi veya alt a\u011f\u0131<\/li>\n<li>hedef: Trafi\u011fin veya herhangi bir yerin hedef IP adresi veya alt a\u011f\u0131<\/li>\n<\/ul>\n<p>Etiketlenmemi\u015f son s\u00fctun, bir kural\u0131n se\u00e7eneklerini g\u00f6sterir. Bu, \u00f6nceki s\u00fctunlarda g\u00f6sterilmeyen kural\u0131n herhangi bir par\u00e7as\u0131d\u0131r. Kaynak ve hedef portlardan paket ba\u011flant\u0131s\u0131n\u0131n durumuna kadar her \u015fey olabilir.<\/p>\n<h2 id=\"%d9%86%d9%85%d8%a7%db%8c%d8%b4-%d8%aa%d8%b9%d8%af%d8%a7%d8%af-%d8%a8%d8%b3%d8%aa%d9%87-%d9%87%d8%a7-%d9%88-%d8%a7%d9%86%d8%af%d8%a7%d8%b2%d9%87-%da%a9%d9%84\">Paket say\u0131s\u0131n\u0131 ve toplam boyutu g\u00f6r\u00fcnt\u00fcle<\/h2>\n<p>iptables kurallar\u0131n\u0131 listelerken, her bir kurala uyan paket say\u0131s\u0131n\u0131 ve toplam paket boyutunu bayt cinsinden g\u00f6stermek m\u00fcmk\u00fcnd\u00fcr. Bu, hangi kurallar\u0131n hangi paketlerle e\u015fle\u015fti\u011fine dair genel bir fikir edinmeye \u00e7al\u0131\u015f\u0131rken genellikle faydal\u0131d\u0131r. Bunu yapmak i\u00e7in -L ve -v se\u00e7eneklerini birlikte kullan\u0131n.<\/p>\n<p>\u00d6rne\u011fin, -v se\u00e7ene\u011fiyle INPUT zincirine tekrar bakal\u0131m:<\/p>\n<div class=\"hcb_wrap\" data-no-translation=\"\" data-no-auto-translation=\"\">\n<pre class=\"prism line-numbers lang-bash\" data-lang=\"Bash\"><code>sudo iptables -L INPUT -v<\/code><\/pre>\n<\/div>\n<div class=\"hcb_wrap\" data-no-translation=\"\" data-no-auto-translation=\"\">\n<pre class=\"prism line-numbers lang-bash\" data-lang=\"Bash\"><code>Output\r\nChain INPUT (policy DROP 0 packets, 0 bytes)\r\npkts bytes target prot opt in out source destination\r\n284K 42M ACCEPT all -- any any anywhere anywhere ctstate RELATED,ESTABLISHED\r\n0 0 ACCEPT all -- lo any anywhere anywhere\r\n0 0 DROP all -- any any anywhere anywhere ctstate INVALID\r\n396 63275 UDP udp -- any any anywhere anywhere ctstate NEW\r\n17067 1005K TCP tcp -- any any anywhere anywhere tcp flags:FIN,SYN,RST,ACK\/SYN ctstate NEW\r\n2410 154K ICMP icmp -- any any anywhere anywhere ctstate NEW\r\n396 63275 REJECT udp -- any any anywhere anywhere reject-with icmp-port-unreachable\r\n2916 179K REJECT all -- any any anywhere anywhere reject-with icmp-proto-unreachable\r\n0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:ssh ctstate NEW,ESTABLISHED<\/code><\/pre>\n<\/div>\n<p>Listenin art\u0131k iki ek s\u00fctuna sahip oldu\u011funu fark edin, <code>paketler<\/code> Ve <code>bayt<\/code> \u00d6yledir.<\/p>\n<p>Art\u0131k etkin g\u00fcvenlik duvar\u0131 kurallar\u0131n\u0131 farkl\u0131 \u015fekillerde nas\u0131l listeleyece\u011finizi \u00f6\u011frendi\u011finize g\u00f6re, paket ve bayt saya\u00e7lar\u0131n\u0131 nas\u0131l s\u0131f\u0131rlayabilece\u011finizi g\u00f6relim.<\/p>\n<h2 id=\"%d8%aa%d9%86%d8%b8%db%8c%d9%85-%d9%85%d8%ac%d8%af%d8%af-%d8%aa%d8%b9%d8%af%d8%a7%d8%af-%d8%a8%d8%b3%d8%aa%d9%87-%d9%87%d8%a7-%d9%88-%d8%a7%d9%86%d8%af%d8%a7%d8%b2%d9%87-%da%a9%d9%84\">Paket say\u0131s\u0131n\u0131 ve toplam boyutu s\u0131f\u0131rla<\/h2>\n<p>Kurallar\u0131n\u0131z i\u00e7in paket ve bayt saya\u00e7lar\u0131n\u0131 temizlemek veya s\u0131f\u0131rlamak istiyorsan\u0131z -Z se\u00e7ene\u011fini kullan\u0131n. Ayr\u0131ca, yeniden ba\u015flatma s\u0131ras\u0131nda da s\u0131f\u0131rlan\u0131rlar. Bu, sunucunuzun mevcut kurallar\u0131n\u0131zla e\u015fle\u015fen yeni trafik al\u0131p almad\u0131\u011f\u0131n\u0131 g\u00f6rmek istiyorsan\u0131z kullan\u0131\u015fl\u0131d\u0131r.<\/p>\n<p>T\u00fcm zincirler ve kurallar i\u00e7in saya\u00e7lar\u0131 temizlemek i\u00e7in \u015fu se\u00e7ene\u011fi kullan\u0131n: <code>-Z<\/code> Tek ba\u015f\u0131na kullan\u0131m:<\/p>\n<div class=\"hcb_wrap\" data-no-translation=\"\" data-no-auto-translation=\"\">\n<pre class=\"prism line-numbers lang-bash\" data-lang=\"Bash\"><code>sudo iptables -Z<\/code><\/pre>\n<\/div>\n<p>Belirli bir zincirdeki t\u00fcm kurallar\u0131n saya\u00e7lar\u0131n\u0131 temizlemek i\u00e7in \u015fu se\u00e7ene\u011fi kullan\u0131n: <code>-Z<\/code> Zinciri kullan\u0131n ve belirtin. \u00d6rne\u011fin, zincir saya\u00e7lar\u0131n\u0131 temizlemek i\u00e7in <code>G\u0130R\u0130\u015e<\/code> \u015eu komutu \u00e7al\u0131\u015ft\u0131r\u0131n:<\/p>\n<div class=\"hcb_wrap\" data-no-translation=\"\" data-no-auto-translation=\"\">\n<pre class=\"prism line-numbers lang-bash\" data-lang=\"Bash\"><code>sudo iptables -Z INPUT<\/code><\/pre>\n<\/div>\n<p>Belirli bir kural\u0131n saya\u00e7lar\u0131n\u0131 temizlemek istiyorsan\u0131z, zincir ad\u0131n\u0131 ve kural numaras\u0131n\u0131 belirtin. \u00d6rne\u011fin, zincirdeki ilk kural\u0131n saya\u00e7lar\u0131n\u0131 temizlemek i\u00e7in: <code>G\u0130R\u0130\u015e<\/code>, \u015funu \u00e7al\u0131\u015ft\u0131r\u0131n:<\/p>\n<div class=\"hcb_wrap\" data-no-translation=\"\" data-no-auto-translation=\"\">\n<pre class=\"prism line-numbers lang-bash\" data-lang=\"Bash\"><code>sudo iptables -Z INPUT 1<\/code><\/pre>\n<\/div>\n<p>Art\u0131k iptables paket ve bayt saya\u00e7lar\u0131n\u0131n nas\u0131l s\u0131f\u0131rlanaca\u011f\u0131n\u0131 \u00f6\u011frendi\u011fimize g\u00f6re, bunlar\u0131 kald\u0131rmak i\u00e7in kullan\u0131labilecek iki y\u00f6nteme bakal\u0131m.<\/p>\n<h2 id=\"%d8%ad%d8%b0%d9%81-%d9%82%d9%88%d8%a7%d9%86%db%8c%d9%86-%d8%a8%d8%b1-%d8%a7%d8%b3%d8%a7%d8%b3-%d9%85%d8%b4%d8%ae%d8%b5%d8%a7%d8%aa\">Belirtimlere dayal\u0131 kurallar\u0131 silin<\/h2>\n<p>Iptables kurallar\u0131n\u0131 kald\u0131rman\u0131n bir yolu, kurallar\u0131 belirtmektir. Bunu yapmak i\u00e7in, iptables komutunu -D se\u00e7ene\u011fiyle ve ard\u0131ndan kural belirtimi ile \u00e7al\u0131\u015ft\u0131rabilirsiniz. Kurallar\u0131 bu y\u00f6ntemi kullanarak kald\u0131rmak isterseniz, yard\u0131m i\u00e7in kural listesinin \u00e7\u0131kt\u0131s\u0131 olan iptables -S komutunu kullanabilirsiniz.<\/p>\n<p>\u00d6rne\u011fin, ge\u00e7ersiz giri\u015f paketlerini d\u00fc\u015f\u00fcren bir kural\u0131 kald\u0131rmak istiyorsan\u0131z (-A INPUT -m conntrack \u2013ctstate INVALID -j DROP), \u015fu komutu \u00e7al\u0131\u015ft\u0131rabilirsiniz:<\/p>\n<div class=\"hcb_wrap\" data-no-translation=\"\" data-no-auto-translation=\"\">\n<pre class=\"prism line-numbers lang-bash\" data-lang=\"Bash\"><code>sudo iptables -D INPUT -m conntrack --ctstate INVALID -j DROP<\/code><\/pre>\n<\/div>\n<p>Kural\u0131n olu\u015fturuldu\u011fu andaki konumunu belirtmek i\u00e7in kullan\u0131lan -A se\u00e7ene\u011finin burada atlanmas\u0131 gerekti\u011fini unutmay\u0131n.<\/p>\n<h2 id=\"%d8%ad%d8%b0%d9%81-%d9%82%d9%88%d8%a7%d9%86%db%8c%d9%86-%d8%a8%d8%b1-%d8%a7%d8%b3%d8%a7%d8%b3-%d8%b2%d9%86%d8%ac%db%8c%d8%b1%d9%87-%d9%88-%d8%b4%d9%85%d8%a7%d8%b1%d9%87\">Zincir ve say\u0131ya g\u00f6re kurallar\u0131 sil<\/h2>\n<p>iptables kurallar\u0131n\u0131 kald\u0131rman\u0131n bir di\u011fer yolu da zincir ve sat\u0131r numaras\u0131 kullanmakt\u0131r. Bir kural\u0131n sat\u0131r numaras\u0131n\u0131 belirtmek i\u00e7in, kurallar\u0131 tablo bi\u00e7iminde listeleyin ve --line-numbers se\u00e7ene\u011fini ekleyin:<\/p>\n<div class=\"hcb_wrap\" data-no-translation=\"\" data-no-auto-translation=\"\">\n<pre class=\"prism line-numbers lang-bash\" data-lang=\"Bash\"><code>sudo iptables -L --line-numbers<\/code><\/pre>\n<\/div>\n<div class=\"hcb_wrap\" data-no-translation=\"\" data-no-auto-translation=\"\">\n<pre class=\"prism line-numbers lang-bash\" data-lang=\"Bash\"><code>Output\r\nChain INPUT (policy DROP)\r\nnum target prot opt source destination\r\n1 ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED\r\n2 ACCEPT all -- anywhere anywhere\r\n3 DROP all -- anywhere anywhere ctstate INVALID\r\n4 UDP udp -- anywhere anywhere ctstate NEW\r\n5 TCP tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK\/SYN ctstate NEW\r\n6 ICMP icmp -- anywhere anywhere ctstate NEW\r\n7 REJECT udp -- anywhere anywhere reject-with icmp-port-unreachable\r\n8 REJECT tcp -- anywhere anywhere reject-with tcp-reset\r\n9 REJECT all -- anywhere anywhere reject-with icmp-proto-unreachable\r\n10 ACCEPT tcp -- anywhere anywhere tcp dpt:ssh ctstate NEW,ESTABLISHED<\/code><\/pre>\n<\/div>\n<p>Bu, ba\u015fl\u0131kla ili\u015fkili her kural sat\u0131r\u0131na bir sat\u0131r numaras\u0131 ekler. <code>say\u0131<\/code> G\u00f6sterildi.<\/p>\n<p>Hangi kural\u0131 kald\u0131rmak istedi\u011finize karar verdikten sonra, zincir numaras\u0131n\u0131 ve kural sat\u0131r\u0131n\u0131 not edin. Ard\u0131ndan iptables -D komutunu \u00e7al\u0131\u015ft\u0131r\u0131n ve ard\u0131ndan zincir numaras\u0131n\u0131 ve kural\u0131 girin.<\/p>\n<p>\u00d6rne\u011fin, ge\u00e7ersiz paketleri d\u00fc\u015f\u00fcren gelen kural\u0131n\u0131 kald\u0131rmak istedi\u011fimizde, kural 3&#039;\u00fcn INPUT zincirinde oldu\u011funu g\u00f6r\u00fcr\u00fcz. Bu nedenle \u015fu komutu \u00e7al\u0131\u015ft\u0131rmam\u0131z gerekir:<\/p>\n<div class=\"hcb_wrap\" data-no-translation=\"\" data-no-auto-translation=\"\">\n<pre class=\"prism line-numbers lang-bash\" data-lang=\"Bash\">sudo iptables -D INPUT 3<\/pre>\n<\/div>\n<p>Art\u0131k g\u00fcvenlik duvar\u0131 kurallar\u0131n\u0131n nas\u0131l silinece\u011fini \u00f6\u011frendi\u011finize g\u00f6re, kural zincirlerinin nas\u0131l temizlenece\u011fine bakal\u0131m.<\/p>\n<h2 id=\"%d9%81%d9%84%d8%a7%d8%b4-%da%a9%d8%b1%d8%af%d9%86-%d8%b2%d9%86%d8%ac%db%8c%d8%b1%d9%87-%d9%87%d8%a7\">Zincirleri parlatmak<\/h2>\n<p>Iptables, bir zincirdeki t\u00fcm kurallar\u0131 kald\u0131rman\u0131n veya bir zinciri temizlemenin bir yolunu sunar. Bu b\u00f6l\u00fcmde bunu yapman\u0131n \u00e7e\u015fitli yollar\u0131n\u0131 ele alaca\u011f\u0131z.<\/p>\n<h5 id=\"%d9%81%d9%84%d8%a7%d8%b4%db%8c%d9%86%da%af-%db%8c%da%a9-%d8%b2%d9%86%d8%ac%db%8c%d8%b1%d9%87\">Bir zinciri y\u0131kamak<\/h5>\n<p>Zincirdeki t\u00fcm kurallar\u0131 kald\u0131ran belirli bir zinciri temizlemek i\u00e7in -F veya e\u015fde\u011feri olan -flush se\u00e7ene\u011fini ve temizlenecek zincir ad\u0131n\u0131 kullanabilirsiniz.<\/p>\n<p>\u00d6rne\u011fin, zincirdeki t\u00fcm kurallar\u0131 silmek i\u00e7in <code>G\u0130R\u0130\u015e<\/code>, \u015fu komutu \u00e7al\u0131\u015ft\u0131r\u0131n:<\/p>\n<div class=\"hcb_wrap\" data-no-translation=\"\" data-no-auto-translation=\"\">\n<pre class=\"prism line-numbers lang-bash\" data-lang=\"Bash\"><code>sudo iptables -F INPUT<\/code><\/pre>\n<\/div>\n<p>T\u00fcm zincirleri yan\u0131p s\u00f6n\u00fcyor<\/p>\n<p>T\u00fcm zincirleri temizlemek ve t\u00fcm g\u00fcvenlik duvar\u0131 kurallar\u0131n\u0131 kald\u0131rmak i\u00e7in -F se\u00e7ene\u011fini veya e\u015fde\u011feri olan -flush se\u00e7ene\u011fini tek ba\u015f\u0131na kullanabilirsiniz:<\/p>\n<div class=\"hcb_wrap\" data-no-translation=\"\" data-no-auto-translation=\"\">\n<pre class=\"prism line-numbers lang-bash\" data-lang=\"Bash\"><code>sudo iptables -F<\/code><\/pre>\n<\/div>\n<h2 id=\"%d9%81%d9%84%d8%a7%d8%b4-%d9%87%d9%85%d9%87-%d9%82%d9%88%d8%a7%d9%86%db%8c%d9%86%d8%8c-%d8%ad%d8%b0%d9%81-%d9%87%d9%85%d9%87-%d8%b2%d9%86%d8%ac%db%8c%d8%b1%d9%87%d9%87%d8%a7-%d9%88-%d9%be\">T\u00fcm kurallar\u0131 temizleyin, t\u00fcm zincirleri kald\u0131r\u0131n ve t\u00fcm kurallar\u0131 kabul edin.<\/h2>\n<p>Bu b\u00f6l\u00fcm, t\u00fcm g\u00fcvenlik duvar\u0131 kurallar\u0131n\u0131z\u0131, tablolar\u0131n\u0131z\u0131 ve zincirlerinizi nas\u0131l temizleyece\u011finizi ve t\u00fcm a\u011f trafi\u011fine nas\u0131l izin verece\u011finizi g\u00f6sterir.<\/p>\n<p>\u00d6ncelikle, dahili zincirlerin her biri i\u00e7in varsay\u0131lan politikalar\u0131 ACCEPT olarak ayarlay\u0131n. Bunu yapman\u0131z\u0131n temel nedeni, SSH \u00fczerinden sunucunuzun kilitlenmemesini sa\u011flamakt\u0131r:<\/p>\n<div class=\"hcb_wrap\" data-no-translation=\"\" data-no-auto-translation=\"\">\n<pre class=\"prism line-numbers lang-bash\" data-lang=\"Bash\"><code>sudo iptables -P INPUT ACCEPT\r\nsudo iptables -P FORWARD ACCEPT\r\nsudo iptables -P OUTPUT ACCEPT<\/code><\/pre>\n<\/div>\n<p>Daha sonra nat ve mangle tablolar\u0131n\u0131 temizleyin, t\u00fcm zincirleri temizleyin (-F) ve varsay\u0131lan olmayan t\u00fcm zincirleri kald\u0131r\u0131n (-X):<\/p>\n<div class=\"hcb_wrap\" data-no-translation=\"\" data-no-auto-translation=\"\">\n<pre class=\"prism line-numbers lang-bash\" data-lang=\"Bash\"><code>sudo iptables -t nat -F\r\nsudo iptables -t mangle -F\r\nsudo iptables -F\r\nsudo iptables -X<\/code><\/pre>\n<\/div>\n<p>G\u00fcvenlik duvar\u0131n\u0131z art\u0131k t\u00fcm a\u011f trafi\u011fine izin verecektir. Kurallar\u0131n\u0131z\u0131 listeledi\u011finizde, hi\u00e7bir kural olmad\u0131\u011f\u0131n\u0131 ve yaln\u0131zca \u00fc\u00e7 varsay\u0131lan zincirin (G\u0130R\u0130\u015e, \u0130LET\u0130M ve \u00c7IKI\u015e) kald\u0131\u011f\u0131n\u0131 g\u00f6receksiniz.<\/p>\n<h2 id=\"%d9%86%d8%aa%db%8c%d8%ac%d9%87\">Sonu\u00e7<\/h2>\n<p>Bu e\u011fitimi tamamlad\u0131ktan sonra, iptables g\u00fcvenlik duvar\u0131 kurallar\u0131n\u0131z\u0131 nas\u0131l listeleyip silece\u011finizi g\u00f6rm\u00fc\u015f olacaks\u0131n\u0131z. iptables komutuyla yap\u0131lan t\u00fcm iptables de\u011fi\u015fikliklerinin ge\u00e7ici oldu\u011funu ve sunucu yeniden ba\u015flatmalar\u0131nda kal\u0131c\u0131 olmas\u0131 i\u00e7in kaydedilmesi gerekti\u011fini unutmay\u0131n. Bu konu, Ortak G\u00fcvenlik Duvar\u0131 Kurallar\u0131 ve Komutlar\u0131 e\u011fitiminin Kurallar\u0131 Kaydetme b\u00f6l\u00fcm\u00fcnde ele al\u0131nm\u0131\u015ft\u0131r.<\/p>","protected":false},"excerpt":{"rendered":"Giri\u015f Iptables, \u00e7o\u011fu Linux sisteminde a\u011f g\u00fcvenli\u011finde temel rol oynayan bir g\u00fcvenlik duvar\u0131d\u0131r.","protected":false},"author":1,"featured_media":14685,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"\u0641\u0647\u0631\u0633\u062a \u06a9\u0631\u062f\u0646 \u0648 \u062d\u0630\u0641 \u0642\u0648\u0627\u0646\u06cc\u0646 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 Iptables","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_yoast_wpseo_canonical":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_opengraph-image":"","_yoast_wpseo_twitter-description":"","_yoast_wpseo_twitter-image":"","_yoast_wpseo_focuskeywords":"","_yoast_wpseo_primary_category":"193","footnotes":""},"categories":[193,323],"tags":[385],"class_list":{"0":"post-14684","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tutorials","8":"category-firewall","9":"tag-385"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u0646\u062d\u0648\u0647 \u0641\u0647\u0631\u0633\u062a \u06a9\u0631\u062f\u0646 \u0648 \u062d\u0630\u0641 \u0642\u0648\u0627\u0646\u06cc\u0646 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 Iptables - \u0628\u0644\u0627\u06af ITPiran<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itpiran.net\/blog\/tr\/tutorials\/how-to-list-and-delete-iptables-firewall-rules\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u0646\u062d\u0648\u0647 \u0641\u0647\u0631\u0633\u062a \u06a9\u0631\u062f\u0646 \u0648 \u062d\u0630\u0641 \u0642\u0648\u0627\u0646\u06cc\u0646 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 Iptables - \u0628\u0644\u0627\u06af ITPiran\" \/>\n<meta property=\"og:description\" content=\"\u0645\u0642\u062f\u0645\u0647 Iptables \u06cc\u06a9 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0627\u0633\u062a \u06a9\u0647 \u0646\u0642\u0634 \u0627\u0633\u0627\u0633\u06cc \u062f\u0631 \u0627\u0645\u0646\u06cc\u062a \u0634\u0628\u06a9\u0647 \u0628\u0631\u0627\u06cc \u0627\u06a9\u062b\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0647\u0627\u06cc \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0627\u06cc\u0641\u0627 \u0645\u06cc&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itpiran.net\/blog\/tr\/tutorials\/how-to-list-and-delete-iptables-firewall-rules\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0628\u0644\u0627\u06af ITPiran\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-04T10:40:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.itpiran.net\/2024\/02\/04140218\/IptablesBG.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1793\" \/>\n\t<meta property=\"og:image:height\" content=\"1110\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/how-to-list-and-delete-iptables-firewall-rules\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/how-to-list-and-delete-iptables-firewall-rules\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/#\\\/schema\\\/person\\\/04ed27b919baca468a2273f8e4318f81\"},\"headline\":\"\u0646\u062d\u0648\u0647 \u0641\u0647\u0631\u0633\u062a \u06a9\u0631\u062f\u0646 \u0648 \u062d\u0630\u0641 \u0642\u0648\u0627\u0646\u06cc\u0646 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 Iptables\",\"datePublished\":\"2024-02-04T10:40:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/how-to-list-and-delete-iptables-firewall-rules\\\/\"},\"wordCount\":93,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/how-to-list-and-delete-iptables-firewall-rules\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn.itpiran.net\\\/2024\\\/02\\\/04140218\\\/IptablesBG.jpg\",\"keywords\":[\"\u0641\u0627\u06cc\u0631\u0648\u0627\u0644\"],\"articleSection\":[\"\u0622\u0645\u0648\u0632\u0634\u06cc\",\"\u0641\u0627\u06cc\u0631\u0648\u0627\u0644\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/how-to-list-and-delete-iptables-firewall-rules\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/how-to-list-and-delete-iptables-firewall-rules\\\/\",\"url\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/how-to-list-and-delete-iptables-firewall-rules\\\/\",\"name\":\"\u0646\u062d\u0648\u0647 \u0641\u0647\u0631\u0633\u062a \u06a9\u0631\u062f\u0646 \u0648 \u062d\u0630\u0641 \u0642\u0648\u0627\u0646\u06cc\u0646 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 Iptables - \u0628\u0644\u0627\u06af ITPiran\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/how-to-list-and-delete-iptables-firewall-rules\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/how-to-list-and-delete-iptables-firewall-rules\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn.itpiran.net\\\/2024\\\/02\\\/04140218\\\/IptablesBG.jpg\",\"datePublished\":\"2024-02-04T10:40:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/how-to-list-and-delete-iptables-firewall-rules\\\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/how-to-list-and-delete-iptables-firewall-rules\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/how-to-list-and-delete-iptables-firewall-rules\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cdn.itpiran.net\\\/2024\\\/02\\\/04140218\\\/IptablesBG.jpg\",\"contentUrl\":\"https:\\\/\\\/cdn.itpiran.net\\\/2024\\\/02\\\/04140218\\\/IptablesBG.jpg\",\"width\":1793,\"height\":1110},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tutorials\\\/how-to-list-and-delete-iptables-firewall-rules\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u0622\u0645\u0648\u0632\u0634\u06cc\",\"item\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/category\\\/tutorials\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u0646\u062d\u0648\u0647 \u0641\u0647\u0631\u0633\u062a \u06a9\u0631\u062f\u0646 \u0648 \u062d\u0630\u0641 \u0642\u0648\u0627\u0646\u06cc\u0646 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 Iptables\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/\",\"name\":\"\u0628\u0644\u0627\u06af ITPiran\",\"description\":\"\u0627\u062e\u0628\u0627\u0631 \u0648 \u0645\u0642\u0627\u0644\u0627\u062a \u062a\u062c\u0627\u0631\u062a \u067e\u0627\u06cc\u062f\u0627\u0631 \u0627\u06cc\u0631\u0627\u0646\u06cc\u0627\u0646\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/#organization\",\"name\":\"\u0628\u0644\u0627\u06af \u062a\u062c\u0627\u0631\u062a \u067e\u0627\u06cc\u062f\u0627\u0631 \u0627\u06cc\u0631\u0627\u0646\u06cc\u0627\u0646\",\"alternateName\":\"ITPIran Blog\",\"url\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cdn.itpiran.net\\\/2023\\\/12\\\/27150508\\\/cropped-ITPIRAN-BLOG-LOGO-2.png\",\"contentUrl\":\"https:\\\/\\\/cdn.itpiran.net\\\/2023\\\/12\\\/27150508\\\/cropped-ITPIRAN-BLOG-LOGO-2.png\",\"width\":512,\"height\":512,\"caption\":\"\u0628\u0644\u0627\u06af \u062a\u062c\u0627\u0631\u062a \u067e\u0627\u06cc\u062f\u0627\u0631 \u0627\u06cc\u0631\u0627\u0646\u06cc\u0627\u0646\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/#\\\/schema\\\/person\\\/04ed27b919baca468a2273f8e4318f81\",\"name\":\"admin\",\"url\":\"https:\\\/\\\/www.itpiran.net\\\/blog\\\/tr\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Iptables G\u00fcvenlik Duvar\u0131 Kurallar\u0131 Nas\u0131l Listelenir ve Silinir - ITPiran Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itpiran.net\/blog\/tr\/tutorials\/how-to-list-and-delete-iptables-firewall-rules\/","og_locale":"tr_TR","og_type":"article","og_title":"\u0646\u062d\u0648\u0647 \u0641\u0647\u0631\u0633\u062a \u06a9\u0631\u062f\u0646 \u0648 \u062d\u0630\u0641 \u0642\u0648\u0627\u0646\u06cc\u0646 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 Iptables - \u0628\u0644\u0627\u06af ITPiran","og_description":"\u0645\u0642\u062f\u0645\u0647 Iptables \u06cc\u06a9 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0627\u0633\u062a \u06a9\u0647 \u0646\u0642\u0634 \u0627\u0633\u0627\u0633\u06cc \u062f\u0631 \u0627\u0645\u0646\u06cc\u062a \u0634\u0628\u06a9\u0647 \u0628\u0631\u0627\u06cc \u0627\u06a9\u062b\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0647\u0627\u06cc \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0627\u06cc\u0641\u0627 \u0645\u06cc&hellip;","og_url":"https:\/\/www.itpiran.net\/blog\/tr\/tutorials\/how-to-list-and-delete-iptables-firewall-rules\/","og_site_name":"\u0628\u0644\u0627\u06af ITPiran","article_published_time":"2024-02-04T10:40:03+00:00","og_image":[{"width":1793,"height":1110,"url":"https:\/\/cdn.itpiran.net\/2024\/02\/04140218\/IptablesBG.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"admin","Tahmini okuma s\u00fcresi":"3 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.itpiran.net\/blog\/tutorials\/how-to-list-and-delete-iptables-firewall-rules\/#article","isPartOf":{"@id":"https:\/\/www.itpiran.net\/blog\/tutorials\/how-to-list-and-delete-iptables-firewall-rules\/"},"author":{"name":"admin","@id":"https:\/\/www.itpiran.net\/blog\/#\/schema\/person\/04ed27b919baca468a2273f8e4318f81"},"headline":"\u0646\u062d\u0648\u0647 \u0641\u0647\u0631\u0633\u062a \u06a9\u0631\u062f\u0646 \u0648 \u062d\u0630\u0641 \u0642\u0648\u0627\u0646\u06cc\u0646 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 Iptables","datePublished":"2024-02-04T10:40:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.itpiran.net\/blog\/tutorials\/how-to-list-and-delete-iptables-firewall-rules\/"},"wordCount":93,"commentCount":0,"publisher":{"@id":"https:\/\/www.itpiran.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.itpiran.net\/blog\/tutorials\/how-to-list-and-delete-iptables-firewall-rules\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.itpiran.net\/2024\/02\/04140218\/IptablesBG.jpg","keywords":["\u0641\u0627\u06cc\u0631\u0648\u0627\u0644"],"articleSection":["\u0622\u0645\u0648\u0632\u0634\u06cc","\u0641\u0627\u06cc\u0631\u0648\u0627\u0644"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.itpiran.net\/blog\/tutorials\/how-to-list-and-delete-iptables-firewall-rules\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.itpiran.net\/blog\/tutorials\/how-to-list-and-delete-iptables-firewall-rules\/","url":"https:\/\/www.itpiran.net\/blog\/tutorials\/how-to-list-and-delete-iptables-firewall-rules\/","name":"Iptables G\u00fcvenlik Duvar\u0131 Kurallar\u0131 Nas\u0131l Listelenir ve Silinir - ITPiran Blog","isPartOf":{"@id":"https:\/\/www.itpiran.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itpiran.net\/blog\/tutorials\/how-to-list-and-delete-iptables-firewall-rules\/#primaryimage"},"image":{"@id":"https:\/\/www.itpiran.net\/blog\/tutorials\/how-to-list-and-delete-iptables-firewall-rules\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.itpiran.net\/2024\/02\/04140218\/IptablesBG.jpg","datePublished":"2024-02-04T10:40:03+00:00","breadcrumb":{"@id":"https:\/\/www.itpiran.net\/blog\/tutorials\/how-to-list-and-delete-iptables-firewall-rules\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itpiran.net\/blog\/tutorials\/how-to-list-and-delete-iptables-firewall-rules\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/www.itpiran.net\/blog\/tutorials\/how-to-list-and-delete-iptables-firewall-rules\/#primaryimage","url":"https:\/\/cdn.itpiran.net\/2024\/02\/04140218\/IptablesBG.jpg","contentUrl":"https:\/\/cdn.itpiran.net\/2024\/02\/04140218\/IptablesBG.jpg","width":1793,"height":1110},{"@type":"BreadcrumbList","@id":"https:\/\/www.itpiran.net\/blog\/tutorials\/how-to-list-and-delete-iptables-firewall-rules\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.itpiran.net\/blog\/"},{"@type":"ListItem","position":2,"name":"\u0622\u0645\u0648\u0632\u0634\u06cc","item":"https:\/\/www.itpiran.net\/blog\/category\/tutorials\/"},{"@type":"ListItem","position":3,"name":"\u0646\u062d\u0648\u0647 \u0641\u0647\u0631\u0633\u062a \u06a9\u0631\u062f\u0646 \u0648 \u062d\u0630\u0641 \u0642\u0648\u0627\u0646\u06cc\u0646 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 Iptables"}]},{"@type":"WebSite","@id":"https:\/\/www.itpiran.net\/blog\/#website","url":"https:\/\/www.itpiran.net\/blog\/","name":"ITPiran Blog","description":"\u0130ran S\u00fcrd\u00fcr\u00fclebilir Ticaret Haberleri ve Makaleleri","publisher":{"@id":"https:\/\/www.itpiran.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itpiran.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/www.itpiran.net\/blog\/#organization","name":"S\u00fcrd\u00fcr\u00fclebilir \u0130ran \u0130\u015fletmeleri Blogu","alternateName":"ITPIran Blog","url":"https:\/\/www.itpiran.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/www.itpiran.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cdn.itpiran.net\/2023\/12\/27150508\/cropped-ITPIRAN-BLOG-LOGO-2.png","contentUrl":"https:\/\/cdn.itpiran.net\/2023\/12\/27150508\/cropped-ITPIRAN-BLOG-LOGO-2.png","width":512,"height":512,"caption":"\u0628\u0644\u0627\u06af \u062a\u062c\u0627\u0631\u062a \u067e\u0627\u06cc\u062f\u0627\u0631 \u0627\u06cc\u0631\u0627\u0646\u06cc\u0627\u0646"},"image":{"@id":"https:\/\/www.itpiran.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.itpiran.net\/blog\/#\/schema\/person\/04ed27b919baca468a2273f8e4318f81","name":"y\u00f6netici","url":"https:\/\/www.itpiran.net\/blog\/tr\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/posts\/14684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/comments?post=14684"}],"version-history":[{"count":1,"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/posts\/14684\/revisions"}],"predecessor-version":[{"id":14687,"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/posts\/14684\/revisions\/14687"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/media\/14685"}],"wp:attachment":[{"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/media?parent=14684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/categories?post=14684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itpiran.net\/blog\/tr\/wp-json\/wp\/v2\/tags?post=14684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}