![English vocabulary in use](https://kumkoniak.com/100.jpg)
![elastix on centos 7 elastix on centos 7](https://pplware.sapo.pt/wp-content/uploads/2012/04/elastix_16.jpg)
![elastix on centos 7 elastix on centos 7](http://www.ctiforum.com/uploadfile/2017/0306/20170306101028305.jpg)
sbin/iptables -A INPUT -p udp –dport 4443 -j ACCEPT sbin/iptables -A INPUT -p tcp –dport 4443 -j ACCEPT
![elastix on centos 7 elastix on centos 7](https://www.voipsupply.com/blog/voip-insider/files/2017/12/Issabel-1-1024x329.jpg)
sbin/iptables -A INPUT -p udp –dport 443 -j ACCEPT sbin/iptables -A INPUT -p tcp –dport 14945 -j ACCEPT/sbin/iptables -A INPUT -p tcp –dport 443 -j ACCEPT sbin/iptables -A INPUT -p tcp –dport 10000:10100 -j ACCEPT sbin/iptables -A INPUT -p tcp –dport 13943:13948 -j ACCEPT sbin/iptables -A INPUT -p tcp –dport 443 -j ACCEPT sbin/iptables -A INPUT -s 49.0.0.0/8 -j ACCEPT # use input chain to control source ip address sbin/iptables -A FORWARD -p icmp -j ACCEPT sbin/iptables -A OUTPUT -p icmp -j ACCEPT sbin/iptables -A INPUT -p icmp -j ACCEPT sbin/iptables -A INPUT -p icmp –icmp-type 5 -j DROP # Allow ICMP packets except for redirect packets(tpye 5) sbin/iptables -A OUTPUT -m state –state NEW,ESTABLISHED,RELATED -j ACCEPT sbin/iptables -A INPUT -m state –state ESTABLISHED,RELATED -j ACCEPT sbin/iptables -t nat -A POSTROUTING -s 10.8.0.0/23 -j MASQUERADE sbin/iptables -A FORWARD -s 10.8.0.0/23 -j ACCEPT sbin/iptables -A FORWARD -m state –state RELATED,ESTABLISHED -j ACCEPT #Masquerading rules, it was used for my OpenVPN package, 10.8.0.0/23 is the “SSL-VPN Subnet” #Deny any funny “internal” and “multicast” packets sbin/iptables -A INPUT -i eth0 -s 127.0.0.1 -j DROP sbin/iptables -A INPUT -i eth0 -s 127.0.0.1 -j LOG #Deny any incoming packets that claiming to be yourself and funny loopback packets #Allow any traffic over the loopback interface
![English vocabulary in use](https://kumkoniak.com/100.jpg)