First page Back Continue Last page Summary Graphics
iptables(8) (cont. again)
-P, --policy
Set the policy for the chain to the given target.
See the section TARGETS for the legal targets.
Only non-user-defined chains can have policies, and
neither built-in nor user-defined chains can be
policy targets.
-E, --rename-chain
Rename the user specified chain to the user sup-
plied name. This is cosmetic, and has no effect on
the structure of the table.
-h Help. Give a (currently very brief) description of
the command syntax.
Other useful switches:
-p / --protocol -f / --fragment --line-numbers --tcp-option --log-level
-s / --source -c / --set-counters --modprobe=command --icmp-type --log-prefix
-d / --destination -v / --verbose --source-port --mac-source --log-tcp-sequence
-j / --jump -n / --numeric --destination-port --limit --log-tcp-options
-i / --in-interface -x / --exact --tcp-flags --limit-burst --log-ip-options
-o / --out-interface --syn --reject-with
See iptables(8) for more...
Notes: