
RETURN: means to skip the current chain and go back to the next rule from the chain it was called in.DROP: means that packet will not be allowed to pass through.ACCEPT: means the packet will be allowed to pass through.FORWARD: default chain packets are send through another interface.Ī target can be another chain to match with or one of the following special values:.OUTPUT: default chain generating from system.INPUT: default chain originating to system.When the packet is matched, it is given a target. Each rule defines what to do with the packet if it matches with that packet.

In the output, Chain is nothing but a set of rules.

There are currently no rules for any of the chains. Pkts bytes target prot opt in out source destinationĬhain FORWARD (policy ACCEPT 0 packets, 0 bytes)Ĭhain OUTPUT (policy ACCEPT 35 packets, 4100 bytes)Īs we can see, all three chains are set to default ACCEPT policy. $ sudo iptables -L -v -n Chain INPUT (policy ACCEPT 59 packets, 3940 bytes) Let's check the status of IPTables by listing (-L) the rules with additional verbose (-v) and numeric (-n) flags: By default it runs without any rules as we can see from the following output: IPTables is a rule based firewall and it is pre-installed on most of Linux operating system.
