• 07/14/2017
  • Public Content
Contents

Firewall via iptables

The platform supports iptables firewall. This service is automatically started at boot time and loads a set of default rules from /usr/share/iptables-settings/iptables.rules
The rules can be changed and saved to the configuration file via the commands shown below:
Common Commands
To clear all existing rules:
iptables -F
To drop all incoming traffic:
iptables -P INPUT DROP.
To allow incoming SSH connection:
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
To save the current set of rules:
iptables-save > /usr/share/iptables-settings/iptables.rules.
 
Note:
Saved rules will autoload during next boot
 
To stop using iptables:
systemctl disable iptables
 
 

Product and Performance Information

1

Intel's compilers may or may not optimize to the same degree for non-Intel microprocessors for optimizations that are not unique to Intel microprocessors. These optimizations include SSE2, SSE3, and SSSE3 instruction sets and other optimizations. Intel does not guarantee the availability, functionality, or effectiveness of any optimization on microprocessors not manufactured by Intel. Microprocessor-dependent optimizations in this product are intended for use with Intel microprocessors. Certain optimizations not specific to Intel microarchitecture are reserved for Intel microprocessors. Please refer to the applicable product User and Reference Guides for more information regarding the specific instruction sets covered by this notice.

Notice revision #20110804