*filter # INPUT 和 FORWARD 链上默认 DROP 掉 :INPUT DROP [0:0] :FORWARD DROP [0:0] :OUTPUT ACCEPT [0:0]
# 防止外网使用内网 IP 欺骗 -A INPUT -i eth0 -s 192.168.0.0/16 -j DROP
# 允许本机、内网以及已建立的连接通过和转发 -A INPUT -i lo -j ACCEPT -A INPUT -i docker0 -j ACCEPT -A INPUT -i wlx1cbfceb110dc -j ACCEPT -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT -A FORWARD -i lo -j ACCEPT -A FORWARD -i docker0 -j ACCEPT -A FORWARD -i wlx1cbfceb110dc -j ACCEPT -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
*filter :INPUT DROP [0:0] :FORWARD DROP [0:0] :OUTPUT ACCEPT [0:0]
# Filter all packets that have RH0 headers. Refer to RFC 5095 -A INPUT -m rt --rt-type 0 -j DROP -A FORWARD -m rt --rt-type 0 -j DROP -A OUTPUT -m rt --rt-type 0 -j DROP
# Allow trusted link to INPUT and FORWARD -A INPUT -i lo -j ACCEPT -A INPUT -i docker0 -j ACCEPT -A INPUT -i wlx1cbfceb110dc -j ACCEPT -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT -A FORWARD -i lo -j ACCEPT -A FORWARD -i docker0 -j ACCEPT -A FORWARD -i wlx1cbfceb110dc -j ACCEPT -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT