Iptables

  • May 11, 2023
  • 0 Comments

The iptables displays all page requests to your website recorded by the firewall. The iptables page can be used to automatically add specific rules to the ruleset. It is also the starting point to see the firewall recorded actions  and to view the ip details for each visitor.

  • Refresh bar: Click the bar to automatically refresh the bar each 3 minutes. Click again to stop refreshing.
  • Blue time: Current firewall server time. This may be different from your locale time.
  • Floating locket: The locket displays the overall average time spent to respond your web application. You may view load time details for each page request within ip details page.
  • Flash Outdated Hits: Please refer to related help section.
  • Flash All Hits: Please refer to related help section.
  • Search engine: The search engine can almost find any information but only within the current entries. The maximum entries is 400 records.
  • Table columns:

  1. Ip - The source ip of he visitor
  2. CC - The country code and flag
  3. Host -  Whether this is an ip behind a hostname. Depending of your configuration, it may display the hostname or just the icon of a server.
  4. Badip: If this is a bad ip, anonymous mask will be displayed.
  5. Bot: if this is a bot (malicious or not) a robot icon  will be displayed.
  6. End: The website targeted side. Home icon for front-office, a gear icon for back-office.
  7. Hits: Number of times the same ip requested access to the website targeted side.
  8. Flag: The special firewall designation given to this ip.
  9. First: First time the firewall received a request to check this ip.
  10. LastAccess: Last time the firewall received a request to check this ip.
  11. Access: The status of ip access. This can be allowed (gear icon with green check), denied  (gear icon with red exclamation), testmode allowed (faded gear icon with green check), testmode denied (faded gear icon with red exclamation), and reset (gear icon with blue exclamation).


Fig. iptables 
 1/ Refresh-bar. 2/ Source ip.  3/ Console 4/ Fire status

  • Console: The console has various commands and is remotely connected to your firewall system. It allows you to view ip details, copy the ip string to clipboard and to "temporary" allow, permanently trust, "temporary" deny or “kill” (permanently deny)  related visitor.

The iptables displays last 60 days records upto 100000 record. For more information, please see the "Data retention" help section. The iptables has the ability to filter the data on each of the columns, such as to display all visitors coming from the same country or all those who have been authorized access, or all those which are bots...etc. The iptables can also be useful for: 

- Traffic Shaping and Quality of Service (QoS): Iptables can be used to shape network traffic and prioritize certain types of traffic over others. This is beneficial for managing bandwidth allocation, ensuring fair usage of network resources, and prioritizing critical services or applications.

- Logging and Monitoring: Iptables provides logging capabilities, allowing you to capture information about network packets that match specific rules. This is helpful for monitoring network activity, troubleshooting connectivity issues, and detecting potential security incidents.

How helpful was this article to you?

Posting has been disabled.