Linux iad1-shared-b7-18 6.6.49-grsec-jammy+ #10 SMP Thu Sep 12 23:23:08 UTC 2024 x86_64
Apache
: 67.205.6.31 | : 216.73.216.47
Cant Read [ /etc/named.conf ]
8.2.29
fernandoquevedo
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
nftables /
examples /
[ HOME SHELL ]
Name
Size
Permission
Action
sysvinit
[ DIR ]
drwxr-xr-x
README
475
B
-rw-r--r--
all-in-one.nft
1016
B
-rw-r--r--
arp-filter.nft
129
B
-rw-r--r--
bridge-filter.nft
197
B
-rw-r--r--
ct_helpers.nft
1.23
KB
-rwxr-xr-x
inet-filter.nft
187
B
-rw-r--r--
inet-nat.nft
251
B
-rw-r--r--
ipv4-filter.nft
182
B
-rw-r--r--
ipv4-mangle.nft
74
B
-rw-r--r--
ipv4-nat.nft
246
B
-rw-r--r--
ipv4-raw.nft
137
B
-rw-r--r--
ipv6-filter.nft
186
B
-rw-r--r--
ipv6-mangle.nft
78
B
-rw-r--r--
ipv6-nat.nft
253
B
-rw-r--r--
ipv6-raw.nft
141
B
-rw-r--r--
load_balancing.nft
1.81
KB
-rwxr-xr-x
nat.nft
1.14
KB
-rwxr-xr-x
netdev-ingress.nft
128
B
-rw-r--r--
overview.nft
1.05
KB
-rwxr-xr-x
pf.os
28.21
KB
-rw-r--r--
secmark.nft
2.35
KB
-rwxr-xr-x
sets_and_maps.nft
1.25
KB
-rwxr-xr-x
workstation.nft
817
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : nat.nft
#!/usr/sbin/nft -f table ip nat { chain prerouting { type nat hook prerouting priority 0; #Thanks to nftables maps, if you have a previous iptables NAT (destination NAT) ruleset like this: # % iptables -t nat -A PREROUTING -p tcp --dport 1000 -j DNAT --to-destination 1.1.1.1:1234 # % iptables -t nat -A PREROUTING -p udp --dport 2000 -j DNAT --to-destination 2.2.2.2:2345 # % iptables -t nat -A PREROUTING -p tcp --dport 3000 -j DNAT --to-destination 3.3.3.3:3456 # It can be easily translated to nftables in a single line: dnat tcp dport map { 1000 : 1.1.1.1, 2000 : 2.2.2.2, 3000 : 3.3.3.3} \ : tcp dport map { 1000 : 1234, 2000 : 2345, 3000 : 3456 } } chain postrouting { type nat hook postrouting priority 0; #Likewise, in iptables NAT (source NAT): # % iptables -t nat -A POSTROUTING -s 192.168.1.1 -j SNAT --to-source 1.1.1.1 # % iptables -t nat -A POSTROUTING -s 192.168.2.2 -j SNAT --to-source 2.2.2.2 # % iptables -t nat -A POSTROUTING -s 192.168.3.3 -j SNAT --to-source 3.3.3.3 # Translated to a nftables one-liner: snat ip saddr map { 192.168.1.1 : 1.1.1.1, 192.168.2.2 : 2.2.2.2, 192.168.3.3 : 3.3.3.3 } } }
Close