J
Jim Rounsville
Are there firewall rules for Windows 10 or Windows Server that are equivalent to Linux iptables mangle rules?
Linux iptables mangle rules can combine source IP, destination IP, protocol, tcp/udp port number to set "mangling" rules for TOS, TTL, MARK, TCPMSS, etc. in a single command.
Here are examples of iptables mangle rules:
iptables -t mangle -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --set-mss 1452
iptables -t mangle -A POSTROUTING -d xxx.xxx.xxx.xxx -p tcp --sport 80 -j TTL --ttl-set 4-t = table name
-A = append
-p = protocol (--sport = source port, --tcp-flags xxx,xxx xxx)
-j = jump target (TTL = Time to Live of the packet)
-d = destination
Is there a way to set the same rules using netsh in powershell?
Continue reading...
Linux iptables mangle rules can combine source IP, destination IP, protocol, tcp/udp port number to set "mangling" rules for TOS, TTL, MARK, TCPMSS, etc. in a single command.
Here are examples of iptables mangle rules:
iptables -t mangle -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --set-mss 1452
iptables -t mangle -A POSTROUTING -d xxx.xxx.xxx.xxx -p tcp --sport 80 -j TTL --ttl-set 4-t = table name
-A = append
-p = protocol (--sport = source port, --tcp-flags xxx,xxx xxx)
-j = jump target (TTL = Time to Live of the packet)
-d = destination
Is there a way to set the same rules using netsh in powershell?
Continue reading...