• Home
  • Raw
  • Download

Lines Matching full:chain

29 \fIchain\fP \fIrule-specification\fP
32 \fIchain rule-specification\fP
34 \fBiptables\fP [\fB\-t\fP \fItable\fP] \fB\-I\fP \fIchain\fP [\fIrulenum\fP] \fIrule-specification\…
36 \fBiptables\fP [\fB\-t\fP \fItable\fP] \fB\-R\fP \fIchain rulenum rule-specification\fP
38 \fBiptables\fP [\fB\-t\fP \fItable\fP] \fB\-D\fP \fIchain rulenum\fP
40 \fBiptables\fP [\fB\-t\fP \fItable\fP] \fB\-S\fP [\fIchain\fP [\fIrulenum\fP]]
42 \fBiptables\fP [\fB\-t\fP \fItable\fP] {\fB\-F\fP|\fB\-L\fP|\fB\-Z\fP} [\fIchain\fP [\fIrulenum\fP]…
44 \fBiptables\fP [\fB\-t\fP \fItable\fP] \fB\-N\fP \fIchain\fP
46 \fBiptables\fP [\fB\-t\fP \fItable\fP] \fB\-X\fP [\fIchain\fP]
48 \fBiptables\fP [\fB\-t\fP \fItable\fP] \fB\-P\fP \fIchain target\fP
50 \fBiptables\fP [\fB\-t\fP \fItable\fP] \fB\-E\fP \fIold-chain-name new-chain-name\fP
64 Each chain is a list of rules which can match a set of packets. Each
66 a `target', which may be a jump to a user-defined chain in the same
70 packet does not match, the next rule in the chain is examined; if
72 target, which can be the name of a user-defined chain, one of the targets
78 \fBRETURN\fP means stop traversing this chain and resume at the next
80 previous (calling) chain. If the end of a built-in chain is reached
81 or a rule in a built-in chain with target \fBRETURN\fP
82 is matched, the target specified by the chain policy determines the
152 \fB\-A\fP, \fB\-\-append\fP \fIchain rule-specification\fP
153 Append one or more rules to the end of the selected chain.
157 \fB\-C\fP, \fB\-\-check\fP \fIchain rule-specification\fP
159 selected chain. This command uses the same logic as \fB\-D\fP to
163 \fB\-D\fP, \fB\-\-delete\fP \fIchain rule-specification\fP
166 \fB\-D\fP, \fB\-\-delete\fP \fIchain rulenum\fP
167 Delete one or more rules from the selected chain. There are two
169 chain (starting at 1 for the first rule) or a rule to match.
171 \fB\-I\fP, \fB\-\-insert\fP \fIchain\fP [\fIrulenum\fP] \fIrule-specification\fP
172 Insert one or more rules in the selected chain as the given rule
174 at the head of the chain. This is also the default if no rule number
177 \fB\-R\fP, \fB\-\-replace\fP \fIchain rulenum rule-specification\fP
178 Replace a rule in the selected chain. If the source and/or
182 \fB\-L\fP, \fB\-\-list\fP [\fIchain\fP]
183 List all rules in the selected chain. If no chain is selected, all
192 (zero) option as well, in which case the chain(s) will be atomically
201 \fB\-S\fP, \fB\-\-list\-rules\fP [\fIchain\fP]
202 Print all rules in the selected chain. If no chain is selected, all
206 \fB\-F\fP, \fB\-\-flush\fP [\fIchain\fP]
207 Flush the selected chain (all the chains in the table if none is given).
210 \fB\-Z\fP, \fB\-\-zero\fP [\fIchain\fP [\fIrulenum\fP]]
211 Zero the packet and byte counters in all chains, or only the given chain,
212 or only the given rule in a chain. It is legal to
218 \fB\-N\fP, \fB\-\-new\-chain\fP \fIchain\fP
219 Create a new user-defined chain by the given name. There must be no
222 \fB\-X\fP, \fB\-\-delete\-chain\fP [\fIchain\fP]
223 Delete the optional user-defined chain specified. There must be no references
224 to the chain. If there are, you must delete or replace the referring rules
225 before the chain can be deleted. The chain must be empty, i.e. not contain
227 non-builtin chain in the table.
229 \fB\-P\fP, \fB\-\-policy\fP \fIchain target\fP
230 Set the policy for the built-in (non-user-defined) chain to the given target.
233 \fB\-E\fP, \fB\-\-rename\-chain\fP \fIold\-chain new\-chain\fP
234 Rename the user specified chain to the user supplied name. This is
308 matches it. The target can be a user-defined chain (other than the
317 \fB\-g\fP, \fB\-\-goto\fP \fIchain\fP
319 specified chain. Unlike the \-\-jump option return will not continue
320 processing in this chain but instead in the chain that called us via
395 corresponding to that rule's position in the chain.
398 When adding or inserting rules into a chain, use \fIcommand\fP
432 entering the \fBFORWARD\fP chain.