iptables 
How To william ic

-A              INPUT,OUTPUT,FORWARD (abaixo de tudo)
-I              INPUT,OUTPUT,FORWARD (acima de tudo)
-p              tcp,udp
--dport         1-65000 ou 22
--sport         1-65000 ou 22
-i              eth0,1,...
-o              eth0,1,...
-j              ACCEPT,DROP,LOG,DNAT,SNAT
-d              0.0.0.0 a 255.255.255.255 /0 a 32
-s              0.0.0.0 a 255.255.255.255 /0 a 32
-m state --state NEW,ESTABLISHED,RELATED

-t              NAT
-A              POSTROUTING,PREROUNTING
-I              POSTROUTING,PREROUNTING

-N              <CHAIN> (nome nova chain)
-A              <CHAIN>
-I              <CHAIN>
-j              <CHAIN>


** NAT

## ETH1 rede privada Interno
## ETH0 INTERNET

iptables -P INPUT ACCEPT
iptables -F INPUT
iptables -P OUTPUT ACCEPT
iptables -F OUTPUT
iptables -P FORWARD DROP
iptables -F FORWARD
iptables -A FORWARD -i eth1 -o eth0 -j ACCEPT
iptables -A FORWARD -i eth0 -o eth1 -m state --state ESTABLISHED,RELATED -j ACCEPT 
iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE 

iptables -L --line-numbers iptables -D INPUT 3 OR iptables -t nat -D POSTROUTING 1 http://www.students.ic.unicamp.br/~william/people/router-nat/iptables.html # IPv6 : bloqueando mais do que 4 novas conexão no periodo de 60 segundos: ip6tables -N LOGDROP ip6tables -A LOGDROP -j LOG ip6tables -A LOGDROP -j DROP ip6tables -I INPUT -p tcp --dport 22 -i eth0 -m state --state NEW -m recent --set ip6tables -I INPUT -p tcp --dport 22 -i eth0 -m state --state NEW -m recent --update --seconds 60 --hitcount 4 -j LOGDROP