How to set up port forwarding on Linux
Port forwarding is a very important function in various network applications. It allows you to forward external traffic to specific ports on your internal network. On Linux systems, the port forwarding function is implemented by using iptables and sysctl. This article explains how to set up port forwarding on Linux and provides corresponding code examples.
- Check the kernel parameters
Before starting to set up port forwarding, we first need to check whether the kernel parameters allow the forwarding function. By running the following command, you can view the forwarding settings of the current system:
sysctl net.ipv4.ip_forward
If the output result is net.ipv4.ip_forward = 1
, it means that the forwarding function has been enabled. If the output result is net.ipv4.ip_forward = 0
, it means that the forwarding function is not enabled. When the forwarding function is not enabled, you can temporarily enable the forwarding function by running the following command:
sysctl -w net.ipv4.ip_forward=1
If you need to permanently enable the forwarding function, you can edit the /etc/sysctl.conf
file, And add or modify the following parameters:
net.ipv4.ip_forward=1
After modification, save the file and run the following command to make it effective:
sysctl -p
- Set port forwarding
There are many ways to implement port forwarding. Below we will introduce two common ways: using iptables and using the socat tool.
A. Using iptables
iptables is a commonly used firewall tool on Linux systems. We can use it to set up port forwarding. The following is a sample code to set up port forwarding through iptables:
iptables -t nat -A PREROUTING -p tcp --dport <external_port> -j DNAT --to-destination <internal_ip>:<internal_port> iptables -t nat -A POSTROUTING -j MASQUERADE
where <external_port></external_port>
is the external port, <internal_ip></internal_ip>
is the IP address of the internal server, <internal_port></internal_port>
is the port number of the internal server. These two commands will forward external traffic to the internal server. If you want the source IP address to be correctly identified after external traffic is forwarded, you can add the following command:
iptables -t nat -A POSTROUTING -o <external_interface> -j MASQUERADE
where<external_interface></external_interface>
is the name of the external interface, such as eth0
.
B. Use the socat tool
Socat is a powerful network tool that can perform various network connections and forwarding. The following is a sample code to set up port forwarding through socat:
socat TCP-LISTEN:<external_port>,fork TCP:<internal_ip>:<internal_port>
where <external_port></external_port>
is the external port, <internal_ip></internal_ip>
is the IP address of the internal server, <internal_port></internal_port>
is the port number of the internal server. This command will forward external traffic to the internal server.
- Apply forwarding rules
Whether you use iptables or socat tool, the forwarding rules set are only valid in the current session. If you want the rules to remain valid after a system restart, you need to apply these rules to the system.
A. Using iptables
You can apply iptables rules to the system by running the following command:
iptables-save > /etc/sysconfig/iptables
B. Using the socat tool
socat tool default Running in the background, if you want the socat rules to remain valid after the system restarts, you can add the socat configuration to the system startup script. For example, on an Ubuntu system you can edit the /etc/rc.local
file and add the following content:
/path/to/socat TCP-LISTEN:<external_port>,fork TCP:<internal_ip>:<internal_port> &
Note that /path/to/socat
needs to be replaced with The actual socat tool path.
Summary
This article describes how to set up port forwarding on a Linux system and provides code examples using the iptables and socat tools. By setting up port forwarding, you can flexibly forward external traffic to internal servers to achieve load balancing, port mapping and other functions for network applications.
The above is the detailed content of How to set up port forwarding on Linux. For more information, please follow other related articles on the PHP Chinese website!

This tutorial demonstrates efficient keyword searching in Linux using the grep command family and related tools. It covers basic and advanced techniques, including regular expressions, recursive searches, and combining commands like awk, sed, and xa

This article details the multifaceted role of a Linux system administrator, encompassing system maintenance, troubleshooting, security, and collaboration. It highlights essential technical and soft skills, salary expectations, and diverse career pr

The article explains how to use regular expressions (regex) in Linux for pattern matching, file searching, and text manipulation, detailing syntax, commands, and tools like grep, sed, and awk.

The article discusses using top, htop, and vmstat for monitoring Linux system performance, detailing their unique features and customization options for effective system management.

The article provides a guide on setting up two-factor authentication (2FA) for SSH on Linux using Google Authenticator, detailing installation, configuration, and troubleshooting steps. It highlights the security benefits of 2FA, such as enhanced sec

This article compares SELinux and AppArmor, Linux kernel security modules providing mandatory access control. It details their configuration, highlighting the differences in approach (policy-based vs. profile-based) and potential performance impacts

This article details Linux system backup and restoration methods. It compares full system image backups with incremental backups, discusses optimal backup strategies (regularity, multiple locations, versioning, testing, security, rotation), and da

This article compares Linux commands (scp, sftp, rsync, ftp) for uploading files. It emphasizes security (favoring SSH-based methods) and efficiency, highlighting rsync's delta transfer capabilities for large files. The choice depends on file size,


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SublimeText3 Linux new version
SublimeText3 Linux latest version

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function
