fwiptables intro
fwiptables intro-show
Readme
Version
About
hints
Depends
Options
Examples
fwiptables readme
[ fwiptables readme ]
fwiptables. Firewall With iptables.
Intro content information fwiptables firewall linux
Description | Location | Install | Uninstall.
[ fwiptables description ]
The fwiptables is a one-file WIZARD,
for IPTABLES, with COMMAND-LINE,
with CLI-MENU, with GUI-MENU,
with GUI-ROLL, with GUI-SHELL.
From one system firewall to select one fw,
with eraserules, with template with custom,
from wizard and custom: tiny, mini, full,
with added comments rule in firewall table.
With rules ip4, rules ip6, ebtables, arptables,
with netfilter neftables, netfilter xtables,
with tools ip, wizards for generate new rules,
with save/load rules with files standard iptables,
with shield to ssh or other servers choosed,
with limit the bandwidth, the string word,
with the host whitelist, the host blacklist,
with other more capabilities of firewall iptables.
[ fwiptables location ]
Installed Location: /usr/bin/fwiptables
Config Directory: /etc/fwiptables/data-25-06-A
Cache Directory: /etc/fwiptables/cache-25-06-A
[ fwiptables install, now optionally ]
Launch without install fwiptables
Type its name with path to launch fwiptables
example: /root/bin/fwiptables
With install fwiptables
su root.. TYPE: su root
acl propietary root.. TYPE: chown root fwiptables
acl manage root.. TYPE: chmod 0700 fwiptables
install.. TYPE: fwiptables install
installed FILE: /usr/bin/fwiptables
[ fwiptables uninstall ]
uninstall TYPE: fwiptables uninstall
fwiptables version
### # fwiptables Details Version
Session XDG: x11
Name Firewall: fwiptables
Source Firewall: ./fwiptables-version-25-06-A
Released Firewall: Year 2025 Month 06
Format Firewall: Bourne-Again_shell_script,
Version Maintiner: 25-06-A
Developer Maintiner: Francisco García
Contact Maintiner: fwiptables@gmx.com
Short Description: fwiptables, Firewall With IPTABLES
Long Description: Iptables templates in one script
Data Directory: /etc/fwiptables/data-25-06-A
Cache Directory: /etc/fwiptables/cache-25-06-A
Requisite0 Program: which
Requisite1 program: iptables-legacy,iptables-nft
Requisite2 program: ip6tables-legacy,ip6tables-nft
Requisite3 Program: cat,cut,date,file,id,sed,find
Requisite4 Program: grep,awk,wc,sort,ip,curl,tail
Suggest1 Program: tree,ss,lsof,convert
Suggest2 Program: iperf3,arp-scan
Automatic xhost: /usr/bin/xhost
Automatic editor: /usr/bin/nano
Automatic cli: /usr/bin/whiptail
Automatic gui: /usr/bin/yad
Automatic pdf: /usr/bin/convert
License Program: LGPL v2, GPL v2
### # fwiptables Commands Version
all developers: fwiptables about
Latest Version: fwiptables update
Upgrade Version: fwiptables upgrade
fwiptables about
File License
Original File: fwiptables
Description: fwiptables, Firewall With IPTABLES
Copyright: (c) 2020-2025 LGPL v2, GPL v2
Original Developer Autor
Original Author: Francisco Garcia
Original Contact: fwiptables@gmx.com
Original Version: 25-06-A
Maintainer Developer Autor
Fork developer: Francisco García
Fork contact: fwiptables@gmx.com
Fork version: 25-06-A
Fork date: Year 2025 Month 06
fwiptables hints
[Iptables firewall]
or Legacy or nft: only one them is sufficent
iptables-legacy: support for xtables on ip4
iptables-nft: support for nftables on ip4
ip6tables-legacy: support for xtables on ip6
ip6tables-nft: support for nftables on ip6
[Firewall recomendation with full client]
Client prefered: input-related
Client prefered: input-established
Server prefered: tinyserver-tcp ports
[Some options]
shield maxtries: limit against attack per bruteforce
Blacklist: excepcionals hosts dropped in firewall
whitelist: excepcionals hosts allowed in firewall
tinyserver: client in all allowed, and servers manually
input-established: the computer is only client
[Necesary Ports]
ntp: Port necesary to update the time and date
bootpc: Port necesary to dhcp and get ip
domain: This port is necesary to domain resolver
https: This port is necesary for udp named web html5
ip6-icmp: Necesary protocol in ip6
ip4 ports: ip6 works too with old ip4 ports
fwiptables depends
[ Configuration files ]
Directory data: /etc/fwiptables/data-25-06-A/
Directory cache: /etc/fwiptables/cache-25-06-A/
[ Log files ]
Folder log: /etc/fwiptables/data-25-06-A/log/
Folder pdf: /etc/fwiptables/data-25-06-A/pdf/
Folder history: /etc/fwiptables/data-25-06-A/history/
[ Preferences files ]
preferences: /etc/fwiptables/data-25-06-A/config/config.conf
alias: /etc/fwiptables/data-25-06-A/config/alias.conf
own-notes: /etc/fwiptables/data-25-06-A/config/notes.txt
info: /etc/fwiptables/data-25-06-A/config/info.txt
intro: /etc/fwiptables/data-25-06-A/config/intro.txt
[ optional output ]
xhost x11: /usr/bin/xhost
dialog cli: /usr/bin/dialog
whiptail cli /usr/bin/whiptail
zenity gui: /usr/bin/zenity
yad gui: /usr/bin/yad
convert pdf: /usr/bin/convert
[ Automatic iptables ]
arptables: /usr/sbin/arptables
ebtables: /usr/sbin/ebtables
iptables legacy: /usr/sbin/iptables-legacy
iptables nft: /usr/sbin/iptables-nft
ip6tables legacy: /usr/sbin/ip6tables-legacy
ip6tables nft: /usr/sbin/ip6tables-nft
[ Automatic favorites ]
Automatic txt: /usr/bin/bash
Automatic cli: /usr/bin/whiptail
Automatic gui: /usr/bin/yad
Automatic pdf: /usr/bin/convert
Automatic editor: /usr/bin/nano
Automatic browser: /usr/bin/w3m
Automatic date: /usr/sbin/ntpdate
[ Possible commands ]
Found all possible cmd-requisite: fwiptables cmd-requisite
Found all possible cmd-suggest: fwiptables cmd-suggest
Found all possible cmd-utils: fwiptables cmd-utils
fwiptables options-short
# fwiptables [output] first_option [second_option] [...]
...... ......
output (Optional Ouptut) Example-1: cli | Example-2: gui
...... ...... ......
listconcept (List Table with names) Example: ls4
listnumber (List Table with numbers) Example: lsn4
wallstandard (Manage Standard table) Example: save my-firewall
wallcustom (Manage Custom table) Example: new-full-custom my-custom
wallduplex (Manage Duplex rule) Example: accept-whitelist sf.net
wallsimple (Manage Simple rule) Example: accept-host-ip4-nft sf.net
wallinet (Manage Internet table) Example: wallinet-load client-web
wallutil (Manage Firewall config) Example: preferences-edit
appexpert (Run Application expert) Example: run speed-ip4
...... ...... ......
# suggest options-short hints version cli-menu gui-menu
fwiptables examples
[ One example with input-established ]
Launch : fwiptables input-established
Explain: Client for all ports without servers ports
[ Several examples with tiny server ]
Launch :fwiptables wizard-tiny
Explain: wizard template tiny with few options
Launch :fwiptables tinyserver-tcp 67:68,443
Explain: Client for all and server tcp 66:68,443
[ Several examples with mini server ]
Launch fwiptables wizard-mini
Explain: Wizard firewall for clients and servers
[ Example with accept-whitelist4 ]
launch : fwiptables accept-whitelist4 gmx.com,sf.net
Explain: white list for gmx.com and sf.net in ip4
[ Without optional output ]
Explain: depends from firewall
Launch : fwiptables depends
Explain: List firewall saved
Launch : fwiptables names
Explain: List configs saved
Launch : fwiptables list-custom
Explain: Get info speed ip4
Launch : fwiptables speed-ip4
Explain: Show listen sockets
Launch : fwiptables sockets
Explain: List last options
Launch : fwiptables history
Explain: modify default variables
Launch : fwiptables preferences-edit
[ With optional output ]
info list commands
fwiptables info list
experts commands
fwiptables txt expert
source rutine ip4
fwiptables cli rutine ip4
list rules with number ip4 filter
fwiptables cli lsn4
viewer web browser with gui
fwiptables gui web kernel.org
Launch client web firewall in silent
fwiptables silent client-web
List iptables rules with output txt
fwiptables txt ls4
List firewall with output cli whiptail
fwiptables cli-wiptail names
show listen sockets with output gui
fwiptables gui-yad sockets
All options in text menu
fwiptables cli-menu
All options in window menu
fwiptables gui-menu-yad
All options in window roll
fwiptables gui-roll-zenity
All options in window shell
fwiptables gui-shell-yad