{"id":2021,"date":"2025-05-14T08:37:26","date_gmt":"2025-05-14T08:37:26","guid":{"rendered":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/?p=2021"},"modified":"2025-05-14T08:40:45","modified_gmt":"2025-05-14T08:40:45","slug":"dmz-i-lan","status":"publish","type":"post","link":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/","title":{"rendered":"DMZ i LAN."},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2021\" class=\"elementor elementor-2021\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ecd49be e-flex e-con-boxed e-con e-parent\" data-id=\"ecd49be\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5982044 elementor-widget elementor-widget-image\" data-id=\"5982044\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"784\" height=\"667\" src=\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-content\/uploads\/sites\/11\/2025\/05\/imagen.png\" class=\"attachment-large size-large wp-image-1564\" alt=\"\" srcset=\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-content\/uploads\/sites\/11\/2025\/05\/imagen.png 784w, https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-content\/uploads\/sites\/11\/2025\/05\/imagen-300x255.png 300w, https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-content\/uploads\/sites\/11\/2025\/05\/imagen-768x653.png 768w, https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-content\/uploads\/sites\/11\/2025\/05\/imagen-600x510.png 600w\" sizes=\"(max-width: 784px) 100vw, 784px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d67cee8 e-flex e-con-boxed e-con e-parent\" data-id=\"d67cee8\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9c63404 elementor-widget elementor-widget-text-editor\" data-id=\"9c63404\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"\" data-start=\"53\" data-end=\"74\">\ud83e\uddf1 <strong data-start=\"56\" data-end=\"74\">Filter Section<\/strong><\/p><p class=\"\" data-start=\"76\" data-end=\"259\">This part manages traffic control rules in the <code data-start=\"123\" data-end=\"130\">INPUT<\/code>, <code data-start=\"132\" data-end=\"141\">FORWARD<\/code>, and <code data-start=\"147\" data-end=\"155\">OUTPUT<\/code> chains, which regulate which packets are allowed to enter, leave, or be forwarded through the firewall.<\/p><h3 class=\"\" data-start=\"261\" data-end=\"289\">\ud83d\udd27 <strong data-start=\"268\" data-end=\"289\">Default Policies:<\/strong><\/h3><ul data-start=\"291\" data-end=\"561\"><li class=\"\" data-start=\"291\" data-end=\"409\"><p class=\"\" data-start=\"293\" data-end=\"409\"><code data-start=\"293\" data-end=\"307\">INPUT ACCEPT<\/code> \u2192 Accepts all incoming traffic. This means any packet not matching a specific rule will be allowed.<\/p><\/li><li class=\"\" data-start=\"410\" data-end=\"491\"><p class=\"\" data-start=\"412\" data-end=\"491\"><code data-start=\"412\" data-end=\"428\">FORWARD ACCEPT<\/code> \u2192 Accepts all forwarding traffic between network interfaces.<\/p><\/li><li class=\"\" data-start=\"492\" data-end=\"561\"><p class=\"\" data-start=\"494\" data-end=\"561\"><code data-start=\"494\" data-end=\"509\">OUTPUT ACCEPT<\/code> \u2192 Allows all outgoing traffic without restrictions.<\/p><\/li><\/ul><hr class=\"\" data-start=\"563\" data-end=\"566\" \/><h3 class=\"\" data-start=\"568\" data-end=\"598\">\ud83d\udd10 <strong data-start=\"575\" data-end=\"598\">Input Rules (INPUT)<\/strong><\/h3><p class=\"\" data-start=\"600\" data-end=\"688\">These rules control <strong data-start=\"620\" data-end=\"640\">incoming traffic<\/strong> to the device (router). Some specific examples:<\/p><div class=\"contain-inline-size rounded-md border-[0.5px] border-token-border-medium relative bg-token-sidebar-surface-primary\"><div class=\"sticky top-9\"><div class=\"absolute end-0 bottom-0 flex h-9 items-center pe-2\"><div class=\"bg-token-sidebar-surface-primary text-token-text-secondary dark:bg-token-main-surface-secondary flex items-center rounded-sm px-2 font-sans text-xs\">\u00a0<\/div><\/div><\/div><div class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"whitespace-pre! language-bash\">-A INPUT -i lo -j ACCEPT\n<\/code><\/div><\/div><p class=\"\" data-start=\"727\" data-end=\"820\">\u2192 Allows all traffic on the loopback interface (<code data-start=\"775\" data-end=\"779\">lo<\/code>), necessary for local system operations.<\/p><div class=\"contain-inline-size rounded-md border-[0.5px] border-token-border-medium relative bg-token-sidebar-surface-primary\"><div class=\"sticky top-9\"><div class=\"absolute end-0 bottom-0 flex h-9 items-center pe-2\"><div class=\"bg-token-sidebar-surface-primary text-token-text-secondary dark:bg-token-main-surface-secondary flex items-center rounded-sm px-2 font-sans text-xs\">\u00a0<\/div><\/div><\/div><div class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"whitespace-pre! language-bash\">-A INPUT -p tcp -m tcp --dport 21 -j ACCEPT\n<\/code><\/div><\/div><p class=\"\" data-start=\"878\" data-end=\"914\">\u2192 Allows <strong data-start=\"887\" data-end=\"894\">FTP<\/strong> traffic on port 21.<\/p><div class=\"contain-inline-size rounded-md border-[0.5px] border-token-border-medium relative bg-token-sidebar-surface-primary\"><div class=\"sticky top-9\"><div class=\"absolute end-0 bottom-0 flex h-9 items-center pe-2\"><div class=\"bg-token-sidebar-surface-primary text-token-text-secondary dark:bg-token-main-surface-secondary flex items-center rounded-sm px-2 font-sans text-xs\">\u00a0<\/div><\/div><\/div><div class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"whitespace-pre! language-bash\">-A INPUT -p tcp -m tcp --dport 20 -j ACCEPT\n<\/code><\/div><\/div><p class=\"\" data-start=\"972\" data-end=\"1013\">\u2192 Allows <strong data-start=\"981\" data-end=\"993\">FTP-DATA<\/strong> traffic on port 20.<\/p><div class=\"contain-inline-size rounded-md border-[0.5px] border-token-border-medium relative bg-token-sidebar-surface-primary\"><div class=\"sticky top-9\"><div class=\"absolute end-0 bottom-0 flex h-9 items-center pe-2\"><div class=\"bg-token-sidebar-surface-primary text-token-text-secondary dark:bg-token-main-surface-secondary flex items-center rounded-sm px-2 font-sans text-xs\">\u00a0<\/div><\/div><\/div><div class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"whitespace-pre! language-bash\">-A INPUT -p tcp -m tcp --dport 1024:1048 -j ACCEPT\n<\/code><\/div><\/div><p class=\"\" data-start=\"1078\" data-end=\"1130\">\u2192 Allows connections on dynamic ports <strong data-start=\"1116\" data-end=\"1129\">1024-1048<\/strong>.<\/p><hr class=\"\" data-start=\"1132\" data-end=\"1135\" \/><h3 class=\"\" data-start=\"1137\" data-end=\"1174\">\ud83d\udd01 <strong data-start=\"1144\" data-end=\"1174\">Forwarding Rules (FORWARD)<\/strong><\/h3><p class=\"\" data-start=\"1176\" data-end=\"1282\">This configures the traffic <strong data-start=\"1204\" data-end=\"1234\">passing through the router<\/strong>, i.e., packets sent between network interfaces:<\/p><div class=\"contain-inline-size rounded-md border-[0.5px] border-token-border-medium relative bg-token-sidebar-surface-primary\"><div class=\"sticky top-9\"><div class=\"absolute end-0 bottom-0 flex h-9 items-center pe-2\"><div class=\"bg-token-sidebar-surface-primary text-token-text-secondary dark:bg-token-main-surface-secondary flex items-center rounded-sm px-2 font-sans text-xs\">\u00a0<\/div><\/div><\/div><div class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"whitespace-pre! language-bash\">-A FORWARD -i enp1s0.10 -o enp1s0.20 -j ACCEPT\n<\/code><\/div><\/div><p class=\"\" data-start=\"1343\" data-end=\"1404\">\u2192 Allows traffic between subnets <code data-start=\"1376\" data-end=\"1387\">enp1s0.10<\/code> and <code data-start=\"1392\" data-end=\"1403\">enp1s0.20<\/code>.<\/p><div class=\"contain-inline-size rounded-md border-[0.5px] border-token-border-medium relative bg-token-sidebar-surface-primary\"><div class=\"sticky top-9\"><div class=\"absolute end-0 bottom-0 flex h-9 items-center pe-2\"><div class=\"bg-token-sidebar-surface-primary text-token-text-secondary dark:bg-token-main-surface-secondary flex items-center rounded-sm px-2 font-sans text-xs\">\u00a0<\/div><\/div><\/div><div class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"whitespace-pre! language-bash\">-A FORWARD -i enp1s0 -o enp2s0 -j ACCEPT\n<\/code><\/div><\/div><p class=\"\" data-start=\"1459\" data-end=\"1541\">\u2192 Allows traffic from <code data-start=\"1481\" data-end=\"1489\">enp1s0<\/code> to <code data-start=\"1493\" data-end=\"1501\">enp2s0<\/code> (likely the Internet-facing interface).<\/p><div class=\"contain-inline-size rounded-md border-[0.5px] border-token-border-medium relative bg-token-sidebar-surface-primary\"><div class=\"sticky top-9\"><div class=\"absolute end-0 bottom-0 flex h-9 items-center pe-2\"><div class=\"bg-token-sidebar-surface-primary text-token-text-secondary dark:bg-token-main-surface-secondary flex items-center rounded-sm px-2 font-sans text-xs\">\u00a0<\/div><\/div><\/div><div class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"whitespace-pre! language-bash\">-A FORWARD -i enp2s0 -o enp1s0 -m state --state RELATED,ESTABLISHED -j ACCEPT\n<\/code><\/div><\/div><p class=\"\" data-start=\"1633\" data-end=\"1751\">\u2192 Allows <strong data-start=\"1642\" data-end=\"1662\">response packets<\/strong> from the Internet back to the internal network, ensuring only return traffic is allowed.<\/p><div class=\"contain-inline-size rounded-md border-[0.5px] border-token-border-medium relative bg-token-sidebar-surface-primary\"><div class=\"sticky top-9\"><div class=\"absolute end-0 bottom-0 flex h-9 items-center pe-2\"><div class=\"bg-token-sidebar-surface-primary text-token-text-secondary dark:bg-token-main-surface-secondary flex items-center rounded-sm px-2 font-sans text-xs\">\u00a0<\/div><\/div><\/div><div class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"whitespace-pre! language-bash\">-A FORWARD -i enp2s0 -o enp1s0 -j REJECT --reject-with icmp-port-unreachable\n<\/code><\/div><\/div><p class=\"\" data-start=\"1842\" data-end=\"1918\">\u2192 Blocks <strong data-start=\"1851\" data-end=\"1875\">unauthorized traffic<\/strong> from the Internet to the internal network.<\/p><p class=\"\" data-start=\"1920\" data-end=\"1937\">\u2705 <strong data-start=\"1922\" data-end=\"1937\">Key points:<\/strong><\/p><ul data-start=\"1939\" data-end=\"2202\"><li class=\"\" data-start=\"1939\" data-end=\"2013\"><p class=\"\" data-start=\"1941\" data-end=\"2013\">The internal network is <strong data-start=\"1965\" data-end=\"1978\">protected<\/strong> by only allowing return traffic.<\/p><\/li><li class=\"\" data-start=\"2014\" data-end=\"2101\"><p class=\"\" data-start=\"2016\" data-end=\"2101\">Communication between <strong data-start=\"2038\" data-end=\"2047\">VLANs<\/strong> (<code data-start=\"2049\" data-end=\"2060\">enp1s0.10<\/code>, <code data-start=\"2062\" data-end=\"2073\">enp1s0.20<\/code>, <code data-start=\"2075\" data-end=\"2086\">enp1s0.30<\/code>) is allowed.<\/p><\/li><li class=\"\" data-start=\"2102\" data-end=\"2202\"><p class=\"\" data-start=\"2104\" data-end=\"2202\"><strong data-start=\"2104\" data-end=\"2121\">Direct access<\/strong> from the Internet to the internal network is blocked \u2014 a good security practice.<\/p><\/li><\/ul><hr class=\"\" data-start=\"2204\" data-end=\"2207\" \/><h3 class=\"\" data-start=\"2209\" data-end=\"2241\">\ud83d\udce4 <strong data-start=\"2216\" data-end=\"2241\">Output Rules (OUTPUT)<\/strong><\/h3><div class=\"contain-inline-size rounded-md border-[0.5px] border-token-border-medium relative bg-token-sidebar-surface-primary\"><div class=\"sticky top-9\"><div class=\"absolute end-0 bottom-0 flex h-9 items-center pe-2\"><div class=\"bg-token-sidebar-surface-primary text-token-text-secondary dark:bg-token-main-surface-secondary flex items-center rounded-sm px-2 font-sans text-xs\">\u00a0<\/div><\/div><\/div><div class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"whitespace-pre! language-bash\">-A OUTPUT -o lo -j ACCEPT\n<\/code><\/div><\/div><p class=\"\" data-start=\"2281\" data-end=\"2372\">\u2192 Allows traffic on the loopback interface (<code data-start=\"2325\" data-end=\"2329\">lo<\/code>), important for internal system processes.<\/p><hr class=\"\" data-start=\"2374\" data-end=\"2377\" \/><h2 class=\"\" data-start=\"2379\" data-end=\"2400\">\ud83c\udf10 <strong data-start=\"2385\" data-end=\"2400\">NAT Section<\/strong><\/h2><p class=\"\" data-start=\"2402\" data-end=\"2510\">This part configures <strong data-start=\"2423\" data-end=\"2454\">Network Address Translation<\/strong>, necessary for internal devices to access the Internet.<\/p><h3 class=\"\" data-start=\"2512\" data-end=\"2538\">\ud83d\udd01 <strong data-start=\"2519\" data-end=\"2538\">MASQUERADE Rule<\/strong><\/h3><div class=\"contain-inline-size rounded-md border-[0.5px] border-token-border-medium relative bg-token-sidebar-surface-primary\"><div class=\"sticky top-9\"><div class=\"absolute end-0 bottom-0 flex h-9 items-center pe-2\"><div class=\"bg-token-sidebar-surface-primary text-token-text-secondary dark:bg-token-main-surface-secondary flex items-center rounded-sm px-2 font-sans text-xs\">\u00a0<\/div><\/div><\/div><div class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"whitespace-pre! language-bash\">-A POSTROUTING -o enp2s0 -j MASQUERADE\n<\/code><\/div><\/div><p class=\"\" data-start=\"2592\" data-end=\"2830\"><strong data-start=\"2592\" data-end=\"2619\">What does this rule do?<\/strong><br data-start=\"2619\" data-end=\"2622\" \/>This rule <strong data-start=\"2632\" data-end=\"2666\">hides the private IP addresses<\/strong> of internal devices and replaces them with the router\u2019s <strong data-start=\"2723\" data-end=\"2736\">public IP<\/strong> when going out via <code data-start=\"2756\" data-end=\"2764\">enp2s0<\/code>. It&#8217;s essential to enable Internet browsing for internal devices.<\/p><hr class=\"\" data-start=\"2832\" data-end=\"2835\" \/><h2 class=\"\" data-start=\"2837\" data-end=\"2862\">\u2705 <strong data-start=\"2842\" data-end=\"2862\">Function Summary<\/strong><\/h2><ul data-start=\"2864\" data-end=\"3340\"><li class=\"\" data-start=\"2864\" data-end=\"2998\"><p class=\"\" data-start=\"2866\" data-end=\"2998\"><strong data-start=\"2866\" data-end=\"2887\">Traffic Filtering<\/strong>: Essential traffic is allowed within the internal network, while direct access from the Internet is blocked.<\/p><\/li><li class=\"\" data-start=\"2999\" data-end=\"3111\"><p class=\"\" data-start=\"3001\" data-end=\"3111\"><strong data-start=\"3001\" data-end=\"3023\">VLAN Communication<\/strong>: Traffic is allowed between internal subnets (<code data-start=\"3070\" data-end=\"3081\">enp1s0.10<\/code>, <code data-start=\"3083\" data-end=\"3094\">enp1s0.20<\/code>, <code data-start=\"3096\" data-end=\"3107\">enp1s0.30<\/code>).<\/p><\/li><li class=\"\" data-start=\"3112\" data-end=\"3238\"><p class=\"\" data-start=\"3114\" data-end=\"3238\"><strong data-start=\"3114\" data-end=\"3135\">Router Protection<\/strong>: Only return traffic from the Internet is allowed; direct access to the internal network is blocked.<\/p><\/li><li class=\"\" data-start=\"3239\" data-end=\"3340\"><p class=\"\" data-start=\"3241\" data-end=\"3340\"><strong data-start=\"3241\" data-end=\"3270\">Address Translation (NAT)<\/strong>: MASQUERADE is used to allow internal devices to browse the Internet.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\ud83e\uddf1 Filter Section This part manages traffic control rules in the INPUT, FORWARD, and OUTPUT chains, which regulate which packets are allowed to enter, leave, or be forwarded through the firewall. \ud83d\udd27 Default Policies: INPUT ACCEPT \u2192 Accepts all incoming traffic. This means any packet not matching a specific rule will be allowed. FORWARD ACCEPT &#8230; <a title=\"DMZ i LAN.\" class=\"read-more\" href=\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/\" aria-label=\"Read more about DMZ i LAN.\">Read more<\/a><\/p>\n","protected":false},"author":37,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2021","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DMZ i LAN. - S\u00cdNTESI 25 | OFFTUBE<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DMZ i LAN. - S\u00cdNTESI 25 | OFFTUBE\" \/>\n<meta property=\"og:description\" content=\"\ud83e\uddf1 Filter Section This part manages traffic control rules in the INPUT, FORWARD, and OUTPUT chains, which regulate which packets are allowed to enter, leave, or be forwarded through the firewall. \ud83d\udd27 Default Policies: INPUT ACCEPT \u2192 Accepts all incoming traffic. This means any packet not matching a specific rule will be allowed. FORWARD ACCEPT ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/\" \/>\n<meta property=\"og:site_name\" content=\"S\u00cdNTESI 25 | OFFTUBE\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-14T08:37:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-14T08:40:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-content\/uploads\/sites\/11\/2025\/05\/imagen.png\" \/>\n\t<meta property=\"og:image:width\" content=\"784\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"nmoreno\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"nmoreno\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/\"},\"author\":{\"name\":\"nmoreno\",\"@id\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/#\/schema\/person\/56c50603dfcbcd66e6e07977dac39208\"},\"headline\":\"DMZ i LAN.\",\"datePublished\":\"2025-05-14T08:37:26+00:00\",\"dateModified\":\"2025-05-14T08:40:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/\"},\"wordCount\":324,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/#organization\"},\"image\":{\"@id\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-content\/uploads\/sites\/11\/2025\/05\/imagen.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/\",\"url\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/\",\"name\":\"DMZ i LAN. - S\u00cdNTESI 25 | OFFTUBE\",\"isPartOf\":{\"@id\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-content\/uploads\/sites\/11\/2025\/05\/imagen.png\",\"datePublished\":\"2025-05-14T08:37:26+00:00\",\"dateModified\":\"2025-05-14T08:40:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/#primaryimage\",\"url\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-content\/uploads\/sites\/11\/2025\/05\/imagen.png\",\"contentUrl\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-content\/uploads\/sites\/11\/2025\/05\/imagen.png\",\"width\":784,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DMZ i LAN.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/#website\",\"url\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/\",\"name\":\"S\u00cdNTESI 25 | OFFTUBE\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/#organization\",\"name\":\"S\u00cdNTESI 25 | OFFTUBE\",\"url\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-content\/uploads\/sites\/11\/2025\/03\/cropped-1-removebg-preview.png\",\"contentUrl\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-content\/uploads\/sites\/11\/2025\/03\/cropped-1-removebg-preview.png\",\"width\":311,\"height\":170,\"caption\":\"S\u00cdNTESI 25 | OFFTUBE\"},\"image\":{\"@id\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/#\/schema\/person\/56c50603dfcbcd66e6e07977dac39208\",\"name\":\"nmoreno\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bd1370310734d1f4c077548c8dcfb9a9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bd1370310734d1f4c077548c8dcfb9a9?s=96&d=mm&r=g\",\"caption\":\"nmoreno\"},\"url\":\"https:\/\/sintesi.inscastellbisbal.net\/offtube\/author\/nmoreno\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DMZ i LAN. - S\u00cdNTESI 25 | OFFTUBE","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/","og_locale":"en_US","og_type":"article","og_title":"DMZ i LAN. - S\u00cdNTESI 25 | OFFTUBE","og_description":"\ud83e\uddf1 Filter Section This part manages traffic control rules in the INPUT, FORWARD, and OUTPUT chains, which regulate which packets are allowed to enter, leave, or be forwarded through the firewall. \ud83d\udd27 Default Policies: INPUT ACCEPT \u2192 Accepts all incoming traffic. This means any packet not matching a specific rule will be allowed. FORWARD ACCEPT ... Read more","og_url":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/","og_site_name":"S\u00cdNTESI 25 | OFFTUBE","article_published_time":"2025-05-14T08:37:26+00:00","article_modified_time":"2025-05-14T08:40:45+00:00","og_image":[{"width":784,"height":667,"url":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-content\/uploads\/sites\/11\/2025\/05\/imagen.png","type":"image\/png"}],"author":"nmoreno","twitter_card":"summary_large_image","twitter_misc":{"Written by":"nmoreno","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/#article","isPartOf":{"@id":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/"},"author":{"name":"nmoreno","@id":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/#\/schema\/person\/56c50603dfcbcd66e6e07977dac39208"},"headline":"DMZ i LAN.","datePublished":"2025-05-14T08:37:26+00:00","dateModified":"2025-05-14T08:40:45+00:00","mainEntityOfPage":{"@id":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/"},"wordCount":324,"commentCount":0,"publisher":{"@id":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/#organization"},"image":{"@id":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/#primaryimage"},"thumbnailUrl":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-content\/uploads\/sites\/11\/2025\/05\/imagen.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/","url":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/","name":"DMZ i LAN. - S\u00cdNTESI 25 | OFFTUBE","isPartOf":{"@id":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/#primaryimage"},"image":{"@id":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/#primaryimage"},"thumbnailUrl":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-content\/uploads\/sites\/11\/2025\/05\/imagen.png","datePublished":"2025-05-14T08:37:26+00:00","dateModified":"2025-05-14T08:40:45+00:00","breadcrumb":{"@id":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/#primaryimage","url":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-content\/uploads\/sites\/11\/2025\/05\/imagen.png","contentUrl":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-content\/uploads\/sites\/11\/2025\/05\/imagen.png","width":784,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/2025\/05\/14\/dmz-i-lan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/"},{"@type":"ListItem","position":2,"name":"DMZ i LAN."}]},{"@type":"WebSite","@id":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/#website","url":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/","name":"S\u00cdNTESI 25 | OFFTUBE","description":"","publisher":{"@id":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/#organization","name":"S\u00cdNTESI 25 | OFFTUBE","url":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/#\/schema\/logo\/image\/","url":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-content\/uploads\/sites\/11\/2025\/03\/cropped-1-removebg-preview.png","contentUrl":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-content\/uploads\/sites\/11\/2025\/03\/cropped-1-removebg-preview.png","width":311,"height":170,"caption":"S\u00cdNTESI 25 | OFFTUBE"},"image":{"@id":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/#\/schema\/person\/56c50603dfcbcd66e6e07977dac39208","name":"nmoreno","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bd1370310734d1f4c077548c8dcfb9a9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bd1370310734d1f4c077548c8dcfb9a9?s=96&d=mm&r=g","caption":"nmoreno"},"url":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/author\/nmoreno\/"}]}},"_links":{"self":[{"href":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-json\/wp\/v2\/posts\/2021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-json\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-json\/wp\/v2\/comments?post=2021"}],"version-history":[{"count":4,"href":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-json\/wp\/v2\/posts\/2021\/revisions"}],"predecessor-version":[{"id":2027,"href":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-json\/wp\/v2\/posts\/2021\/revisions\/2027"}],"wp:attachment":[{"href":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-json\/wp\/v2\/media?parent=2021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-json\/wp\/v2\/categories?post=2021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sintesi.inscastellbisbal.net\/offtube\/wp-json\/wp\/v2\/tags?post=2021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}