≡ Menu

How do I use Iptables connection tracking feature?

Connection tracking is an essential security feature of Iptables. But, what is connection tracking?

It is the ability to maintain connection information in memory. This is new feature added in 2.4.xx Linux kernel. Eariler only commercial firewall has this feature but now it is part of Linux. It can remember connection states such as established & new connections along with protocol types, source and destination ip address. You can allow or deny access based upon state. Following are the states:

  • NEW – A Client requesting new connection via firewall host
  • ESTABLISHED – A connection that is part of already established connection
  • RELATED – A connection that is requesting a new request but is part of an existing connection.
  • INVALID – If none of the above three states can be referred or used then it is an INVAID state.

Let us try to understand four state with ftp example (our setup):

client                     FTP Server      
client.me.com              ftp.me.com

A) Connet to ftp server:
You have to use ftp command as follows:
$ ftp ftp.me.com
It opens NEW (STATE) connection at ftp server.

client          NEW        FTP Server     --->
client.me.com              ftp.me.com

B) Download files
> get bigfile.tar.gz
When client download files from ftp server we call it ESTABLISHED connection.

client          ESTABLISHED   FTP Server    
client.me.com                 ftp.me.com

Please note that when you see username/password prompt your connection get established and access to ftp server is granted upon successful authentication.

C)Passive ftp connections
In A passive ftp connection, client connection port is 20, but the trasfer port can be any unused port 1024 or higher. To enable passive mode ftp client can send pass command:
ftp> pass
Passive mode on.

You need to use RELATED state at firewall level if you wish to allow passive ftp access. Here is an example of SSH server, allow only new and established connection for SSH server IP

iptables -A INPUT -p tcp -s 0/0 –sport 513:65535 -d –dport 22 -m state –state NEW,ESTABLISHED -j ACCEPT

iptables -A OUTPUT -p tcp -s –sport 22 -d 0/0 –dport 513:65535 -m state –state ESTABLISHED -j ACCEPT

It also works with stateless protocol such as UDP. The following example allows connection tracking to forward only the packets that are associated with an established connection:

iptables -A FORWARD -m state –state ESTABLISHED,RELATED -j ALLOW

In the past we have covered lots of examples related to iptables connection tracking.

Update You may need to put following two lines in your script to use connection tracking feature:

modprobe ip_conntrack
modprobe ip_conntrack_ftp

Please see complete example script here.

Share this on:

Your support makes a big difference:
I have a small favor to ask. More people are reading the nixCraft. Many of you block advertising which is your right, and advertising revenues are not sufficient to cover my operating costs. So you can see why I need to ask for your help. The nixCraft, takes a lot of my time and hard work to produce. If you use nixCraft, who likes it, helps me with donations:
Become a Supporter →    Make a contribution via Paypal/Bitcoin →   

Don't Miss Any Linux and Unix Tips

Get nixCraft in your inbox. It's free:

{ 6 comments… add one }
  • Anonymous November 7, 2005, 4:09 pm

    Yup w/o these two modules ftp passive would be a problem

    modprobe ip_conntrack
    modprobe ip_conntrack_ftp

    Btw Nice pointer for begginers, impo

  • Linux Guy September 16, 2006, 2:14 pm

    I believe the “prefered” way to save your firewall scripts in Redhat-ish environments is with iptables-save. (For example, iptables-save >/etc/sysconfig/iptables)

    The problem is, iptables-save doesn’t seem to be capturing my:

    modprobe ip_conntrack
    modprobe ip_conntrack_ftp

    statements. Am I missing something?

  • Marshall December 6, 2006, 10:47 pm

    Linux Guy, check out IPTABLES_MODULES in /etc/sysconfig/iptables-config.

  • AKM July 8, 2009, 6:35 pm

    that’s worked for me :

    modprobe ip_conntrack
    modprobe ip_conntrack_ftp

    thx a lot !!! ;)

  • Santhosh September 30, 2009, 6:03 am

    Please send the ip_conntrack files to this mail address

  • paul September 20, 2012, 2:16 pm

    how do you access the ip table?

Leave a Comment