久久精品国产精品国产精品污,男人扒开添女人下部免费视频,一级国产69式性姿势免费视频,夜鲁夜鲁很鲁在线视频 视频,欧美丰满少妇一区二区三区,国产偷国产偷亚洲高清人乐享,中文 在线 日韩 亚洲 欧美,熟妇人妻无乱码中文字幕真矢织江,一区二区三区人妻制服国产

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 > 编程资源 > 编程问答 >内容正文

编程问答

man iptables by iptables-save v1.3.5

發布時間:2025/3/20 编程问答 14 豆豆
生活随笔 收集整理的這篇文章主要介紹了 man iptables by iptables-save v1.3.5 小編覺得挺不錯的,現在分享給大家,幫大家做個參考.
可不是原創文章,沒辦法,找不到合適的標題項!

Generated by iptables-save v1.3.5 on Fri Mar 31 18:52:44 2006
man iptables |col -b >iptables.txt

得到的說明方法,呵呵,可以以TXT的格式看,沒有了亂碼,覺得不錯,相當不錯,貼出來共享下,好好學學啦!
感謝我同事,小沈對此獲取方法的提供!!
這年頭,要看英文的說明啦!!


IPTABLES(8)??????????IPTABLES(8)

NAME
?????? iptables - administration tool for IPv4 packet filtering and NAT
SYNOPSIS
?????? iptables [-t table] -[AD] chain rule-specification [options]
?????? iptables [-t table] -I chain [rulenum] rule-specification [options]
?????? iptables [-t table] -R chain rulenum rule-specification [options]
?????? iptables [-t table] -D chain rulenum [options]
?????? iptables [-t table] -[LFZ] [chain] [options]
?????? iptables [-t table] -N chain
?????? iptables [-t table] -X [chain]
?????? iptables [-t table] -P chain target [options]
?????? iptables [-t table] -E old-chain-name new-chain-name
DESCRIPTION
?????? Iptables??is??used??to??set??up, maintain, and inspect the tables of IP
?????? packet filter rules in the Linux kernel.??Several different tables??may
?????? be??defined.?? Each??table contains a number of built-in chains and may
?????? also contain user-defined chains.
?????? Each chain is a list of rules which can match a set of??packets.?? Each
?????? rule specifies what to do with a packet that matches.??This is called a
?????? 'target', which may be a jump to a user-defined chain in the??same??ta-
?????? ble.

TARGETS
?????? A??firewall rule specifies criteria for a packet, and a target. If the
?????? packet does not match, the next rule in the chain is the??examined;??if
?????? it does match, then the next rule is specified by the value of the tar-
?????? get, which can be the name of a user-defined chain or one of??the??spe-
?????? cial values ACCEPT, Drop, QUEUE, or RETURN.
?????? ACCEPT??means to let the packet through.??Drop means to drop the packet
?????? on the floor.??QUEUE means to pass the packet to userspace.?? (How??the
?????? packet can be received by a userspace process differs by the particular
?????? queue handler.??2.4.x and??2.6.x??kernels??up??to??2.6.13??include??the
?????? ip_queue??queue handler.??Kernels 2.6.14 and later additionally include
?????? the nfnetlink_queue queue handler.??Packets with a target of QUEUE will
?????? be??sent??to queue number '0' in this case. Please also see the NFQUEUE
?????? target as described??later??in??this??man??page.)?? RETURN??means??stop
?????? traversing??this??chain and??resume??at??the next rule in the previous
?????? (calling) chain.??If the end of a built-in chain is reached or??a??rule
?????? in a built-in chain with target RETURN is matched, the target specified
?????? by the chain policy determines the fate of the packet.
TABLES
?????? There are currently three independent tables (which tables are??present
?????? at??any time depends on the kernel configuration options and which mod-
?????? ules are present).
?????? -t, --table table
?????? This option specifies the packet matching table which??the??com-
?????? mand??should operate on. If the kernel is configured with auto-
?????? matic module loading, an attempt will be made to load the appro-
?????? priate module for that table if it is not already there.
?????? The tables are as follows:
?????? filter:
????This is??the default table (if no -t option is passed).??It
????contains the built-in chains INPUT (for packets destined??to
????local??sockets),??FORWARD??(for packets being routed through
????the box), and OUTPUT (for locally-generated packets).
?????? nat:
????This table is consulted when a packet??that??creates a??new
????connection??is encountered.??It consists of three built-ins:
????PREROUTING (for altering packets as soon as they??come??in),
????OUTPUT??(for altering locally-generated packets before rout-
????ing), and POSTROUTING (for??altering packets??as??they??are
????about to go out).
?????? mangle:
????This table is used for specialized packet alteration.??Until
????kernel 2.4.17 it had two built-in??chains:??PREROUTING??(for
????altering??incoming??packets??before routing) and OUTPUT (for
????altering locally-generated packets before??routing).??Since
????kernel??2.4.18,??three??other??built-in chains are also sup-
????ported: INPUT (for packets coming into the box itself), FOR-
????WARD (for??altering packets being routed through the box),
????and POSTROUTING (for altering packets as they are??about??to
????go out).
?????? raw:
????This table??is??used mainly for configuring exemptions from
????connection tracking in combination with the NOTRACK??target.
????It registers at the netfilter hooks with higher priority and
????is thus called before ip_conntrack, or any other IP??tables.
????It??provides the following built-in chains: PREROUTING (for
????packets arriving via any??network??interface)??OUTPUT??(for
????packets generated by local processes)
OPTIONS
?????? The options that are recognized by iptables can be divided into several
?????? different groups.
?? COMMANDS
?????? These options specify the specific action to perform.??Only one of them
?????? can??be specified on the command line unless otherwise specified below.
?????? For all the long versions of the command and option names, you need??to
?????? use??only??enough??letters to ensure that iptables can differentiate it
?????? from all other options.
?????? -A, --append chain rule-specification
?????? Append one or more rules to the end of the selected chain.??When
?????? the??source??and/or??destination names resolve to more than one
?????? address, a rule will be added for each possible address combina-
?????? tion.
?????? -D, --delete chain rule-specification
?????? -D, --delete chain rulenum
?????? Delete one or more rules from the selected chain.??There are two
?????? versions of this command: the rule can be specified as a number
?????? in??the??chain??(starting??at 1 for the first rule) or a rule to
?????? match.
?????? -I, --insert chain [rulenum] rule-specification
?????? Insert one or more rules in the selected chain as the given rule
?????? number. So,??if??the??rule??number is 1, the rule or rules are
?????? inserted at the head of the chain.??This is also the default??if
?????? no rule number is specified.
?????? -R, --replace chain rulenum rule-specification
?????? Replace a rule in the selected chain.??If the source and/or des-
?????? tination names resolve to multiple addresses, the??command??will
?????? fail.??Rules are numbered starting at 1.
?????? -L, --list [chain]
?????? List??all rules in the selected chain.??If no chain is selected,
?????? all chains are listed.??As??every??other iptables??command,??it
?????? applies??to??the specified table (filter is the default), so NAT
?????? rules get listed by
????????iptables -t nat -n -L
?????? Please note that it is often used with the -n option,??in??order
?????? to??avoid??long reverse DNS lookups.??It is legal to specify the
?????? -Z (zero) option as well, in which case??the??chain(s)??will??be
?????? atomically??listed??and zeroed.??The exact output is affected by
?????? the other arguments given. The exact rules are suppressed??until
?????? you use
????????iptables -L -v
?????? -F, --flush [chain]
?????? Flush the selected chain (all the chains in the table if none is
?????? given).??This is equivalent to deleting all??the rules??one??by
?????? one.
?????? -Z, --zero [chain]
?????? Zero the packet and byte counters in all chains. It is legal to
?????? specify the -L, --list (list) option as well, to see??the??coun-
?????? ters immediately before they are cleared. (See above.)
?????? -N, --new-chain chain
?????? Create??a??new user-defined chain by the given name.??There must
?????? be no target of that name already.
?????? -X, --delete-chain [chain]
?????? Delete the optional user-defined chain specified.??There must be
?????? no??references??to??the chain.??If there are, you must delete or
?????? replace the referring rules before the??chain??can??be??deleted.
?????? The??chain??must be??empty,??i.e. not contain any rules.??If no
?????? argument is given, it will attempt to delete??every??non-builtin
?????? chain in the table.
?????? -P, --policy chain target
?????? Set??the policy for the chain to the given target.??See the sec-
?????? tion TARGETS for the legal targets.?? Only??built-in??(non-user-
?????? defined) chains can??have??policies,??and neither built-in nor
?????? user-defined chains can be policy targets.
?????? -E, --rename-chain old-chain new-chain
?????? Rename the user specified chain to the user supplied name.??This
?????? is cosmetic, and has no effect on the structure of the table.
?????? -h???? Help.?? Give a (currently very brief) description of the command
?????? syntax.
?? PARAMETERS
?????? The following parameters make up a rule specification (as used??in??the
?????? add, delete, insert, replace and append commands).
?????? -p, --protocol [!] protocol
?????? The??protocol of the rule or of the packet to check.??The speci-
?????? fied protocol can be one of tcp, udp, icmp, or all, or it can be
?????? a??numeric??value, representing one of these protocols or a dif-
?????? ferent??one.?? A protocol??name from??/etc/protocols??is??also
?????? allowed.??A??"!" argument before the protocol inverts the test.
?????? The number zero is equivalent to all.??Protocol all??will??match
?????? with??all??protocols and is taken as default when this option is
?????? omitted.
?????? -s, --source [!] address[/mask]
?????? Source specification.??Address can be either a network??name,??a
?????? hostname (please??note??that specifying any name to be resolved
?????? with a remote query such as DNS is a really bad idea), a network
?????? IP address (with /mask), or a plain IP address.??The mask can be
?????? either a network mask or a plain number, specifying??the number
?????? of 1's at the left side of the network mask.??Thus, a mask of 24
?????? is equivalent to 255.255.255.0.??A??"!"??argument??before??the
?????? address specification inverts the sense of the address. The flag
?????? --src is an alias for this option.
?????? -d, --destination [!] address[/mask]
?????? Destination??specification.?? See??the??description??of??the??-s
?????? (source) flag??for??a??detailed description of the syntax.??The
?????? flag --dst is an alias for this option.
?????? -j, --jump target
?????? This specifies the target of the rule; i.e., what to do??if??the
?????? packet??matches??it.?? The??target??can??be a user-defined chain
?????? (other than the one this rule is in), one of the special builtin
?????? targets??which??decide the fate of the packet immediately, or an
?????? extension (see EXTENSIONS below).??If this option is omitted??in
?????? a rule (and -g is not used), then matching the rule will have no
?????? effect on the packet's fate, but the counters on the??rule??will
?????? be incremented.
?????? -g, --goto chain
?????? This??specifies??that??the??processing should continue in a user
?????? specified chain. Unlike the --jump option return will??not??con-
?????? tinue??processing??in??this??chain but instead in the chain that
?????? called us via --jump.
?????? -i, --in-interface [!] name
?????? Name of an interface via which a packet was received??(only??for
?????? packets??entering??the??INPUT,??FORWARD??and PREROUTING chains).
?????? When the "!" argument is used before??the??interface??name,??the
?????? sense??is??inverted.?? If the interface name ends in a "+", then
?????? any interface which begins with this name will match.?? If??this
?????? option is omitted, any interface name will match.
?????? -o, --out-interface [!] name
?????? Name of an interface via which a packet is going to be sent (for
?????? packets entering the FORWARD, OUTPUT??and??POSTROUTING??chains).
?????? When??the??"!"??argument is used before the interface name, the
?????? sense is inverted.??If the interface name ends in??a??"+",??then
?????? any??interface??which begins with this name will match.??If this
?????? option is omitted, any interface name will match.
?????? [!]??-f, --fragment
?????? This means that the rule only refers to second and further frag-
?????? ments??of fragmented packets.??Since there is no way to tell the
?????? source or destination ports of such a??packet??(or??ICMP type),
?????? such a packet will not match any rules which specify them.??When
?????? the "!" argument precedes the "-f"??flag,??the??rule??will??only
?????? match head fragments, or unfragmented packets.
?????? -c, --set-counters PKTS BYTES
?????? This enables the administrator to initialize the packet and byte
?????? counters of a rule (during Insert, APPEND, REPLACE??operations).
?? OTHER OPTIONS
?????? The following additional options can be specified:
?????? -v, --verbose
?????? Verbose??output.??This??option??makes the list command show the
?????? interface name, the rule options (if any), and??the??TOS masks.
?????? The??packet??and byte counters are also listed, with the suffix
?????? 'K', 'M' or 'G' for 1000, 1,000,000 and 1,000,000,000??multipli-
?????? ers??respectively??(but??see??the??-x flag to change this).??For
?????? appending, insertion,??deletion??and??replacement,??this causes
?????? detailed information on the rule or rules to be printed.
?????? -n, --numeric
?????? Numeric??output.??IP addresses and port numbers will be printed
?????? in numeric format.??By default, the program will try to??display
?????? them??as host names, network names, or services (whenever appli-
?????? cable).
?????? -x, --exact
?????? Expand numbers.??Display the exact value of the packet and??byte
?????? counters,??instead??of only the rounded number in K's (multiples
?????? of 1000) M's (multiples of 1000K) or G's (multiples??of??1000M).
?????? This option is only relevant for the -L command.
?????? --line-numbers
?????? When??listing??rules,??add line numbers to the beginning of each
?????? rule, corresponding to that rule's position in the chain.
?????? --modprobe=command
?????? When adding or inserting rules into a chain, use command to load
?????? any necessary modules (targets, match extensions, etc).
MATCH EXTENSIONS
?????? iptables can use extended packet matching modules.??These are loaded in
?????? two ways: implicitly, when -p or --protocol is specified, or??with??the
?????? -m??or??--match options,??followed??by the matching module name; after
?????? these, various extra command line options become??available,??depending
?????? on??the specific module.??You can specify multiple extended match mod-
?????? ules in one line, and you can use the -h or --help??options??after??the
?????? module has been specified to receive help specific to that module.
?????? The??following??are included in the base package, and most of these can
?????? be preceded by a !??to invert the sense of the match.
?? account
?????? Account traffic for all hosts in defined network/netmask.
?????? Features:
?????? - long (one counter per protocol TCP/UDP/IMCP/Other) and short??statis-
?????? tics
?????? - one iptables rule for all hosts in network/netmask
?????? - loading/saving counters (by reading/writting to procfs entries)

?????? --aaddr network/netmask
?????? defines network/netmask for which make statistics.
?????? --aname name
?????? defines??name??of??list??where statistics will be kept. If no is
?????? specified DEFAULT will be used.
?????? --ashort
?????? table will colect only short??statistics (only??total??counters
?????? without splitting it into protocols.
?????? Example usage:
?????? account traffic for/to 192.168.0.0/24 network into table mynetwork:
?????? #?? iptables?? -A?? FORWARD?? -m?? account??--aname??mynetwork??--aaddr
?????? 192.168.0.0/24
?????? account traffic for/to WWW serwer for 192.168.0.0/24 network into table
?????? mywwwserver:
?????? # iptables -A INPUT -p tcp --dport 80
??-m account --aname mywwwserver --aaddr 192.168.0.0/24 --ashort
?????? # iptables -A OUTPUT -p tcp --sport 80
??-m account --aname mywwwserver --aaddr 192.168.0.0/24 --ashort
?????? read counters:
?????? # cat????/proc/net/ipt_account/mynetwork?? #????cat
?????? /proc/net/ipt_account/mywwwserver
?????? set counters:
?????? #????echo????"ip????= 192.168.0.1 packets_src =???? 0"???? >
?????? /proc/net/ipt_account/mywwserver
?????? Webpage:
??[url]http://www.barbara.eu.org/~quaker/ipt_account/[/url]
?? addrtype
?????? This module matches packets based on their address type.??Address types
?????? are used within the kernel networking stack??and??categorize??addresses
?????? into various groups.??The exact definition of that group depends on the
?????? specific layer three protocol.
?????? The following address types are possible:
?????? UNSPEC an unspecified address (i.e. 0.0.0.0) UNICAST an unicast address
?????? LOCAL??a local address BROADCAST a broadcast address ANYCAST an
?????? anycast packet MULTICAST a multicast address BLACKHOLE a black-
?????? hole??address UNREACHABLE an unreachable address PROHIBIT a pro-
?????? hibited address THROW FIXME NAT FIXME XRESOLVE FIXME
?????? --src-type type
?????? Matches if the source address is of given type
?????? --dst-type type
?????? Matches if the destination address is of given type
?? ah
?????? This module matches the SPIs in Authentication header of IPsec packets.
?????? --ahspi [!] spi[:spi]
?? childlevel
?????? This??is??an??experimental module.??It matches on whether the packet is
?????? part of a master connection or one of its children??(or grandchildren,
?????? etc).?? For??instance,??most packets are level 0.??FTP data transfer is
?????? level 1.
?????? --childlevel [!] level
?? comment
?????? Allows you to add comments (up to 256 characters) to any rule.
?????? --comment comment
?????? Example:
?????? iptables -A INPUT -s 192.168.0.0/16 -m comment --comment "A pri-
?????? vatized IP block"
?? condition
?????? This matches if a specific /proc filename is '0' or '1'.
?????? --condition [!] filename
?????? Match??on??boolean value stored in /proc/net/ipt_condition/file-
?????? name file
?? connbytes
?????? Match by how many bytes or packets a connection (or??one??of??the??two
?????? flows??constituting the connection) have tranferred so far, or by aver-
?????? age bytes per packet.
?????? The counters are 64bit and are thus not expected to overflow ;)
?????? The primary use is to detect long-lived downloads and mark them to??be
?????? scheduled using a lower priority band in traffic control.
?????? The??transfered bytes??per??connection can??also??be??viewed??through
?????? /proc/net/ip_conntrack and accessed via ctnetlink
?????? [!] --connbytes from:[to]
?????? match packets??from??a??connection??whose??packets/bytes/average
?????? packet size is more than FROM and less than TO bytes/packets. if
?????? TO is omitted only FROM check is done.??"!"??is??used??to??match
?????? packets not falling in the range.
?????? --connbytes-dir [original|reply|both]
?????? which packets to consider
?????? --connbytes-mode [packets|bytes|avgpkt]
?????? whether??to??check the amount of packets, number of bytes trans-
?????? ferred or the average size (in bytes) of all packets received so
?????? far.??Note??that when "both" is used together with "avgpkt", and
?????? data is going (mainly) only in one direction (for example HTTP),
?????? the??average??packet??size will be about half of the actual data
?????? packets.
?????? Example:
?????? iptables .. -m connbytes --connbytes??10000:100000??--connbytes-
?????? dir both --connbytes-mode bytes ...
?? connlimit
?????? Allows??you??to restrict??the??number of parallel TCP connections to a
?????? server per client IP address (or address block).
?????? [!] --connlimit-above n
?????? match if the number of existing tcp connections is (not) above n
?????? --connlimit-mask bits
?????? group hosts using mask
?????? Examples:
?????? # allow 2 telnet connections per client host
?????? iptables -p tcp --syn --dport 23 -m connlimit --connlimit-above
?????? 2 -j REJECT
?????? # you can also match the other way around:
?????? iptables -p tcp --syn --dport 23 -m??connlimit??!??--connlimit-
?????? above 2 -j ACCEPT
?????? #??limit??the nr of parallel http requests to 16 per class C sized net-
?????? work (24 bit netmask)
?????? iptables -p tcp --syn --dport 80 -m connlimit --connlimit-above
?????? 16 --connlimit-mask 24 -j REJECT
?? connmark
?????? This module matches the netfilter mark field associated with a??connec-
?????? tion (which can be set using the CONNMARK target below).
?????? --mark value[/mask]
?????? Matches??packets in connections with the given mark value (if a
?????? mask is specified, this is logically ANDed with the mark before
?????? the comparison).
?? connrate
?????? This module matches the current transfer rate in a connection.
?????? --connrate [!] [from]:[to]
?????? Match??against the current connection transfer rate being within
?????? 'from' and 'to' bytes per second. When the "!" argument is??used
?????? before the range, the sense of the match is inverted.
?? conntrack
?????? This??module,??when combined with connection tracking, allows access to
?????? more connection tracking information than??the??"state" match.??(this
?????? module is present only if iptables was compiled under a kernel support-
?????? ing this feature)
?????? --ctstate state
?????? Where state is a comma separated list of the??connection states
?????? to??match.?? Possible states are INVALID meaning that the packet
?????? is associated with no known connection, ESTABLISHED meaning that
?????? the??packet is associated with a connection which has seen pack-
?????? ets in both directions, NEW meaning that the packet has??started
?????? a??new??connection,??or??otherwise??associated with a connection
?????? which has not seen packets in both directions, and RELATED mean-
?????? ing that the packet is starting a new connection, but is associ-
?????? ated with an existing connection, such as an FTP data??transfer,
?????? or??an ICMP error.??SNAT A virtual state, matching if the origi-
?????? nal source address differs from the reply destination.?? DNAT??A
?????? virtual state, matching if the original destination differs from
?????? the reply source.
?????? --ctproto proto
?????? Protocol to match (by number or name)
?????? --ctorigsrc [!] address[/mask]
?????? Match against original source address
?????? --ctorigdst [!] address[/mask]
?????? Match against original destination address
?????? --ctreplsrc [!] address[/mask]
?????? Match against reply source address
?????? --ctrepldst [!] address[/mask]
?????? Match against reply destination address
?????? --ctstatus [NONE|EXPECTED|SEEN_REPLY|ASSURED][,...]
?????? Match against internal conntrack states
?????? --ctexpire time[:time]
?????? Match remaining lifetime in seconds against given value or range
?????? of values (inclusive)
?? dccp
?????? --source-port,--sport [!] port[:port]
?????? --destination-port,--dport [!] port[:port]
?????? --dccp-types [!] mask
?????? Match??when??the DCCP packet type is one of 'mask'. 'mask' is a
?????? comma-separated list of packet types.??Packet types are: REQUEST
?????? RESPONSE DATA??ACK??DATAACK??CLOSEREQ??CLOSE RESET SYNC SYNCACK
?????? INVALID.
?????? --dccp-option [!] number
?????? Match if DCP option set.
?? dscp
?????? This module matches the 6 bit DSCP field within the TOS field in the IP
?????? header. DSCP has superseded TOS within the IETF.
?????? --dscp value
?????? Match against a numeric (decimal or hex) value [0-32].
?????? --dscp-class DiffServ Class
?????? Match??the??DiffServ class. This value may be any of the BE, EF,
?????? AFxx or CSx classes.?? It??will??then??be??converted??into??it's
?????? according numeric value.
?? dstlimit
?????? This??module??allows you to limit the packet per second (pps) rate on a
?????? per destination IP or per destination port base.?? As??opposed??to??the
?????? 'limit' match, every??destination??ip / destination port has it's own
?????? limit.
?????? THIS MODULE IS DEPRECATED AND HAS BEEN REPLACED BY ''hashlimit''
?????? --dstlimit avg
?????? Maximum average match rate (packets per second??unless??followed
?????? by /sec /minute /hour /day postfixes).
?????? --dstlimit-mode mode
?????? The limiting hashmode.??Is the specified limit per dstip, dstip-
?????? dstport tuple,??srcip-dstip??tuple,??or??per??srcipdstip-dstport
?????? tuple.
?????? --dstlimit-name name
?????? Name for /proc/net/ipt_dstlimit/* file entry
?????? [--dstlimit-burst burst]
?????? Number of packets to match in a burst.??Default: 5
?????? [--dstlimit-htable-size size]
?????? Number of buckets in the hashtable
?????? [--dstlimit-htable-max max]
?????? Maximum number of entries in the hashtable
?????? [--dstlimit-htable-gcinterval interval]
?????? Interval between??garbage??collection runs of the hashtable (in
?????? miliseconds).??Default is 1000 (1 second).
?????? [--dstlimit-htable-expire time
?????? After which time are idle entries??expired??from hashtable??(in
?????? miliseconds)???Default is 10000 (10 seconds).
?? ecn
?????? This??allows you to match the ECN bits of the IPv4 and TCP header.??ECN
?????? is the Explicit Congestion??Notification??mechanism??as??specified??in
?????? RFC3168
?????? --ecn-tcp-cwr
?????? This matches if the TCP ECN CWR (Congestion Window Received) bit
?????? is set.
?????? --ecn-tcp-ece
?????? This matches if the TCP ECN ECE (ECN Echo) bit is set.
?????? --ecn-ip-ect num
?????? This matches a particular IPv4 ECT (ECN-Capable Transport).??You
?????? have to specify a number between '0' and '3'.
?? esp
?????? This module matches the SPIs in ESP header of IPsec packets.
?????? --espspi [!] spi[:spi]
?? fuzzy
?????? This??module??matches??a??rate??limit based on a fuzzy logic controller
?????? [FLC]
?????? --lower-limit number
?????? Specifies the lower limit (in packets per second).
?????? --upper-limit number
?????? Specifies the upper limit (in packets per second).
?? hashlimit
?????? This patch adds a new match called 'hashlimit'. The idea??is??to??have
?????? something??like 'limit',??but??either??per destination-ip or per (des-
?????? tip,destport) tuple.
?????? It gives you the ability to express
????????'1000 packets per second for every host in 192.168.0.0/16'
????????'100 packets per second for every service of 192.168.1.1'
?????? with a single iptables rule.
?????? --hashlimit rate
?????? A rate just like the limit match
?????? --hashlimit-burst num
?????? Burst value, just like limit match
?????? --hashlimit-mode destip | destip-destport
?????? Limit per IP or per port
?????? --hashlimit-name foo
?????? The name for the /proc/net/ipt_hashlimit/foo entry
?????? --hashlimit-htable-size num
?????? The number of buckets of the hash table
?????? --hashlimit-htable-max num
?????? Maximum entries in the hash
?????? --hashlimit-htable-expire num
?????? After how many miliseconds do hash entries expire
?????? --hashlimit-htable-gcinterval num
?????? How many miliseconds between garbage collection intervals
?? helper
?????? This module matches packets related to a specific conntrack-helper.
?????? --helper string
?????? Matches packets related to the specified conntrack-helper.
?????? string can be "ftp" for packets??related to??a??ftp-session??on
?????? default??port.??For other ports append -portnr to the value, ie.
?????? "ftp-2121".
?????? Same rules apply for other conntrack-helpers.
?? icmp
?????? This extension is loaded if '--protocol icmp' is??specified.?? It??pro-
?????? vides the following option:
?????? --icmp-type [!] typename
?????? This??allows??specification??of??the??ICMP??type, which can be a
?????? numeric ICMP type, or one of the ICMP type names shown??by??the
?????? command
????????iptables -p icmp -h
?? iprange
?????? This matches on a given arbitrary range of IPv4 addresses
?????? [!]--src-range ip-ip
?????? Match source IP in the specified range.
?????? [!]--dst-range ip-ip
?????? Match destination IP in the specified range.
?? ipv4options
?????? Match??on IPv4 header options like source routing, record route, times-
?????? tamp and router-alert.
?????? --***r To match packets with the flag strict source routing.
?????? --lsrr To match packets with the flag loose source routing.
?????? --no-srr
?????? To match packets with no flag for source routing.
?????? [!] --rr
?????? To match packets with the RR flag.
?????? [!] --ts
?????? To match packets with the TS flag.
?????? [!] --ra
?????? To match packets with the router-alert option.
?????? [!] --any-opt
?????? To match a packet with at least one IP option, or no??IP option
?????? at all if ! is chosen.
?????? Examples:
?????? $ iptables -A input -m ipv4options --rr -j Drop
?????? will drop packets with the record-route flag.
?????? $ iptables -A input -m ipv4options --ts -j Drop
?????? will drop packets with the timestamp flag.
?? length
?????? This??module matches the length of a packet against a specific value or
?????? range of values.
?????? --length [!] length[:length]
?? limit
?????? This module matches at a limited rate using a token bucket??filter.?? A
?????? rule??using??this??extension??will??match??until??this limit is reached
?????? (unless the '!' flag is used).??It can be used in combination with??the
?????? LOG target to give limited logging, for example.
?????? --limit rate
?????? Maximum??average matching??rate: specified as a number, with an
?????? optional '/second', '/minute', '/hour', or??'/day'??suffix;??the
?????? default is 3/hour.
?????? --limit-burst number
?????? Maximum??initial number of??packets to match: this number gets
?????? recharged by one every time the limit??specified above??is??not
?????? reached, up to this number; the default is 5.
?? mac
?????? --mac-source [!] address
?????? Match?? source?? MAC?? address.??It?? must?? be??of??the??form
?????? XX:XX:XX:XX:XX:XX.??Note that this only makes sense for??packets
?????? coming from an Ethernet device and entering the PREROUTING, FOR-
?????? WARD or INPUT chains.
?? mark
?????? This module matches the netfilter mark field associated with??a packet
?????? (which can be set using the MARK target below).
?????? --mark value[/mask]
?????? Matches packets with the given unsigned mark value (if a mask is
?????? specified, this is logically ANDed with the mask before the com-
?????? parison).
?? mport
?????? This??module??matches??a??set of source or destination ports.??Up to 15
?????? ports can be specified. It can only be used in conjunction with -p tcp
?????? or -p udp.
?????? --source-ports port[,port[,port...]]
?????? Match??if??the??source port is one of the given ports.??The flag
?????? --sports is a convenient alias for this option.
?????? --destination-ports port[,port[,port...]]
?????? Match if the destination port is one of the??given??ports.?? The
?????? flag --dports is a convenient alias for this option.
?????? --ports port[,port[,port...]]
?????? Match??if the both the source and destination ports are equal to
?????? each other and to one of the given ports.
?? multiport
?????? This module matches a set of source or destination??ports.?? Up to??15
?????? ports??can be specified.??A port range (port:port) counts as two ports.
?????? It can only be used in conjunction with -p tcp or -p udp.
?????? --source-ports [!] port[,port[,port:port...]]
?????? Match if the source port is one of the given??ports.?? The??flag
?????? --sports is a convenient alias for this option.
?????? --destination-ports [!] port[,port[,port:port...]]
?????? Match??if??the??destination port is one of the given ports.??The
?????? flag --dports is a convenient alias for this option.
?????? --ports [!] port[,port[,port:port...]]
?????? Match if either the source or destination ports are equal to one
?????? of the given ports.
?? nth
?????? This module matches every 'n'th packet
?????? --every value
?????? Match every 'value' packet
?????? [--counter num]
?????? Use internal counter number 'num'.??Default is '0'.
?????? [--start num]
?????? Initialize the counter at the number 'num' insetad of '0'.??Most
?????? between '0' and 'value'-1.
?????? [--packet num]
?????? Match on 'num' packet.??Most be between '0' and 'value'-1.
?? osf
?????? The idea of passive OS fingerprint matching exists??for quite??a??long
?????? time,??but??was created as extension fo OpenBSD pf only some weeks ago.
?????? original??idea??was??lurked??in some??OpenBSD??mailing list?? (thanks
?????? grange@open...) and??than??adopted for Linux netfilter in form of this
?????? code.
?????? original?? fingerprint table was?? created by?? Michal?? Zalewski
?????? <[email]lcamtuf@coredump.cx[/email]>.
?????? This module compares some data(WS, MSS, options and it's order, ttl, df
?????? and others) from first SYN packet (actually from packets with??SYN??bit
?????? set) with dynamically loaded OS fingerprints.
?????? --log 1/0
?????? If??present,??OSF??will log determined genres even if they don't
?????? match desired one.????0 - log all determined entries, 1??-??only
?????? first one.
?????? In syslog you find something like this:
?????? ipt_osf: Windows??[2000:SP3:Windows??XP Pro??SP1,??2000??SP3]:
?????? 11.22.33.55:4024 -> 11.22.33.44:139
?????? ipt_osf:?????? Unknown:????????16384:106:1:48:020405B401010402
?????? 44.33.22.11:1239 -> 11.22.33.44:80
?????? --smart
?????? if??present, OSF will use some smartness to determine remote OS.
?????? OSF will use initial TTL only if source of connection is in??our
?????? local network.
?????? --netlink
?????? If??present,??OSF??will??log??all??events??also??through netlink
?????? NETLINK_NFLOG groupt 1.
?????? --genre [!] string
?????? Match a OS genre by passive fingerprinting
?????? Example:
?????? #iptables -I INPUT -j ACCEPT -p tcp??-m??osf??--genre??Linux??--log??1
?????? --smart
?????? NOTE: -p tcp is obviously required as it is a TCP match.
?????? Fingerprints??can??be??loaded??and??read through /proc/sys/net/ipv4/osf
?????? file.??One can flush all fingerprints with following command:
?????? echo -en FLUSH > /proc/sys/net/ipv4/osf
?????? Only one fingerprint per open/write/close.
?????? Fingerprints??can??be?? downloaded?? from?? [url]http://www.openbsd.org/cgi-[/url]
?????? bin/cvsweb/src/etc/pf.os
?? owner
?????? This??module??attempts??to??match various characteristics of the packet
?????? creator, for locally-generated packets. It is only valid in the OUTPUT
?????? chain,??and??even??this some packets (such as ICMP ping responses) may
?????? have no owner, and hence never match.
?????? --uid-owner userid
?????? Matches if the packet was created by a process??with??the??given
?????? effective user id.
?????? --gid-owner groupid
?????? Matches??if??the packet was created by a process with the given
?????? effective group id.
?????? --pid-owner processid
?????? Matches if the packet was created by a process??with??the??given
?????? process id.
?????? --sid-owner sessionid
?????? Matches if the packet was created by a process in the given ses-
?????? sion group.
?????? --cmd-owner name
?????? Matches if the packet was created by a process??with??the??given
?????? command name.??(this option is present only if iptables was com-
?????? piled under a kernel supporting this feature)
?????? NOTE: pid, sid and command matching are broken on SMP
?? physdev
?????? This module matches??on the??bridge??port??input??and??output??devices
?????? enslaved??to??a bridge device. This module is a part of the infrastruc-
?????? ture that enables a transparent bridging IP firewall and is only useful
?????? for kernel versions above version 2.5.44.
?????? --physdev-in [!] name
?????? Name??of a bridge port via which a packet is received (only for
?????? packets entering the INPUT, FORWARD and PREROUTING??chains).??If
?????? the??interface??name??ends??in??a??"+", then any interface which
?????? begins with this name will match. If the packet didn't arrive
?????? through??a??bridge??device, this packet won't match this option,
?????? unless '!' is used.
?????? --physdev-out [!] name
?????? Name of a bridge port via which a packet is??going??to??be??sent
?????? (for??packets??entering??the??FORWARD,??OUTPUT??and??POSTROUTING
?????? chains). If the interface name ends in a "+", then??any inter-
?????? face??which??begins??with this name will match. Note that in the
?????? nat and mangle OUTPUT chains one cannot match on the bridge out-
?????? put??port,??however??one can in the filter OUTPUT chain. If the
?????? packet won't leave by a bridge device or it is yet unknown??what
?????? the??output??device??will??be,??then the packet won't match this
?????? option, unless
?????? [!] --physdev-is-in
?????? Matches if the packet has entered through a bridge interface.
?????? [!] --physdev-is-out
?????? Matches if the packet will leave through a bridge interface.
?????? [!] --physdev-is-bridged
?????? Matches if the packet is being??bridged??and??therefore??is??not
?????? being??routed.??This is only useful in the FORWARD and POSTROUT-
?????? ING chains.
?? pkttype
?????? This module matches the link-layer packet type.
?????? --pkt-type [unicast|broadcast|multicast]
?? policy
?????? This modules matches the policy used by IPsec for handling a packet.
?????? --dir in|out
?????? Used to select whether to match the policy used??for??decapsula-
?????? tion??or the policy that will be used for encapsulation.??in is
?????? valid in the PREROUTING, INPUT and FORWARD chains, out is??valid
?????? in the POSTROUTING, OUTPUT and FORWARD chains.
?????? --pol none|ipsec
?????? Matches if the packet is subject to IPsec processing.
?????? --strict
?????? Selects??whether to match the exact policy or match if any rule
?????? of the policy matches the given policy.
?????? --reqid id
?????? Matches the reqid of the policy rule. The reqid can be specified
?????? with setkey(8) using unique:id as level.
?????? --spi spi
?????? Matches the SPI of the SA.
?????? --proto ah|esp|ipcomp
?????? Matches the encapsulation protocol.
?????? --mode tunnel|transport
?????? Matches the encapsulation mode.
?????? --tunnel-src addr[/mask]
?????? Matches??the source end-point address of a tunnel mode SA.??Only
?????? valid with --mode tunnel.
?????? --tunnel-dst addr[/mask]
?????? Matches the destination end-point address of a tunnel??mode??SA.
?????? Only valid with --mode tunnel.
?????? --next Start??the next element in the policy specification. Can only be
?????? used with --strict
?? psd
?????? Attempt to detect TCP and UDP port scans. This match was??derived??from
?????? Solar Designer's scanlogd.
?????? --psd-weight-threshold threshold
?????? Total weight of the latest TCP/UDP packets with different desti-
?????? nation ports coming from the same host to??be??treated??as??port
?????? scan sequence.
?????? --psd-delay-threshold delay
?????? Delay??(in??hundredths of second) for the packets with different
?????? destination ports coming from the same host??to??be??treated??as
?????? possible port scan subsequence.
?????? --psd-lo-ports-weight weight
?????? Weight??of the packet with privileged (<=1024) destination port.
?????? --psd-hi-ports-weight weight
?????? Weight of the packet with non-priviliged destination port.
?? quota
?????? Implements network quotas by decrementing??a??byte??counter??with??each
?????? packet.
?????? --quota bytes
?????? The quota in bytes.
?????? KNOWN BUGS: this does not work on SMP systems.
?? random
?????? This module randomly matches a certain percentage of all packets.
?????? --average percent
?????? Matches??the given percentage.??If omitted, a probability of 50%
?????? is set.
?? realm
?????? This matches the routing realm. Routing realms are??used??in??complex
?????? routing setups involving dynamic routing protocols like BGP.
?????? --realm [!]value[/mask]
?????? Matches a given realm number (and optionally mask).
?? recent
?????? Allows??you to dynamically create a list of IP addresses and then match
?????? against that list in a few different ways.
?????? For example, you can create a 'badguy' list out of people attempting to
?????? connect to??port 139 on your firewall and then Drop all future packets
?????? from them without considering them.
?????? --name name
?????? Specify the list to use for the commands. If no??name??is??given
?????? then 'DEFAULT' will be used.
?????? [!] --set
?????? This??will??add the source address of the packet to the list. If
?????? the source address is already in the list, this will update??the
?????? existing entry. This will always return success (or failure if
?????? '!' is passed in).
?????? [!] --rcheck
?????? Check if the source address of the packet is??currently??in??the
?????? list.
?????? [!] --update
?????? Like??--rcheck,??except it will update the "last seen" timestamp
?????? if it matches.
?????? [!] --remove
?????? Check if the source address of the packet is??currently??in??the
?????? list??and??if??so that address will be removed from the list and
?????? the rule will return true. If the address is not found, false is
?????? returned.
?????? [!] --seconds seconds
?????? This??option must be used in conjunction with one of --rcheck or
?????? --update. When used, this will narrow the match to??only happen
?????? when??the??address??is??in the list and was seen within the last
?????? given number of seconds.
?????? [!] --hitcount hits
?????? This option must be used in conjunction with one of --rcheck??or
?????? --update.??When??used, this will narrow the match to only happen
?????? when the address is in the list and packets??had been??received
?????? greater??than??or??equal to the given value. This option may be
?????? used along with --seconds??to??create??an??even??narrower??match
?????? requiring a certain number of hits within a specific time frame.
?????? --rttl This option must be used in conjunction with one of --rcheck??or
?????? --update.??When??used, this will narrow the match to only happen
?????? when the address is in the list??and??the??TTL??of??the??current
?????? packet matches that of the packet which hit the --set rule. This
?????? may be useful if you have??problems??with??people??faking??their
?????? source??address in order to DoS you via this module by disallow-
?????? ing others access to your site by sending bogus packets to??you.
?????? Examples:
?????? # iptables -A FORWARD -m recent --name badguy --rcheck --seconds
?????? 60 -j Drop
?????? # iptables -A FORWARD -p tcp??-i eth0??--dport??139??-m recent
?????? --name badguy --set -j Drop
?????? Official??website??([url]http://snowman.net/projects/ipt_recent/[/url])??also??has
?????? some examples of usage.
?????? /proc/net/ipt_recent/* are the current lists of addresses and??informa-
?????? tion about each entry of each list.
?????? Each??file in /proc/net/ipt_recent/ can be read from to see the current
?????? list or written two using the following commands to modify the list:
?????? echo xx.xx.xx.xx > /proc/net/ipt_recent/DEFAULT
?????? to Add to the DEFAULT list
?????? echo -xx.xx.xx.xx > /proc/net/ipt_recent/DEFAULT
?????? to Remove from the DEFAULT list
?????? echo clear > /proc/net/ipt_recent/DEFAULT
?????? to empty the DEFAULT list.
?????? The module itself accepts parameters, defaults shown:
?????? ip_list_tot=100
?????? Number of addresses remembered per table
?????? ip_pkt_list_tot=20
?????? Number of packets per address remembered
?????? ip_list_hash_size=0
?????? Hash table size. 0 means to calculate it based??on??ip_list_tot,
?????? default: 512
?????? ip_list_perms=0644
?????? Permissions for /proc/net/ipt_recent/* files
?????? debug=0
?????? Set to 1 to get lots of debugging info
?? sctp
?????? --source-port,--sport [!] port[:port]
?????? --destination-port,--dport [!] port[:port]
?????? --chunk-types [!] all|any|only chunktype[:flags] [...]
?????? The??flag??letter??in??upper??case indicates that the flag is to
?????? match if set, in the lower case indicates to match if unset.
?????? Chunk types: DATA INIT??INIT_ACK SACK??HEARTBEAT??HEARTBEAT_ACK
?????? ABORT?? SHUTDOWN??SHUTDOWN_ACK ERROR??COOKIE_ECHO??COOKIE_ACK
?????? ECN_ECNE ECN_CWR SHUTDOWN_COMPLETE ASCONF ASCONF_ACK
?????? chunk type???? available flags
?????? DATA??????U B E u b e
?????? ABORT??????T t
?????? SHUTDOWN_COMPLETE???? T t
?????? (lowercase means flag should be "off", uppercase means "on")
?????? Examples:
?????? iptables -A INPUT -p sctp --dport 80 -j Drop
?????? iptables -A INPUT -p sctp --chunk-types any DATA,INIT -j Drop
?????? iptables -A INPUT -p sctp --chunk-types any DATA:Be -j ACCEPT
?? set
?????? This modules macthes IP sets which can be defined by ipset(8).
?????? --set setname flag[,flag...]
?????? where flags are src and/or dst and there can be no more than six
?????? of them. Hence the command
????????iptables -A FORWARD -m set --set test src,dst
?????? will match packets, for which (depending on the type of the set)
?????? the source address or port number of the packet can be found??in
?????? the specified set. If there is a binding belonging to the mached
?????? set element or there is a default binding??for??the??given??set,
?????? then??the??rule??will??match??the??packet??only??if additionally
?????? (depending on the type of the set) the??destination??address??or
?????? port??number??of the packet can be found in the set according to
?????? the binding.
?? state
?????? This module, when combined with connection tracking, allows??access??to
?????? the connection tracking state for this packet.
?????? --state state
?????? Where??state??is a comma separated list of the connection states
?????? to match.??Possible states are INVALID meaning that??the packet
?????? could??not??be identified for some reason which includes running
?????? out of memory and ICMP errors??which??don't??correspond??to??any
?????? known connection, ESTABLISHED meaning that the packet is associ-
?????? ated with a connection which has seen??packets??in??both direc-
?????? tions, NEW meaning that the packet has started a new connection,
?????? or otherwise associated with a connection??which has??not??seen
?????? packets??in both directions, and RELATED meaning that the packet
?????? is starting a new connection, but is associated with an existing
?????? connection, such as an FTP data transfer, or an ICMP error.
?? string
?????? This??modules??matches??a??given??string by using some pattern matching
?????? strategy. It requires a linux kernel >= 2.6.14.
?????? --algo??bm|kmp
?????? Select the pattern matching strategy. (bm = Boyer-Moore, kmp??=
?????? Knuth-Pratt-Morris)
?????? --from offset
?????? Set the offset from which it starts looking for any matching. If
?????? not passed, default is 0.
?????? --to offset
?????? Set the offset from which it starts looking for any matching. If
?????? not passed, default is the packet size.
?????? --string pattern
?????? Matches??the??given??pattern.?? --hex-string pattern Matches the
?????? given pattern in hex notation.
?? tcp
?????? These extensions are loaded if '--protocol tcp' is specified.??It??pro-
?????? vides the following options:
?????? --source-port [!] port[:port]
?????? Source??port??or port range specification. This can either be a
?????? service name or a port number. An inclusive range??can??also??be
?????? specified,??using??the??format??port:port.??If the first port is
?????? omitted, "0" is assumed; if the??last??is??omitted,??"65535"??is
?????? assumed. If the second port greater then the first they will be
?????? swapped. The flag??--sport??is??a??convenient??alias??for??this
?????? option.
?????? --destination-port [!] port[:port]
?????? Destination??port or port range specification.??The flag --dport
?????? is a convenient alias for this option.
?????? --tcp-flags [!] mask comp
?????? Match when the TCP flags are as specified.??The??first??argument
?????? is??the??flags which we should examine, written as a comma-sepa-
?????? rated list, and the second argument is a comma-separated list of
?????? flags which must be set. Flags are: SYN ACK FIN RST URG PSH ALL
?????? NONE.??Hence the command
????????iptables -A FORWARD -p tcp --tcp-flags SYN,ACK,FIN,RST SYN
?????? will only match packets with the SYN flag set, and the ACK,??FIN
?????? and RST flags unset.
?????? [!] --syn
?????? Only??match TCP packets with the SYN bit set and the ACK,RST and
?????? FIN bits cleared.??Such packets are used to request TCP??connec-
?????? tion initiation; for example, blocking such packets coming in an
?????? interface will prevent incoming TCP??connections,??but??outgoing
?????? TCP??connections will be unaffected.??It is equivalent to --tcp-
?????? flags??SYN,RST,ACK,FIN??SYN.?? If??the??"!"??flag??precedes??the
?????? "--syn", the sense of the option is inverted.
?????? --tcp-option [!] number
?????? Match if TCP option set.
?????? --mss value[:value]
?????? Match??TCP??SYN??or SYN/ACK packets with the specified MSS value
?????? (or range), which control the maximum packet size for that??con-
?????? nection.
?? tcpmss
?????? This??matches??the??TCP MSS??(maximum??segment size) field of the TCP
?????? header. You can only use this on TCP SYN or SYN/ACK packets, since the
?????? MSS??is only negotiated during the TCP handshake at connection startup
?????? time.
?????? [!] --mss value[:value]"
?????? Match a given TCP MSS value or range.
?? time
?????? This matches if the packet arrival time/date is within a??given range.
?????? All options are facultative.
--timestart value
?????? Match??only??if??it is after 'value' (Inclusive, format: HH:MM ;
?????? default 00:00).
?????? --timestop??value
?????? Match only if it is before 'value' (Inclusive, format:??HH:MM??;
?????? default 23:59).
?????? --days listofdays
?????? Match??only??if??today??is??one??of??the given??days.??(format:
?????? Mon,Tue,Wed,Thu,Fri,Sat,Sun ; default everyday)
?????? --datestart date
?????? Match??only??if??it??is after 'date'??(Inclusive,?? format:
?????? YYYY[:MM[:DD[:hh[:mm[:ss]]]]]??; h,m,s start from 0 ; default to
?????? 1970)
?????? --datestop date
?????? Match??only??if??it??is??before 'date'??(Inclusive,?? format:
?????? YYYY[:MM[:DD[:hh[:mm[:ss]]]]]??; h,m,s start from 0 ; default to
?????? 2037)
?? tos
?????? This module matches the 8 bits of Type??of??Service??field??in??the??IP
?????? header (ie. including the precedence bits).
?????? --tos tos
?????? The argument is either a standard name, (use
????????iptables -m tos -h
?????? to see the list), or a numeric value to match.
?? ttl
?????? This module matches the time to live field in the IP header.
?????? --ttl-eq ttl
?????? Matches the given TTL value.
?????? --ttl-gt ttl
?????? Matches if TTL is greater than the given TTL value.
?????? --ttl-lt ttl
?????? Matches if TTL is less than the given TTL value.
?? u32
?????? U32??allows??you??to extract quantities of up to 4 bytes from a packet,
?????? AND them with specified masks, shift them by specified amounts and test
?????? whether the results are in any of a set of specified ranges.??The spec-
?????? ification of what to extract is general enough??to??skip??over??headers
?????? with lengths stored in the packet, as in IP or TCP header lengths.
?????? Details and examples are in the kernel module source.
?? udp
?????? These??extensions are loaded if '--protocol udp' is specified.??It pro-
?????? vides the following options:
?????? --source-port [!] port[:port]
?????? Source port or port range specification. See the description of
?????? the --source-port option of the TCP extension for details.
?????? --destination-port [!] port[:port]
?????? Destination??port or port range specification.??See the descrip-
?????? tion of the --destination-port option of the TCP extension??for
?????? details.
?? unclean
?????? This??module takes no options, but attempts to match packets which seem
?????? malformed or unusual.??This is regarded as experimental.
TARGET EXTENSIONS
?????? iptables can use extended target modules: the following are included in
?????? the standard distribution.
?? BALANCE
?????? This??allows??you to DNAT connections in a round-robin way over a given
?????? range of destination addresses.
?????? --to-destination ipaddr-ipaddr
?????? Address range to round-robin over.
?? CLASSIFY
?????? This module allows you to set the skb->priority value (and??thus??clas-
?????? sify the packet into a specific CBQ class).
?????? --set-class MAJOR:MINOR
?????? Set the major and minor class value.
?? CLUSTERIP
?????? This??module??allows??you??to??configure a simple cluster of nodes that
?????? share a certain IP and MAC address without an explicit load balancer in
?????? front??of??them.?? Connections??are??statically distributed between the
?????? nodes in this cluster.
?????? --new??Create a new ClusterIP.??You always have to??set??this??on??the
?????? first rule for a given ClusterIP.
?????? --hashmode mode
?????? Specify??the hashing mode.??Has to be one of sourceip, sourceip-
?????? sourceport, sourceip-sourceport-destport
?????? --clustermac mac
?????? Specify the ClusterIP MAC address.??Has to be a link-layer??mul-
?????? ticast address
?????? --total-nodes num
?????? Number of total nodes within this cluster.
?????? --local-node num
?????? Local node number within this cluster.
?????? --hash-init rnd
?????? Specify the random seed used for hash initialization.
?? CONNMARK
?????? This module sets the netfilter mark value associated with a connection
?????? --set-mark mark[/mask]
?????? Set connection mark. If a mask is specified then only those bits
?????? set in the mask is modified.
?????? --save-mark [--mask mask]
?????? Copy the netfilter packet mark value to the connection mark.??If
?????? a mask is specified then only those bits are copied.
?????? --restore-mark [--mask mask]
?????? Copy the connection mark value to the packet. If a mask is spec-
?????? ified then only those bits are copied. This is only valid in the
?????? mangle table.
?? DNAT
?????? This??target is only valid in the nat table, in the PREROUTING and OUT-
?????? PUT chains, and user-defined chains which are only??called??from??those
?????? chains. It specifies that the destination address of the packet should
?????? be modified (and all future packets in this??connection will??also??be
?????? mangled),??and rules should cease being examined.??It takes one type of
?????? option:
?????? --to-destination ipaddr[-ipaddr][:port-port]
?????? which can specify a single new destination IP address, an inclu-
?????? sive??range of IP addresses, and optionally, a port range (which
?????? is only valid if the rule also specifies -p tcp or -p udp).?? If
?????? no port range is specified, then the destination port will never
?????? be modified.
?????? In Kernels up to 2.6.10 you??can add??several??--to-destination
?????? options. For those kernels, if you specify more than one desti-
?????? nation address, either via an address range??or??multiple??--to-
?????? destination??options, a simple round-robin (one after another in
?????? cycle) load??balancing??takes??place??between??these??addresses.
?????? Later??Kernels??(>= 2.6.11-rc1) don't have the ability to NAT to
?????? multiple ranges anymore.

?? DSCP
?????? This target allows to alter the value of the DSCP bits within??the??TOS
?????? header??of??the IPv4 packet.??As this manipulates a packet, it can only
?????? be used in the mangle table.
?????? --set-dscp value
?????? Set the DSCP field to a numerical value (can be decimal or hex)
?????? --set-dscp-class class
?????? Set the DSCP field to a DiffServ class.
?? ECN
?????? This target allows to selectively work around known ECN blackholes.??It
?????? can only be used in the mangle table.
?????? --ecn-tcp-remove
?????? Remove all ECN bits from the TCP header. Of course, it can only
?????? be used in conjunction with -p tcp.
?? IPMARK
?????? Allows you to mark a received packet basing on its IP address. This can
?????? replace many??mangle/mark??entries??with only one, if you use firewall
?????? based classifier.
?????? This target is to be used inside the mangle table, in??the??PREROUTING,
?????? POSTROUTING or FORWARD hooks.
?????? --addr src/dst
?????? Use source or destination IP address.
?????? --and-mask mask
?????? Perform bitwise 'and' on the IP address and this mask.
?????? --or-mask mask
?????? Perform bitwise 'or' on the IP address and this mask.
?????? The??order??of??IP??address??bytes??is reversed to meet "human order of
?????? bytes": 192.168.0.1 is 0xc0a80001. At first the 'and' operation is per-
?????? formed, then 'or'.
?????? Examples:
?????? We create a queue for each user, the queue number is adequate to the IP
?????? address of the user, e.g.: all packets going??to/from??192.168.5.2??are
?????? directed to 1:0502 queue, 192.168.5.12 -> 1:050c etc.
?????? We have one classifier rule:
?????? tc filter add dev eth3 parent 1:0 protocol ip fw
?????? Earlier we had many rules just like below:
?????? iptables -t mangle -A POSTROUTING -o eth3 -d 192.168.5.2 -j MARK
?????? --set-mark 0x10502
?????? iptables -t mangle -A POSTROUTING -o eth3 -d 192.168.5.3 -j MARK
?????? --set-mark 0x10503
?????? Using??IPMARK target we can replace all the mangle/mark rules with only
?????? one:
?????? iptables -t mangle -A POSTROUTING -o eth3 -j??IPMARK??--addr=dst
?????? --and-mask=0xffff --or-mask=0x10000
?????? On??the routers with hundreds of users there should be significant load
?????? decrease (e.g. twice).
?? IPV4OPTSSTRIP
?????? Strip all the IP options from a packet.
?????? The target doesn't take any option, and therefore is extremly??easy??to
?????? use :
?????? # iptables -t mangle -A PREROUTING -j IPV4OPTSSTRIP
?? LOG
?????? Turn??on??kernel??logging of matching packets.??When this option is set
?????? for a rule, the Linux kernel will print some information on all match-
?????? ing??packets??(like most IP header fields) via the kernel log (where it
?????? can be read with dmesg or syslogd(8)).??This is a "non-terminating tar-
?????? get",??i.e.??rule traversal continues at the next rule. So if you want
?????? to LOG the packets you refuse, use two separate rules??with??the??same
?????? matching criteria, first using target LOG then Drop (or REJECT).
?????? --log-level level
?????? Level of logging (numeric or see syslog.conf(5)).
?????? --log-prefix prefix
?????? Prefix??log messages with the specified prefix; up to 29 letters
?????? long, and useful for distinguishing messages in the logs.
?????? --log-tcp-sequence
?????? Log TCP sequence numbers. This is a security risk if the log??is
?????? readable by users.
?????? --log-tcp-options
?????? Log options from the TCP packet header.
?????? --log-ip-options
?????? Log options from the IP packet header.
?????? --log-uid
?????? Log the userid of the process which generated the packet.
?? MARK
?????? This??is??used??to??set the??netfilter mark value associated with the
?????? packet. It is only valid in the mangle table.??It can for??example??be
?????? used in conjunction with iproute2.
?????? --set-mark mark
?? MASQUERADE
?????? This??target??is only valid in the nat table, in the POSTROUTING chain.
?????? It should only be used with dynamically assigned??IP??(dialup)??connec-
?????? tions: if you have a static IP address, you should use the SNAT target.
?????? Masquerading is equivalent to specifying a mapping to the IP address of
?????? the??interface??the??packet??is going out, but also has the effect that
?????? connections are forgotten when the interface goes down.??This??is??the
?????? correct behavior??when the??next??dialup is unlikely to have the same
?????? interface address (and hence any established connections are lost??any-
?????? way).??It takes one option:
?????? --to-ports port[-port]
?????? This??specifies??a??range of source ports to use, overriding the
?????? default SNAT source port-selection heuristics (see above).??This
?????? is only valid if the rule also specifies -p tcp or -p udp.
?? MIRROR
?????? This??is??an experimental demonstration target which inverts the source
?????? and destination fields in the IP header and retransmits the packet.??It
?????? is??only??valid in the INPUT, FORWARD and PREROUTING chains, and user-
?????? defined chains which are only called from those chains. Note that??the
?????? outgoing??packets??are NOT seen by any packet filtering chains, connec-
?????? tion tracking or NAT, to avoid loops and other problems.
?? NETMAP
?????? This target allows you to statically map a whole network??of??addresses
?????? onto??another??network of addresses.??It can only be used from rules in
?????? the nat table.
?????? --to address[/mask]
?????? Network address to map to.??The resulting address will??be??con-
?????? structed in??the??following way: All 'one' bits in the mask are
?????? filled in from the new 'address'.??All bits that are zero in the
?????? mask are filled in from the original address.
?? NFQUEUE
?????? This??target??is an extension of the QUEUE target. As opposed to QUEUE,
?????? it allows you to put a packet into any specific queue, identified??by
?????? its 16-bit queue number.
?????? --queue-num value
?????? This??specifies the QUEUE number to use. Valud queue numbers are
?????? 0 to 65535. The default value is 0.
?????? It can only be used with Kernel versions??2.6.14??or??later,??since??it
?????? requires
?????? the nfnetlink_queue kernel support.
?? NOTRACK
?????? This target disables connection tracking for all packets matching??that
?????? rule.
?????? It can only be used in the
?????? raw table.
?? REDIRECT
?????? This??target is only valid in the nat table, in the PREROUTING and OUT-
?????? PUT chains, and user-defined chains which are only??called??from??those
?????? chains.??It redirects the packet to the machine itself by changing the
?????? destination IP??to??the primary??address??of??the??incoming??interface
?????? (locally-generated??packets??are??mapped to the 127.0.0.1 address).??It
?????? takes one option:
?????? --to-ports port[-port]
?????? This specifies a destination port or??range??of??ports??to??use:
?????? without??this,??the??destination port is never altered.??This is
?????? only valid if the rule also specifies -p tcp or -p udp.
?? REJECT
?????? This is used to send back an error packet in response??to??the??matched
?????? packet: otherwise it is equivalent to Drop so it is a terminating TAR-
?????? GET, ending rule traversal.??This target is only valid??in??the INPUT,
?????? FORWARD and??OUTPUT??chains,??and??user-defined??chains which are only
?????? called from those chains.??The following option controls the nature??of
?????? the error packet returned:
?????? --reject-with type
?????? The type given can be
????????icmp-net-unreachable
????????icmp-host-unreachable
????????icmp-port-unreachable
????????icmp-proto-unreachable
????????icmp-net-prohibited
????????icmp-host-prohibited or
????????icmp-admin-prohibited (*)
?????? which??return??the appropriate ICMP error message (port-unreach-
?????? able is the default).??The option tcp-reset can be used on rules
?????? which??only match the TCP protocol: this causes a TCP RST packet
?????? to be sent back. This??is??mainly??useful??for??blocking??ident
?????? (113/tcp)??probes??which frequently??occur when sending mail to
?????? broken mail hosts (which won't accept your mail otherwise).
?????? (*) Using icmp-admin-prohibited with kernels that??do??not??support??it
?????? will result in a plain Drop instead of REJECT
?? ROUTE
?????? This is used to explicitly override the core??network??stack's??routing
?????? decision.??mangle table.
?????? --oif ifname
?????? Route the packet through 'ifname' network interface
?????? --iif ifname
?????? Change the packet's incoming interface to 'ifname'
?????? --gw IP_address
?????? Route the packet via this gateway
?????? --continue
?????? Behave like a non-terminating target and continue traversing the
?????? rules.??Not valid in combination with '--iif' or '--tee'
?????? --tee??Make a copy of the packet, and route that copy to the given des-
?????? tination.??For the original, uncopied packet, behave like a non-
?????? terminating target and continue traversing the rules.??Not valid
?????? in combination with '--iif' or '--continue'
?? SAME
?????? Similar to SNAT/DNAT depending on chain: it takes a range of addresses
?????? ('--to 1.2.3.4-1.2.3.7') and gives a client the same??source-/destina-
?????? tion-address for each connection.
?????? --to <ipaddr>-<ipaddr>
?????? Addresses??to map source to. May be specified more than once for
?????? multiple ranges.
?????? --nodst
?????? Don't use the destination-ip in the calculations when??selecting
?????? the new source-ip
?? SET
?????? This??modules??adds??and/or??deletes??entries from IP sets which can be
?????? defined by ipset(8).
?????? --add-set setname flag[,flag...]
?????? add the address(es)/port(s) of the packet to the sets
?????? --del-set setname flag[,flag...]
?????? delete the address(es)/port(s) of??the??packet??from??the??sets,
?????? where flags are src and/or dst and there can be no more than six
?????? of them.
?????? The bindings to follow must previously be defined in order to use
?????? multilevel adding/deleting by the SET target.
?? SNAT
?????? This target is only valid in the nat table, in the??POSTROUTING chain.
?????? It??specifies??that the source address of the packet should be modified
?????? (and all future packets in this connection will also be mangled),??and
?????? rules should cease being examined.??It takes one type of option:
?????? --to-source??ipaddr[-ipaddr][:port-port]
?????? which??can??specify a single new source IP address, an inclusive
?????? range of IP addresses, and optionally, a port??range??(which??is
?????? only??valid if the rule also specifies -p tcp or -p udp).??If no
?????? port range is specified, then source ports??below??512??will??be
?????? mapped??to??other??ports below??512: those between 512 and 1023
?????? inclusive will be mapped to ports below 1024,??and??other??ports
?????? will??be mapped to 1024 or above. Where possible, no port alter-
?????? ation will occur.
?????? In Kernels??up??to??2.6.10,??you can??add??several??--to-source
?????? options. For those kernels, if you specify more than one source
?????? address, either via an address??range??or??multiple??--to-source
?????? options, a simple round-robin (one after another in cycle) takes
?????? place between these addresses.??Later??Kernels??(>=??2.6.11-rc1)
?????? don't have the ability to NAT to multiple ranges anymore.
?? TARPIT
?????? Captures??and holds incoming TCP connections using no local per-connec-
?????? tion resources. Connections are accepted, but immediately??switched??to
?????? the persist state (0 byte window), in which the remote side stops send-
?????? ing data and asks to continue every 60-240 seconds.??Attempts to??close
?????? the??connection are??ignored,??forcing the remote side to time out the
?????? connection in 12-24 minutes.
?????? This??offers??similar?? functionality?? to?? LaBrea?? <[url]http://www.hack-[/url]
?????? busters.net/LaBrea/> but doesn't require dedicated hardware or IPs. Any
?????? TCP port that you would normally Drop or REJECT can??instead??become??a
?????? tarpit.
?????? To tarpit connections to TCP port 80 destined for the current machine:
?????? iptables -A INPUT -p tcp -m tcp --dport 80 -j TARPIT
?????? To significantly slow down Code Red/Nimda-style scans of unused address
?????? space, forward unused ip addresses to a Linux??box??not??acting??as??a
?????? router (e.g. "ip route 10.0.0.0 255.0.0.0 ip.of.linux.box" on a Cisco),
?????? enable IP forwarding on the Linux box, and add:
?????? iptables -A FORWARD -p tcp -j TARPIT
?????? iptables -A FORWARD -j Drop
?????? NOTE:??If you use the conntrack module while you are using TARPIT,??you
?????? should??also use the NOTRACK target, or the kernel will unneces-
?????? sarily allocate resources??for??each??TARPITted??connection.??To
?????? TARPIT incoming connections to the standard IRC port while using
?????? conntrack, you could:
?????? iptables -t raw -A PREROUTING -p tcp --dport 6667 -j NOTRACK
?????? iptables -A INPUT -p tcp --dport 6667 -j TARPIT
?? TCPMSS
?????? This target allows to alter the MSS value of TCP SYN packets,??to??con-
?????? trol??the maximum size for that connection (usually limiting it to your
?????? outgoing interface's MTU minus 40).??Of course, it can only be used??in
?????? conjunction with -p tcp.??It is only valid in the mangle table.
?????? This??target??is??used to overcome criminally braindead ISPs or servers
?????? which block ICMP Fragmentation Needed packets.??The??symptoms??of??this
?????? problem are that everything works fine from your Linux firewall/router,
?????? but machines behind it can never exchange large packets:
1) Web browsers connect, then hang with no data received.
2) Small mail works fine, but large emails hang.
3) ssh works fine, but scp hangs after initial handshaking.
?????? Workaround: activate this option and add a rule to your firewall??con-
?????? figuration like:
iptables -t mangle -A FORWARD -p tcp --tcp-flags SYN,RST SYN \
??????-j TCPMSS --clamp-mss-to-pmtu
?????? --set-mss value
?????? Explicitly set MSS option to specified value.
?????? --clamp-mss-to-pmtu
?????? Automatically clamp MSS value to (path_MTU - 40).
?????? These options are mutually exclusive.
?? TOS
?????? This??is??used to set the 8-bit Type of Service field in the IP header.
?????? It is only valid in the mangle table.
?????? --set-tos tos
?????? You can use a numeric TOS values, or use
????????iptables -j TOS -h
?????? to see the list of valid TOS names.
?? TRACE
?????? This target has no options.??It just turns on packet??tracing??for??all
?????? packets that match this rule.
?? TTL
?????? This is used to modify the IPv4 TTL header field.??The TTL field deter-
?????? mines how many hops (routers) a packet can traverse until it's time??to
?????? live is exceeded.
?????? Setting or??incrementing the TTL field can potentially be very danger-
?????? ous,
?????? so it should be avoided at any cost.
?????? Don't??ever set or increment the value on packets that leave your local
?????? network!
?????? mangle table.
?????? --ttl-set value
?????? Set the TTL value to 'value'.
?????? --ttl-dec value
?????? Decrement the TTL value 'value' times.
?????? --ttl-inc value
?????? Increment the TTL value 'value' times.
?? ULOG
?????? This??target provides userspace logging of matching packets.??When this
?????? target is set for a rule, the Linux kernel will multicast??this packet
?????? through a netlink socket. One or more userspace processes may then sub-
?????? scribe to various multicast groups and receive the packets.??Like??LOG,
?????? this??is??a??"non-terminating target", i.e. rule traversal continues at
?????? the next rule.
?????? --ulog-nlgroup nlgroup
?????? This specifies the netlink group (1-32) to which the??packet??is
?????? sent.??Default value is 1.
?????? --ulog-prefix prefix
?????? Prefix??log messages with the specified prefix; up to 32 charac-
?????? ters long, and useful for distinguishing messages in the logs.
?????? --ulog-cprange size
?????? Number of bytes to be copied to userspace.??A value of 0 always
?????? copies the entire packet, regardless of its size.??Default is 0.
?????? --ulog-qthreshold size
?????? Number of packet to queue inside kernel. Setting this value to,
?????? e.g.??10 accumulates ten packets inside the kernel and transmits
?????? them as one netlink multipart message to userspace.??Default??is
?????? 1 (for backwards compatibility).
?? XOR
?????? Encrypt TCP and UDP traffic using a simple XOR encryption
?????? --key string
?????? Set key to "string"
?????? --block-size
?????? Set block size
DIAGNOSTICS
?????? Various error messages are printed to standard error.??The exit code is
?????? 0 for correct functioning.??Errors which appear to be caused by invalid
?????? or??abused??command??line parameters cause an exit code of 2, and other
?????? errors cause an exit code of 1.
BUGS
?????? Bugs???What's this? ;-) Well,??you??might??want??to??have??a??look??at
?????? [url]http://bugzilla.netfilter.org/[/url]
COMPATIBILITY WITH IPCHAINS
?????? This??iptables??is very similar to ipchains by Rusty Russell.??The main
?????? difference is that the chains INPUT and OUTPUT are only traversed??for
?????? packets coming into the local host and originating from the local host
?????? respectively.??Hence every packet only passes through one of the??three
?????? chains??(except loopback traffic, which involves both INPUT and OUTPUT
?????? chains); previously a forwarded packet would pass through all three.
?????? The other main difference is that -i refers to the input interface;??-o
?????? refers??to??the output interface,??and both are available for packets
?????? entering the FORWARD chain.
?????? iptables is a pure packet filter when using the default 'filter' table,
?????? with optional extension modules.??This should simplify much of the pre-
?????? vious confusion over the combination of IP masquerading and packet fil-
?????? tering??seen??previously.??So the following options are handled differ-
?????? ently:
-j MASQ
-M -S
-M -L
?????? There are several other changes in iptables.
SEE ALSO
?????? iptables-save(8), iptables-restore(8), ip6tables(8), ip6tables-save(8),
?????? ip6tables-restore(8), libipq(3).
?????? The packet-filtering-HOWTO details iptables usage for packet filtering,
?????? the NAT-HOWTO details NAT, the netfilter-extensions-HOWTO??details??the
?????? extensions??that??are not in the standard distribution, and the netfil-
?????? ter-hacking-HOWTO details the netfilter internals.
?????? See [url]http://www.netfilter.org/.[/url]
AUTHORS
?????? Rusty Russell originally wrote iptables,??in??early??consultation??with
?????? Michael Neuling.
?????? Marc??Boucher??made??Rusty??abandon??ipnatctl by lobbying for a generic
?????? packet selection framework in iptables, then wrote??the mangle table,
?????? the owner match, the mark stuff, and ran around doing cool stuff every-
?????? where.
?????? James Morris wrote the TOS target, and tos match.
?????? Jozsef Kadlecsik wrote the REJECT target.
?????? Harald Welte wrote the ULOG and NFQUEUE target, the??new??libiptc,??as
?????? well as the TTL, DSCP, ECN matches and targets.
?????? The??Netfilter??Core??Team??is: Marc Boucher, Martin Josefsson, Jozsef
?????? Kadlecsik, Patrick McHardy, James Morris, Harald Welte and??Rusty??Rus-
?????? sell.
?????? Man page originally written by Herve Eychenne <[email]rv@wallfire.org[/email]>.

???? Mar 09, 2002??????IPTABLES(8)

總結

以上是生活随笔為你收集整理的man iptables by iptables-save v1.3.5的全部內容,希望文章能夠幫你解決所遇到的問題。

如果覺得生活随笔網站內容還不錯,歡迎將生活随笔推薦給好友。

国产乱码精品一品二品 | 88国产精品欧美一区二区三区 | 国产免费久久精品国产传媒 | 国产精品久久久久久久9999 | 少妇性荡欲午夜性开放视频剧场 | 美女黄网站人色视频免费国产 | 鲁一鲁av2019在线 | 亚洲精品久久久久中文第一幕 | 清纯唯美经典一区二区 | 亚洲欧美综合区丁香五月小说 | 亚洲欧美日韩国产精品一区二区 | 日韩av无码一区二区三区 | 成人精品视频一区二区三区尤物 | 亚洲熟悉妇女xxx妇女av | 欧美丰满少妇xxxx性 | 精品无码av一区二区三区 | 日欧一片内射va在线影院 | 欧美性猛交xxxx富婆 | 沈阳熟女露脸对白视频 | 中文字幕日产无线码一区 | 无码人妻精品一区二区三区不卡 | 天天拍夜夜添久久精品 | 日本精品久久久久中文字幕 | 久久zyz资源站无码中文动漫 | 少妇一晚三次一区二区三区 | 欧美成人家庭影院 | 精品亚洲成av人在线观看 | 麻豆果冻传媒2021精品传媒一区下载 | 久精品国产欧美亚洲色aⅴ大片 | 丰满少妇女裸体bbw | 亚洲日韩中文字幕在线播放 | 波多野结衣一区二区三区av免费 | 人人超人人超碰超国产 | 亚洲日本在线电影 | 亚洲熟妇色xxxxx欧美老妇y | 国产美女极度色诱视频www | 亚洲一区二区三区偷拍女厕 | 国产成人无码av一区二区 | 日韩亚洲欧美中文高清在线 | 黑森林福利视频导航 | 国产精品无码mv在线观看 | 亚洲日韩中文字幕在线播放 | 青春草在线视频免费观看 | 精品人人妻人人澡人人爽人人 | 性欧美疯狂xxxxbbbb | 亚洲va中文字幕无码久久不卡 | 久久久久免费看成人影片 | 动漫av一区二区在线观看 | 欧美精品国产综合久久 | 成人无码视频在线观看网站 | 久久视频在线观看精品 | 天堂а√在线地址中文在线 | 国产97在线 | 亚洲 | 亚洲阿v天堂在线 | 在线看片无码永久免费视频 | 成人欧美一区二区三区黑人 | 乱码午夜-极国产极内射 | 久久精品视频在线看15 | 国产免费久久久久久无码 | 日韩av无码一区二区三区不卡 | 国产成人无码a区在线观看视频app | 亚洲色在线无码国产精品不卡 | 免费观看黄网站 | 国产亚洲精品久久久闺蜜 | 久久国产精品二国产精品 | 国产激情无码一区二区 | 国产做国产爱免费视频 | 国产综合久久久久鬼色 | 露脸叫床粗话东北少妇 | 思思久久99热只有频精品66 | 丰满少妇人妻久久久久久 | 亚洲国产精品无码久久久久高潮 | 精品无码国产一区二区三区av | 少妇无码一区二区二三区 | 免费无码午夜福利片69 | 国产精品无码成人午夜电影 | 人妻aⅴ无码一区二区三区 | 国产午夜手机精彩视频 | 女人被男人躁得好爽免费视频 | 无码一区二区三区在线观看 | 国内揄拍国内精品少妇国语 | 四十如虎的丰满熟妇啪啪 | 牲欲强的熟妇农村老妇女视频 | 无码纯肉视频在线观看 | 久久99精品国产麻豆蜜芽 | 好屌草这里只有精品 | 久久这里只有精品视频9 | 中文亚洲成a人片在线观看 | 亚洲一区二区三区香蕉 | 日本一卡2卡3卡4卡无卡免费网站 国产一区二区三区影院 | 成人一在线视频日韩国产 | 呦交小u女精品视频 | 日本一卡二卡不卡视频查询 | 理论片87福利理论电影 | 俺去俺来也在线www色官网 | 国产精品国产自线拍免费软件 | 男女性色大片免费网站 | 青青草原综合久久大伊人精品 | 国产一区二区三区影院 | 久久亚洲精品中文字幕无男同 | 熟妇人妻中文av无码 | 国产美女极度色诱视频www | 色婷婷久久一区二区三区麻豆 | 乱人伦人妻中文字幕无码久久网 | 成人无码精品一区二区三区 | 无码人妻少妇伦在线电影 | 爆乳一区二区三区无码 | 97精品人妻一区二区三区香蕉 | 久久久久99精品成人片 | 亚洲精品国产精品乱码视色 | 宝宝好涨水快流出来免费视频 | 色五月五月丁香亚洲综合网 | 亚洲成av人综合在线观看 | 亚洲成在人网站无码天堂 | 理论片87福利理论电影 | 亚洲色无码一区二区三区 | 大胆欧美熟妇xx | 精品一二三区久久aaa片 | 欧美国产亚洲日韩在线二区 | 丝袜美腿亚洲一区二区 | 久久国内精品自在自线 | 国产手机在线αⅴ片无码观看 | 99久久亚洲精品无码毛片 | 精品厕所偷拍各类美女tp嘘嘘 | 欧美国产日韩亚洲中文 | 2020久久香蕉国产线看观看 | 日日天日日夜日日摸 | 中文字幕日韩精品一区二区三区 | 特黄特色大片免费播放器图片 | 成人免费视频在线观看 | 国产午夜视频在线观看 | 精品熟女少妇av免费观看 | 一本色道久久综合亚洲精品不卡 | 色五月五月丁香亚洲综合网 | 波多野结衣 黑人 | 亚洲熟熟妇xxxx | 久久久精品成人免费观看 | 无码播放一区二区三区 | 女人高潮内射99精品 | 无码播放一区二区三区 | 青春草在线视频免费观看 | 人妻插b视频一区二区三区 | 国产人妻久久精品二区三区老狼 | 麻豆国产丝袜白领秘书在线观看 | 最近中文2019字幕第二页 | 日本一区二区三区免费播放 | 久久无码专区国产精品s | 久久国产精品萌白酱免费 | 97久久超碰中文字幕 | 99国产欧美久久久精品 | 亚洲一区二区三区无码久久 | 中文字幕乱码中文乱码51精品 | 亚洲国产欧美在线成人 | 色情久久久av熟女人妻网站 | 日产国产精品亚洲系列 | 国内综合精品午夜久久资源 | 97资源共享在线视频 | 日韩av无码一区二区三区 | 亚洲一区二区三区香蕉 | 国产真实乱对白精彩久久 | 男人扒开女人内裤强吻桶进去 | av无码电影一区二区三区 | 少妇性俱乐部纵欲狂欢电影 | 色综合视频一区二区三区 | 国产电影无码午夜在线播放 | 欧美老人巨大xxxx做受 | 国产免费无码一区二区视频 | 精品人妻人人做人人爽 | 亚洲日韩中文字幕在线播放 | 国产成人无码午夜视频在线观看 | 蜜臀av在线观看 在线欧美精品一区二区三区 | 少妇厨房愉情理9仑片视频 | 国产一区二区三区四区五区加勒比 | 日韩精品久久久肉伦网站 | 亚洲精品久久久久avwww潮水 | 日韩人妻少妇一区二区三区 | 一本久久a久久精品vr综合 | 99视频精品全部免费免费观看 | 成人影院yy111111在线观看 | 亚洲色偷偷男人的天堂 | 亚洲欧洲日本无在线码 | 西西人体www44rt大胆高清 | 国产精品无码一区二区桃花视频 | 中文字幕乱码人妻无码久久 | 中文字幕人妻无码一区二区三区 | 欧美亚洲日韩国产人成在线播放 | 蜜桃无码一区二区三区 | 国产成人一区二区三区别 | 少妇无码一区二区二三区 | 精品国产麻豆免费人成网站 | 欧美人与善在线com | 无套内谢的新婚少妇国语播放 | 少妇性俱乐部纵欲狂欢电影 | 国产免费无码一区二区视频 | 亚洲一区二区三区无码久久 | 久久aⅴ免费观看 | 亚洲国产高清在线观看视频 | 最新国产乱人伦偷精品免费网站 | 久久久久久久人妻无码中文字幕爆 | 98国产精品综合一区二区三区 | 国产成人综合色在线观看网站 | 亚洲国产综合无码一区 | 久久人人爽人人爽人人片ⅴ | 国产av一区二区精品久久凹凸 | 乱人伦人妻中文字幕无码 | 国产成人无码区免费内射一片色欲 | 国产国产精品人在线视 | 俄罗斯老熟妇色xxxx | 人人妻人人澡人人爽精品欧美 | 久久午夜无码鲁丝片 | 国产在线aaa片一区二区99 | 夫妻免费无码v看片 | 人妻尝试又大又粗久久 | 性欧美videos高清精品 | 高清国产亚洲精品自在久久 | 中文字幕无码免费久久9一区9 | 大肉大捧一进一出视频出来呀 | 2019nv天堂香蕉在线观看 | 欧美第一黄网免费网站 | 国产一区二区三区四区五区加勒比 | 国产精品美女久久久久av爽李琼 | 麻豆md0077饥渴少妇 | 久久久婷婷五月亚洲97号色 | 牲欲强的熟妇农村老妇女 | 白嫩日本少妇做爰 | 亚洲精品国产a久久久久久 | 精品熟女少妇av免费观看 | 久久综合给久久狠狠97色 | 国产区女主播在线观看 | 永久免费精品精品永久-夜色 | 精品国产av色一区二区深夜久久 | 亚洲狠狠色丁香婷婷综合 | 久久国产精品二国产精品 | 最新国产麻豆aⅴ精品无码 | 极品嫩模高潮叫床 | 国产激情无码一区二区 | 高清无码午夜福利视频 | 午夜无码区在线观看 | 亚洲色欲色欲欲www在线 | 丰满肥臀大屁股熟妇激情视频 | 亚洲最大成人网站 | 亚洲精品无码人妻无码 | 国产网红无码精品视频 | 狂野欧美激情性xxxx | 少妇性l交大片欧洲热妇乱xxx | 永久免费精品精品永久-夜色 | 老熟妇乱子伦牲交视频 | 精品少妇爆乳无码av无码专区 | 丰满少妇女裸体bbw | 内射巨臀欧美在线视频 | 国产综合久久久久鬼色 | 在线观看欧美一区二区三区 | 日日麻批免费40分钟无码 | 亚洲无人区一区二区三区 | 亚洲一区av无码专区在线观看 | 国产一区二区不卡老阿姨 | 日本又色又爽又黄的a片18禁 | 国产精品香蕉在线观看 | 国产成人无码区免费内射一片色欲 | 国产精品-区区久久久狼 | 色婷婷香蕉在线一区二区 | 精品厕所偷拍各类美女tp嘘嘘 | 国产精品久久国产精品99 | 中文亚洲成a人片在线观看 | 成人免费视频视频在线观看 免费 | 中文字幕人妻丝袜二区 | 国产成人精品视频ⅴa片软件竹菊 | 成人免费视频视频在线观看 免费 | 国产色精品久久人妻 | 欧美丰满熟妇xxxx | 男女猛烈xx00免费视频试看 | 东京热无码av男人的天堂 | 狠狠噜狠狠狠狠丁香五月 | 国产精品丝袜黑色高跟鞋 | 狂野欧美性猛交免费视频 | 久久无码人妻影院 | 成人综合网亚洲伊人 | 亚洲精品综合五月久久小说 | 精品少妇爆乳无码av无码专区 | 久久99精品久久久久久动态图 | 牲交欧美兽交欧美 | 少妇的肉体aa片免费 | 日韩成人一区二区三区在线观看 | 亚洲自偷精品视频自拍 | 久久99精品久久久久久 | 精品偷拍一区二区三区在线看 | 亚洲色欲久久久综合网东京热 | 无码吃奶揉捏奶头高潮视频 | aⅴ在线视频男人的天堂 | 国产明星裸体无码xxxx视频 | 亚洲aⅴ无码成人网站国产app | 一二三四社区在线中文视频 | 国产成人无码av片在线观看不卡 | 狂野欧美性猛交免费视频 | 国产在热线精品视频 | 久久人人爽人人爽人人片av高清 | 黑人大群体交免费视频 | 欧美日韩视频无码一区二区三 | 国产日产欧产精品精品app | 纯爱无遮挡h肉动漫在线播放 | 国产成人久久精品流白浆 | 国产精品嫩草久久久久 | 网友自拍区视频精品 | 中文字幕无码视频专区 | 久久国产精品_国产精品 | 国产午夜亚洲精品不卡下载 | 午夜精品久久久内射近拍高清 | 国产精品亚洲五月天高清 | 久久久亚洲欧洲日产国码αv | 天天拍夜夜添久久精品 | 日韩人妻少妇一区二区三区 | 国产va免费精品观看 | 天堂а√在线中文在线 | 人人爽人人澡人人人妻 | 夜夜影院未满十八勿进 | 99久久精品午夜一区二区 | 国产av剧情md精品麻豆 | 欧美 亚洲 国产 另类 | 亚洲第一网站男人都懂 | 一个人免费观看的www视频 | 久久久av男人的天堂 | 国产超级va在线观看视频 | 亚洲区欧美区综合区自拍区 | 中文字幕 亚洲精品 第1页 | 精品久久久中文字幕人妻 | 黑森林福利视频导航 | 欧美老人巨大xxxx做受 | 人人爽人人爽人人片av亚洲 | 免费网站看v片在线18禁无码 | 久久精品成人欧美大片 | 国产精华av午夜在线观看 | 狠狠色噜噜狠狠狠狠7777米奇 | 国产午夜视频在线观看 | 久久精品国产一区二区三区 | 四虎影视成人永久免费观看视频 | 亚洲欧美国产精品专区久久 | 亚洲成av人片在线观看无码不卡 | 精品久久久久久人妻无码中文字幕 | 国产尤物精品视频 | 特大黑人娇小亚洲女 | 55夜色66夜色国产精品视频 | 成人无码影片精品久久久 | 久久久精品国产sm最大网站 | 丝袜 中出 制服 人妻 美腿 | 亚洲精品国产精品乱码不卡 | 人人超人人超碰超国产 | 色五月丁香五月综合五月 | 亚洲综合精品香蕉久久网 | 性欧美大战久久久久久久 | 国产成人无码区免费内射一片色欲 | 亚洲a无码综合a国产av中文 | 成人无码精品1区2区3区免费看 | 亚洲精品中文字幕久久久久 | 精品午夜福利在线观看 | 97久久超碰中文字幕 | 亚洲a无码综合a国产av中文 | 国产极品视觉盛宴 | 亚洲另类伦春色综合小说 | 狠狠综合久久久久综合网 | 偷窥日本少妇撒尿chinese | 成 人 网 站国产免费观看 | 亚洲成av人片在线观看无码不卡 | 成人精品视频一区二区 | 成熟女人特级毛片www免费 | 图片小说视频一区二区 | 欧美 丝袜 自拍 制服 另类 | 强辱丰满人妻hd中文字幕 | 久久国内精品自在自线 | 中文字幕人妻无码一夲道 | 亚洲va欧美va天堂v国产综合 | 日本一卡2卡3卡4卡无卡免费网站 国产一区二区三区影院 | 国产精品.xx视频.xxtv | 中文字幕日韩精品一区二区三区 | 日欧一片内射va在线影院 | 午夜精品一区二区三区在线观看 | 亚洲精品成a人在线观看 | 午夜精品久久久久久久 | 国产亚洲欧美日韩亚洲中文色 | 波多野结衣 黑人 | 乱中年女人伦av三区 | 无码吃奶揉捏奶头高潮视频 | 日韩av无码中文无码电影 | 午夜男女很黄的视频 | 欧美精品在线观看 | 色婷婷欧美在线播放内射 | 国产乱人无码伦av在线a | 东北女人啪啪对白 | 亚洲精品无码人妻无码 | 麻豆av传媒蜜桃天美传媒 | 久久久中文字幕日本无吗 | 久久久国产精品无码免费专区 | 色欲人妻aaaaaaa无码 | 亲嘴扒胸摸屁股激烈网站 | 久久久久久久人妻无码中文字幕爆 | 无码任你躁久久久久久久 | 无码国产激情在线观看 | 中国女人内谢69xxxxxa片 | 亚洲国产精品一区二区美利坚 | 亚洲国产精品一区二区美利坚 | 在线观看国产一区二区三区 | 亚洲理论电影在线观看 | 综合人妻久久一区二区精品 | 国产绳艺sm调教室论坛 | 亚欧洲精品在线视频免费观看 | 蜜桃av蜜臀av色欲av麻 999久久久国产精品消防器材 | 色狠狠av一区二区三区 | 波多野结衣av一区二区全免费观看 | 亚洲一区二区三区香蕉 | 国产深夜福利视频在线 | 国产真人无遮挡作爱免费视频 | 国产精品久久久久久亚洲毛片 | 欧美日本免费一区二区三区 | 国产乱人伦av在线无码 | 日本成熟视频免费视频 | 国产亚洲欧美日韩亚洲中文色 | 撕开奶罩揉吮奶头视频 | 国产一区二区三区日韩精品 | 国产成人无码午夜视频在线观看 | 日本一卡2卡3卡4卡无卡免费网站 国产一区二区三区影院 | 伊人久久大香线焦av综合影院 | 亚洲一区二区三区无码久久 | 熟女俱乐部五十路六十路av | 亚洲精品一区二区三区四区五区 | 国内精品人妻无码久久久影院蜜桃 | 全黄性性激高免费视频 | av在线亚洲欧洲日产一区二区 | 国产女主播喷水视频在线观看 | 午夜性刺激在线视频免费 | 亚洲人成网站免费播放 | 最新版天堂资源中文官网 | 蜜臀av在线播放 久久综合激激的五月天 | 亚洲爆乳无码专区 | 久久人妻内射无码一区三区 | 人妻插b视频一区二区三区 | 欧美野外疯狂做受xxxx高潮 | 人人澡人人妻人人爽人人蜜桃 | 日本精品高清一区二区 | 欧美日韩一区二区免费视频 | 中文毛片无遮挡高清免费 | 天海翼激烈高潮到腰振不止 | 久久精品国产日本波多野结衣 | 丝袜美腿亚洲一区二区 | 中文无码精品a∨在线观看不卡 | 国产无套粉嫩白浆在线 | 精品亚洲韩国一区二区三区 | 亚洲熟悉妇女xxx妇女av | 成人欧美一区二区三区黑人 | 少妇性荡欲午夜性开放视频剧场 | 人人妻人人澡人人爽人人精品 | 久久久久亚洲精品男人的天堂 | 日本精品人妻无码77777 天堂一区人妻无码 | 日本一卡2卡3卡四卡精品网站 | 又大又紧又粉嫩18p少妇 | 草草网站影院白丝内射 | 亚洲人亚洲人成电影网站色 | 巨爆乳无码视频在线观看 | 久久www免费人成人片 | 精品久久久久久人妻无码中文字幕 | 国产99久久精品一区二区 | а√天堂www在线天堂小说 | 久久 国产 尿 小便 嘘嘘 | 国产亚洲精品久久久ai换 | 国产精品第一区揄拍无码 | 99久久无码一区人妻 | 成人一区二区免费视频 | 国产福利视频一区二区 | 亚洲va中文字幕无码久久不卡 | 妺妺窝人体色www在线小说 | 亚洲一区二区三区国产精华液 | 中文字幕色婷婷在线视频 | 成熟妇人a片免费看网站 | 久久久中文久久久无码 | 久久亚洲精品成人无码 | 国产xxx69麻豆国语对白 | 国产高潮视频在线观看 | 牲交欧美兽交欧美 | 久久熟妇人妻午夜寂寞影院 | 国产精品久久久久久久9999 | 国产激情无码一区二区app | 麻豆国产97在线 | 欧洲 | 国产午夜无码视频在线观看 | 亚洲熟悉妇女xxx妇女av | 亚洲日韩av一区二区三区中文 | 亚洲精品成人av在线 | 大地资源网第二页免费观看 | 97精品人妻一区二区三区香蕉 | 日韩亚洲欧美精品综合 | 人妻天天爽夜夜爽一区二区 | 久久成人a毛片免费观看网站 | 欧美变态另类xxxx | 男女下面进入的视频免费午夜 | 人人妻人人澡人人爽精品欧美 | 国产精品沙发午睡系列 | 欧美人妻一区二区三区 | 国产亚洲日韩欧美另类第八页 | 欧洲vodafone精品性 | 人妻体内射精一区二区三四 | 99re在线播放 | 四十如虎的丰满熟妇啪啪 | 人妻人人添人妻人人爱 | 小sao货水好多真紧h无码视频 | 欧美怡红院免费全部视频 | 免费无码的av片在线观看 | 欧美成人免费全部网站 | 99久久人妻精品免费二区 | 日韩在线不卡免费视频一区 | 亚洲中文字幕成人无码 | 97色伦图片97综合影院 | 国产成人精品一区二区在线小狼 | 国产午夜无码视频在线观看 | 无码人妻丰满熟妇区五十路百度 | 玩弄中年熟妇正在播放 | 国产精品久久国产三级国 | 国产 浪潮av性色四虎 | 内射巨臀欧美在线视频 | 久久99精品国产.久久久久 | 亚洲狠狠婷婷综合久久 | 成人无码精品1区2区3区免费看 | 久久久久国色av免费观看性色 | 国产综合久久久久鬼色 | 国产精品久久久久影院嫩草 | 欧美35页视频在线观看 | 国产精品久久久久无码av色戒 | 国内丰满熟女出轨videos | 丰腴饱满的极品熟妇 | 性啪啪chinese东北女人 | 少妇愉情理伦片bd | 国产精品久久久久久无码 | 西西人体www44rt大胆高清 | 亚洲国精产品一二二线 | 少妇激情av一区二区 | 国内丰满熟女出轨videos | 男女性色大片免费网站 | 国产精品美女久久久久av爽李琼 | 国产精品人妻一区二区三区四 | 中文字幕乱码人妻二区三区 | 欧美人与禽猛交狂配 | 国产免费久久久久久无码 | 日本高清一区免费中文视频 | 性生交片免费无码看人 | 人人爽人人澡人人人妻 | 国内综合精品午夜久久资源 | 最近免费中文字幕中文高清百度 | 国产精品亚洲а∨无码播放麻豆 | 国产亚洲欧美在线专区 | 久久国产劲爆∧v内射 | 极品尤物被啪到呻吟喷水 | 亚洲乱码国产乱码精品精 | 久久久亚洲欧洲日产国码αv | 国产猛烈高潮尖叫视频免费 | 少妇人妻偷人精品无码视频 | 欧美喷潮久久久xxxxx | 美女扒开屁股让男人桶 | 中文字幕日产无线码一区 | 2020久久超碰国产精品最新 | 老熟妇乱子伦牲交视频 | 在线a亚洲视频播放在线观看 | 欧美成人午夜精品久久久 | 九一九色国产 | 精品夜夜澡人妻无码av蜜桃 | 国产亚av手机在线观看 | 无码av免费一区二区三区试看 | 成人欧美一区二区三区黑人免费 | 俺去俺来也www色官网 | www国产亚洲精品久久网站 | 亚洲精品国产a久久久久久 | 日韩av无码一区二区三区 | 老司机亚洲精品影院 | 亚洲色在线无码国产精品不卡 | 爱做久久久久久 | 亚洲中文字幕在线无码一区二区 | 又粗又大又硬毛片免费看 | 男女下面进入的视频免费午夜 | 国产人妻人伦精品1国产丝袜 | 岛国片人妻三上悠亚 | 国产精品亚洲综合色区韩国 | 亚洲精品一区三区三区在线观看 | 国产亚洲精品久久久久久久 | 久久99精品国产麻豆蜜芽 | 欧美一区二区三区视频在线观看 | 国产xxx69麻豆国语对白 | 久久久久久av无码免费看大片 | av无码电影一区二区三区 | 国产美女精品一区二区三区 | 波多野结衣乳巨码无在线观看 | 中文字幕乱码人妻无码久久 | 在线a亚洲视频播放在线观看 | 丰满人妻一区二区三区免费视频 | 国产亚洲人成a在线v网站 | 国产成人无码一二三区视频 | 国产精品手机免费 | 无码人妻久久一区二区三区不卡 | 亚洲精品成a人在线观看 | 久久综合久久自在自线精品自 | 日本熟妇人妻xxxxx人hd | 亚洲中文字幕乱码av波多ji | 中文字幕日韩精品一区二区三区 | 亚洲精品国产第一综合99久久 | 综合人妻久久一区二区精品 | 老子影院午夜精品无码 | 中文字幕av伊人av无码av | 水蜜桃亚洲一二三四在线 | 99久久久无码国产aaa精品 | 少妇性俱乐部纵欲狂欢电影 | 精品久久久无码人妻字幂 | 亚洲国产成人av在线观看 | 亚洲成av人影院在线观看 | 午夜成人1000部免费视频 | 成人av无码一区二区三区 | 国产精品久免费的黄网站 | 噜噜噜亚洲色成人网站 | 在线欧美精品一区二区三区 | 国产性猛交╳xxx乱大交 国产精品久久久久久无码 欧洲欧美人成视频在线 | 国产精品美女久久久网av | 亚洲欧美日韩国产精品一区二区 | 天下第一社区视频www日本 | 亚洲精品欧美二区三区中文字幕 | 国产超级va在线观看视频 | 色 综合 欧美 亚洲 国产 | 狠狠色噜噜狠狠狠7777奇米 | 日本高清一区免费中文视频 | 精品国产aⅴ无码一区二区 | 精品国产aⅴ无码一区二区 | 国产激情精品一区二区三区 | 东北女人啪啪对白 | 国产精品高潮呻吟av久久4虎 | 动漫av一区二区在线观看 | www国产亚洲精品久久网站 | 成人动漫在线观看 | 欧美亚洲国产一区二区三区 | 在线观看欧美一区二区三区 | 无码精品人妻一区二区三区av | 国产亚洲精品久久久久久久久动漫 | 狂野欧美激情性xxxx | 永久免费精品精品永久-夜色 | 国产精品视频免费播放 | 亚洲理论电影在线观看 | 日本在线高清不卡免费播放 | 国产一精品一av一免费 | 午夜免费福利小电影 | 国产偷自视频区视频 | 强奷人妻日本中文字幕 | 午夜无码人妻av大片色欲 | 麻豆md0077饥渴少妇 | 国产亚洲精品久久久久久 | 国产超级va在线观看视频 | 久久久无码中文字幕久... | 成人精品天堂一区二区三区 | 在线а√天堂中文官网 | 最新国产乱人伦偷精品免费网站 | 曰韩少妇内射免费播放 | 亚洲日本在线电影 | 伊人色综合久久天天小片 | 人妻天天爽夜夜爽一区二区 | 亚洲日韩av一区二区三区中文 | 国产农村乱对白刺激视频 | 国产亚洲精品久久久ai换 | 成人女人看片免费视频放人 | 国产口爆吞精在线视频 | 中文字幕中文有码在线 | 白嫩日本少妇做爰 | 日韩少妇内射免费播放 | 88国产精品欧美一区二区三区 | 日韩亚洲欧美精品综合 | 国产精品无码一区二区桃花视频 | 最新版天堂资源中文官网 | 亚洲色欲久久久综合网东京热 | 成人欧美一区二区三区黑人 | 精品 日韩 国产 欧美 视频 | 纯爱无遮挡h肉动漫在线播放 | 一二三四社区在线中文视频 | 曰本女人与公拘交酡免费视频 | 久久精品国产一区二区三区肥胖 | 国精产品一品二品国精品69xx | 午夜理论片yy44880影院 | 久久精品无码一区二区三区 | 亚洲精品久久久久avwww潮水 | 亚洲中文字幕乱码av波多ji | 国产免费观看黄av片 | 在线欧美精品一区二区三区 | 欧美午夜特黄aaaaaa片 | 久久久久久国产精品无码下载 | 成 人 网 站国产免费观看 | 国产麻豆精品精东影业av网站 | 人妻夜夜爽天天爽三区 | 国产小呦泬泬99精品 | 装睡被陌生人摸出水好爽 | 国产欧美熟妇另类久久久 | 任你躁在线精品免费 | 女人被男人躁得好爽免费视频 | 午夜免费福利小电影 | 东京一本一道一二三区 | 色婷婷香蕉在线一区二区 | 亚洲七七久久桃花影院 | 国产亚洲欧美日韩亚洲中文色 | 欧美刺激性大交 | 波多野结衣一区二区三区av免费 | 精品久久久无码人妻字幂 | 日日躁夜夜躁狠狠躁 | 国产人妻久久精品二区三区老狼 | 最近免费中文字幕中文高清百度 | 性做久久久久久久免费看 | 精品厕所偷拍各类美女tp嘘嘘 | 乱码午夜-极国产极内射 | 国内丰满熟女出轨videos | 欧美自拍另类欧美综合图片区 | 精品亚洲成av人在线观看 | 少妇人妻av毛片在线看 | 国产成人精品久久亚洲高清不卡 | 人人妻人人藻人人爽欧美一区 | 亚洲国产精华液网站w | 久久精品成人欧美大片 | 久久久精品成人免费观看 | 国产国语老龄妇女a片 | 天天拍夜夜添久久精品大 | 妺妺窝人体色www婷婷 | 久久久国产精品无码免费专区 | 亚洲成av人片天堂网无码】 | 国产精品国产三级国产专播 | 激情人妻另类人妻伦 | 亚洲欧美日韩国产精品一区二区 | 欧美zoozzooz性欧美 | 欧美三级不卡在线观看 | 精品无码国产自产拍在线观看蜜 | 亚洲熟妇色xxxxx欧美老妇 | 乌克兰少妇性做爰 | 久久久久成人片免费观看蜜芽 | 久久精品丝袜高跟鞋 | 性欧美熟妇videofreesex | 少妇激情av一区二区 | 国产精品办公室沙发 | 中文精品久久久久人妻不卡 | 伊人久久大香线蕉亚洲 | 在线看片无码永久免费视频 | 免费视频欧美无人区码 | 西西人体www44rt大胆高清 | 久久www免费人成人片 | 午夜精品一区二区三区在线观看 | 精品久久综合1区2区3区激情 | 国产精品福利视频导航 | 在线精品国产一区二区三区 | 无码国产激情在线观看 | 国产一区二区三区四区五区加勒比 | 亚洲精品一区二区三区四区五区 | 精品国偷自产在线视频 | 久9re热视频这里只有精品 | 国内揄拍国内精品少妇国语 | 玩弄中年熟妇正在播放 | 国产无遮挡吃胸膜奶免费看 | 福利一区二区三区视频在线观看 | 99er热精品视频 | 国产疯狂伦交大片 | 色综合久久中文娱乐网 | 无码av中文字幕免费放 | 国产莉萝无码av在线播放 | 香港三级日本三级妇三级 | 成人aaa片一区国产精品 | 18禁黄网站男男禁片免费观看 | 国产内射爽爽大片视频社区在线 | 亚洲精品欧美二区三区中文字幕 | 成人片黄网站色大片免费观看 | 欧美性猛交内射兽交老熟妇 | 亚洲成av人在线观看网址 | 亚洲精品国偷拍自产在线麻豆 | 国产人妖乱国产精品人妖 | 黑人粗大猛烈进出高潮视频 | 成年美女黄网站色大免费视频 | 九一九色国产 | 一本久道久久综合婷婷五月 | 又湿又紧又大又爽a视频国产 | аⅴ资源天堂资源库在线 | 日韩精品乱码av一区二区 | 亚洲 高清 成人 动漫 | 小鲜肉自慰网站xnxx | 精品一二三区久久aaa片 | 清纯唯美经典一区二区 | 色妞www精品免费视频 | 国产精品内射视频免费 | 又大又硬又黄的免费视频 | 国产性生大片免费观看性 | 色综合天天综合狠狠爱 | 欧洲熟妇精品视频 | 人妻少妇被猛烈进入中文字幕 | 日韩人妻无码一区二区三区久久99 | 亚洲中文字幕在线观看 | yw尤物av无码国产在线观看 | 伊在人天堂亚洲香蕉精品区 | 奇米综合四色77777久久 东京无码熟妇人妻av在线网址 | 玩弄中年熟妇正在播放 | 最新国产麻豆aⅴ精品无码 | 国产人妖乱国产精品人妖 | 国产色在线 | 国产 | 好男人www社区 | 中文字幕av日韩精品一区二区 | 欧美性生交xxxxx久久久 | 日日躁夜夜躁狠狠躁 | 久久国产精品_国产精品 | 动漫av网站免费观看 | 极品嫩模高潮叫床 | 欧美放荡的少妇 | 乌克兰少妇xxxx做受 | 曰本女人与公拘交酡免费视频 | 给我免费的视频在线观看 | 国产三级久久久精品麻豆三级 | 国产精品无码成人午夜电影 | 亚洲精品中文字幕久久久久 | www一区二区www免费 | 欧美乱妇无乱码大黄a片 | 无码人妻黑人中文字幕 | 成 人影片 免费观看 | 人人妻人人澡人人爽欧美精品 | 久久 国产 尿 小便 嘘嘘 | 性生交大片免费看女人按摩摩 | 国产亚洲精品久久久久久久 | av人摸人人人澡人人超碰下载 | 亚洲 日韩 欧美 成人 在线观看 | 日本一卡2卡3卡四卡精品网站 | 水蜜桃亚洲一二三四在线 | 曰本女人与公拘交酡免费视频 | 一本加勒比波多野结衣 | 牲欲强的熟妇农村老妇女视频 | 国产熟妇高潮叫床视频播放 | 精品一区二区三区无码免费视频 | 亚洲熟妇色xxxxx欧美老妇 | 少妇无码av无码专区在线观看 | 国产美女精品一区二区三区 | 中文字幕人妻无码一区二区三区 | 婷婷综合久久中文字幕蜜桃三电影 | 中文字幕无码热在线视频 | 午夜性刺激在线视频免费 | 久久精品国产一区二区三区 | 免费播放一区二区三区 | 性欧美牲交在线视频 | 日本一区二区更新不卡 | 久久精品国产精品国产精品污 | 精品国产国产综合精品 | 中文字幕人妻无码一区二区三区 | 国产成人无码专区 | 小鲜肉自慰网站xnxx | 国产特级毛片aaaaaa高潮流水 | 在线欧美精品一区二区三区 | 男人和女人高潮免费网站 | 99er热精品视频 | 丰满妇女强制高潮18xxxx | 午夜精品一区二区三区在线观看 | 真人与拘做受免费视频 | 高清无码午夜福利视频 | 国产av一区二区三区最新精品 | 激情国产av做激情国产爱 | 熟女少妇人妻中文字幕 | 久久久久成人精品免费播放动漫 | 牲欲强的熟妇农村老妇女 | 18精品久久久无码午夜福利 | 精品午夜福利在线观看 | 丰满少妇高潮惨叫视频 | 在线亚洲高清揄拍自拍一品区 | 成人亚洲精品久久久久软件 | 国产农村妇女aaaaa视频 撕开奶罩揉吮奶头视频 | 人妻无码αv中文字幕久久琪琪布 | 丰满护士巨好爽好大乳 | 国产女主播喷水视频在线观看 | 99国产精品白浆在线观看免费 | 性开放的女人aaa片 | 亚洲国产精品美女久久久久 | 久久久久99精品国产片 | 亚洲色欲色欲欲www在线 | 国产成人av免费观看 | 全球成人中文在线 | 国产特级毛片aaaaaa高潮流水 | 性生交片免费无码看人 | 精品无码成人片一区二区98 | 国产成人综合美国十次 | 日本欧美一区二区三区乱码 | 欧美大屁股xxxxhd黑色 | 国产精品久久久久7777 | 高清不卡一区二区三区 | 国产人妻精品一区二区三区不卡 | 粉嫩少妇内射浓精videos | 国产小呦泬泬99精品 | 亚洲乱码中文字幕在线 | 偷窥日本少妇撒尿chinese | 国产凸凹视频一区二区 | 成人性做爰aaa片免费看不忠 | 日日碰狠狠丁香久燥 | 亚洲色成人中文字幕网站 | 日本成熟视频免费视频 | 国产美女极度色诱视频www | 日本精品人妻无码77777 天堂一区人妻无码 | 自拍偷自拍亚洲精品被多人伦好爽 | 噜噜噜亚洲色成人网站 | 国产凸凹视频一区二区 | 夜夜躁日日躁狠狠久久av | 东北女人啪啪对白 | 国产福利视频一区二区 | 亚洲综合无码久久精品综合 | 55夜色66夜色国产精品视频 | 欧美性生交xxxxx久久久 | 性生交片免费无码看人 | 亚洲精品美女久久久久久久 | 欧美性色19p | 国产乱人伦av在线无码 | 亚洲乱亚洲乱妇50p | 成人免费视频在线观看 | 精品熟女少妇av免费观看 | 麻豆蜜桃av蜜臀av色欲av | 波多野结衣高清一区二区三区 | 国产欧美亚洲精品a | 国产 精品 自在自线 | 国产国产精品人在线视 | 亚洲毛片av日韩av无码 | 大地资源中文第3页 | 99久久婷婷国产综合精品青草免费 | 欧美性色19p | 人妻无码久久精品人妻 | 天天综合网天天综合色 | 男人和女人高潮免费网站 | 国产成人无码av片在线观看不卡 | 人妻少妇精品视频专区 | 免费看少妇作爱视频 | 国产乱人伦app精品久久 国产在线无码精品电影网 国产国产精品人在线视 | 丝袜美腿亚洲一区二区 | 久久亚洲国产成人精品性色 | 人人妻在人人 | 国产美女极度色诱视频www | 人人妻人人藻人人爽欧美一区 | 丰腴饱满的极品熟妇 | 亚洲国产精品一区二区美利坚 | 无码国产色欲xxxxx视频 | 午夜成人1000部免费视频 | 3d动漫精品啪啪一区二区中 | 中文字幕乱码亚洲无线三区 | 九九久久精品国产免费看小说 | 国产免费观看黄av片 | 久久99久久99精品中文字幕 | 亚欧洲精品在线视频免费观看 | 沈阳熟女露脸对白视频 | 水蜜桃亚洲一二三四在线 | 香蕉久久久久久av成人 | 欧美丰满老熟妇xxxxx性 | 日韩无套无码精品 | 国产成人无码a区在线观看视频app | 一个人免费观看的www视频 | 成年美女黄网站色大免费视频 | 色综合久久久无码网中文 | 欧美国产日韩久久mv | 人妻人人添人妻人人爱 | 十八禁真人啪啪免费网站 | 久久zyz资源站无码中文动漫 | 丰满岳乱妇在线观看中字无码 | 亚洲乱码国产乱码精品精 | 鲁大师影院在线观看 | 色偷偷人人澡人人爽人人模 | 婷婷五月综合缴情在线视频 | 97久久国产亚洲精品超碰热 | 久久精品无码一区二区三区 | 国产女主播喷水视频在线观看 | 欧美日韩一区二区综合 | 99精品国产综合久久久久五月天 | 黄网在线观看免费网站 | 亚洲欧洲中文日韩av乱码 | аⅴ资源天堂资源库在线 | 亚洲国产成人av在线观看 | 乱人伦中文视频在线观看 | 久久国产精品萌白酱免费 | 无套内谢的新婚少妇国语播放 | 妺妺窝人体色www婷婷 | 久久无码专区国产精品s | 欧美日韩亚洲国产精品 | 免费观看黄网站 | 国产内射老熟女aaaa | 老司机亚洲精品影院 | 美女极度色诱视频国产 | 亚洲成在人网站无码天堂 | 乱人伦人妻中文字幕无码久久网 | 成人三级无码视频在线观看 | 东京热男人av天堂 | 18禁止看的免费污网站 | 久久精品99久久香蕉国产色戒 | 色欲人妻aaaaaaa无码 | 久久久久se色偷偷亚洲精品av | 久久精品一区二区三区四区 | 亚洲综合久久一区二区 | 久久综合给久久狠狠97色 | 四虎国产精品一区二区 | 3d动漫精品啪啪一区二区中 | 麻豆成人精品国产免费 | www一区二区www免费 | 97se亚洲精品一区 | 亚洲日韩av一区二区三区中文 | 国产麻豆精品一区二区三区v视界 | 成人毛片一区二区 | 88国产精品欧美一区二区三区 | 国产在线精品一区二区高清不卡 | 99久久久无码国产精品免费 | 国产精品99爱免费视频 | 国产绳艺sm调教室论坛 | 成人免费无码大片a毛片 | 久在线观看福利视频 | 亚洲日韩一区二区三区 | 男女性色大片免费网站 | 日韩无套无码精品 | 少女韩国电视剧在线观看完整 | 激情内射日本一区二区三区 | 人妻少妇精品无码专区动漫 | 暴力强奷在线播放无码 | 欧美熟妇另类久久久久久不卡 | 日韩精品无码一区二区中文字幕 | 老头边吃奶边弄进去呻吟 | 午夜精品久久久久久久 | 成人一在线视频日韩国产 | 久久99精品国产麻豆 | 国产精品亚洲五月天高清 | 亚洲第一无码av无码专区 | 久久综合香蕉国产蜜臀av | 国产精品第一区揄拍无码 | 久久久久久a亚洲欧洲av冫 | 老司机亚洲精品影院无码 | 欧美精品无码一区二区三区 | 狂野欧美性猛xxxx乱大交 | 日产国产精品亚洲系列 | 精品无码成人片一区二区98 | 大地资源网第二页免费观看 | 国产9 9在线 | 中文 | 国语精品一区二区三区 | 亚洲一区二区观看播放 | 极品嫩模高潮叫床 | 国产精品多人p群无码 | 激情五月综合色婷婷一区二区 | 欧洲熟妇色 欧美 | 丰满肥臀大屁股熟妇激情视频 | av无码久久久久不卡免费网站 | 扒开双腿疯狂进出爽爽爽视频 | 色一情一乱一伦 | 性啪啪chinese东北女人 | 1000部啪啪未满十八勿入下载 | 亚洲精品久久久久中文第一幕 | 男女作爱免费网站 | 国产国产精品人在线视 | 欧美自拍另类欧美综合图片区 | 亚洲性无码av中文字幕 | 天天燥日日燥 | 亚洲狠狠色丁香婷婷综合 | 丰满人妻翻云覆雨呻吟视频 | 亚洲精品中文字幕 | 97人妻精品一区二区三区 | 熟妇人妻无码xxx视频 | 熟女少妇在线视频播放 | 特级做a爰片毛片免费69 | 国产性生大片免费观看性 | 噜噜噜亚洲色成人网站 | 成 人影片 免费观看 | 伊人色综合久久天天小片 | 久久国产36精品色熟妇 | 大地资源中文第3页 | 国产麻豆精品一区二区三区v视界 | 中文字幕人成乱码熟女app | 亚洲日本va午夜在线电影 | 18无码粉嫩小泬无套在线观看 | 国产黄在线观看免费观看不卡 | 亚洲高清偷拍一区二区三区 | 国产精品对白交换视频 | 无遮挡啪啪摇乳动态图 | 久久天天躁夜夜躁狠狠 | 欧美成人免费全部网站 | 日本护士xxxxhd少妇 | 欧美熟妇另类久久久久久不卡 | 99riav国产精品视频 | 久久久久久九九精品久 | 无码国产色欲xxxxx视频 | 日本护士xxxxhd少妇 | 四虎4hu永久免费 | 水蜜桃色314在线观看 | 欧美日本日韩 | 亚洲 a v无 码免 费 成 人 a v | 精品人妻人人做人人爽 | 中文字幕无码免费久久9一区9 | 中文字幕乱码人妻二区三区 | 欧美熟妇另类久久久久久不卡 | 强开小婷嫩苞又嫩又紧视频 | 久久久久99精品国产片 | 少妇人妻av毛片在线看 | 色欲av亚洲一区无码少妇 | 亚洲精品欧美二区三区中文字幕 | 老头边吃奶边弄进去呻吟 | 国产精品嫩草久久久久 | 特黄特色大片免费播放器图片 | 成年美女黄网站色大免费视频 | 免费无码的av片在线观看 | 亚洲精品成人av在线 | 国产av剧情md精品麻豆 | 夜精品a片一区二区三区无码白浆 | 伊在人天堂亚洲香蕉精品区 | 人人爽人人澡人人人妻 | 久久综合激激的五月天 | 97久久精品无码一区二区 | 亚洲 欧美 激情 小说 另类 | 少妇厨房愉情理9仑片视频 | 亚洲中文字幕va福利 | 中文字幕无码免费久久99 | 精品久久久久香蕉网 | 国产乱人伦av在线无码 | 亚洲啪av永久无码精品放毛片 | 欧美日韩色另类综合 | 老头边吃奶边弄进去呻吟 | 人人澡人人妻人人爽人人蜜桃 | 日本精品人妻无码免费大全 | 日韩精品成人一区二区三区 | 伊人久久大香线蕉亚洲 | 一区二区三区高清视频一 | 激情亚洲一区国产精品 | 乱中年女人伦av三区 | 人人妻人人澡人人爽欧美一区九九 | 亚洲午夜福利在线观看 | 人妻互换免费中文字幕 | 中文字幕无码免费久久9一区9 | 免费观看的无遮挡av | 国产婷婷色一区二区三区在线 | 成人av无码一区二区三区 | 最新国产乱人伦偷精品免费网站 | 久久国产精品萌白酱免费 | 久久亚洲精品中文字幕无男同 | 午夜无码区在线观看 | 97se亚洲精品一区 | 国产精品无码一区二区桃花视频 | 国产亚洲精品久久久久久久 | av小次郎收藏 | 国产suv精品一区二区五 | av在线亚洲欧洲日产一区二区 | 欧美刺激性大交 | 麻豆成人精品国产免费 | 亚洲自偷精品视频自拍 | 久久精品99久久香蕉国产色戒 | 中文无码精品a∨在线观看不卡 | 日韩欧美成人免费观看 | 国产成人综合美国十次 | 无码av最新清无码专区吞精 | 国产性生大片免费观看性 | 香蕉久久久久久av成人 | 欧美日韩精品 | 国产香蕉97碰碰久久人人 | 日本一卡2卡3卡四卡精品网站 | 国产在热线精品视频 | 中国女人内谢69xxxx | 国产精品va在线播放 | 亚洲无人区一区二区三区 | 大地资源网第二页免费观看 | 亚洲狠狠色丁香婷婷综合 | 牛和人交xxxx欧美 | 熟女俱乐部五十路六十路av | 中文字幕无码视频专区 | 波多野结衣乳巨码无在线观看 | 熟女少妇人妻中文字幕 | 亚洲一区二区三区含羞草 | 99精品视频在线观看免费 | 国产又粗又硬又大爽黄老大爷视 | 一二三四在线观看免费视频 | 无码国产乱人伦偷精品视频 | 99精品无人区乱码1区2区3区 | 亚洲国产精华液网站w | 久久国产劲爆∧v内射 | 国产免费无码一区二区视频 | 特级做a爰片毛片免费69 | 丝袜足控一区二区三区 | 欧美兽交xxxx×视频 | 午夜福利不卡在线视频 | 亚洲人成网站色7799 | 国产极品美女高潮无套在线观看 | 一本无码人妻在中文字幕免费 | 亚洲精品鲁一鲁一区二区三区 | 乱人伦人妻中文字幕无码久久网 | 九九久久精品国产免费看小说 | 偷窥村妇洗澡毛毛多 | 人妻有码中文字幕在线 | 亚洲va欧美va天堂v国产综合 | 一本大道伊人av久久综合 | 18精品久久久无码午夜福利 | 日本护士xxxxhd少妇 | 成熟妇人a片免费看网站 | 久久久久久久人妻无码中文字幕爆 | 国产成人精品久久亚洲高清不卡 | 精品偷自拍另类在线观看 | 丁香花在线影院观看在线播放 | 伊人色综合久久天天小片 | 精品无人国产偷自产在线 | 国产成人综合在线女婷五月99播放 | 国产成人无码av在线影院 | 久久无码人妻影院 | 精品国产一区二区三区av 性色 | 色老头在线一区二区三区 | 亚洲最大成人网站 | 国产卡一卡二卡三 | 无码帝国www无码专区色综合 | 国产精品va在线观看无码 | 色婷婷av一区二区三区之红樱桃 | 狠狠色噜噜狠狠狠狠7777米奇 | 日韩视频 中文字幕 视频一区 | 国产av人人夜夜澡人人爽麻豆 | 亚洲色欲久久久综合网东京热 | 中文无码精品a∨在线观看不卡 | 亚洲狠狠婷婷综合久久 | 清纯唯美经典一区二区 | 国产激情无码一区二区app | 久9re热视频这里只有精品 | 亚洲欧美国产精品久久 | 久久99精品久久久久久动态图 | 激情爆乳一区二区三区 | 少妇人妻偷人精品无码视频 | 97无码免费人妻超级碰碰夜夜 | 国产成人精品一区二区在线小狼 | 日韩欧美中文字幕在线三区 | 国产在线aaa片一区二区99 | 国产成人av免费观看 | 97夜夜澡人人爽人人喊中国片 | 国产在线aaa片一区二区99 | 天堂а√在线地址中文在线 | www一区二区www免费 | 欧美一区二区三区 | 夜夜躁日日躁狠狠久久av | 蜜桃无码一区二区三区 | 波多野结衣av一区二区全免费观看 | 国产成人无码一二三区视频 | 精品无人区无码乱码毛片国产 | 久久亚洲日韩精品一区二区三区 | 女人被男人躁得好爽免费视频 | 丰满少妇女裸体bbw | 性做久久久久久久久 | 日日鲁鲁鲁夜夜爽爽狠狠 | 给我免费的视频在线观看 | 人妻无码αv中文字幕久久琪琪布 | 亚洲无人区午夜福利码高清完整版 | 国产欧美精品一区二区三区 | 日韩精品a片一区二区三区妖精 | 国产亚洲欧美在线专区 | 亚洲成a人片在线观看无码 | 亚洲国产成人av在线观看 | 曰韩少妇内射免费播放 | 内射巨臀欧美在线视频 | 撕开奶罩揉吮奶头视频 | 欧美变态另类xxxx | 亚洲无人区一区二区三区 | 国产无遮挡吃胸膜奶免费看 | 精品成人av一区二区三区 | 午夜无码人妻av大片色欲 | 3d动漫精品啪啪一区二区中 | 亚洲男人av香蕉爽爽爽爽 | 欧美国产亚洲日韩在线二区 | 国产在线无码精品电影网 | 亚洲中文字幕久久无码 | 国产亚洲精品久久久久久国模美 | 日韩欧美中文字幕在线三区 | 亚洲s码欧洲m码国产av | 午夜不卡av免费 一本久久a久久精品vr综合 | 久久国产精品二国产精品 | 丰满护士巨好爽好大乳 | 亚洲乱码中文字幕在线 | 国内精品人妻无码久久久影院 | 色 综合 欧美 亚洲 国产 | 天天摸天天透天天添 | 台湾无码一区二区 | 国产精品无码mv在线观看 | 日本一区二区三区免费高清 | 强辱丰满人妻hd中文字幕 | 精品国产国产综合精品 | 性色欲情网站iwww九文堂 | 国产xxx69麻豆国语对白 | 国产成人无码av在线影院 | 国产人成高清在线视频99最全资源 | 97夜夜澡人人爽人人喊中国片 | 精品久久久中文字幕人妻 | 人妻有码中文字幕在线 | 在线亚洲高清揄拍自拍一品区 | 亲嘴扒胸摸屁股激烈网站 | 亚洲一区二区三区香蕉 | 亚洲无人区午夜福利码高清完整版 | 人妻少妇精品无码专区动漫 | 国产精品内射视频免费 | 国产精品无码mv在线观看 | 精品亚洲成av人在线观看 | 老司机亚洲精品影院无码 | 亚洲精品久久久久久一区二区 | 国产69精品久久久久app下载 | 少妇无码av无码专区在线观看 | 成人免费视频在线观看 | 欧美乱妇无乱码大黄a片 | 国产在热线精品视频 | 又粗又大又硬又长又爽 | 97人妻精品一区二区三区 | 久久www免费人成人片 | 成 人影片 免费观看 | 国产午夜精品一区二区三区嫩草 | 理论片87福利理论电影 | 性生交大片免费看女人按摩摩 | 久久国产精品萌白酱免费 | 久久久中文久久久无码 | 正在播放东北夫妻内射 | 亚洲 激情 小说 另类 欧美 | 久久久久免费精品国产 | 国产欧美亚洲精品a | 中文字幕av无码一区二区三区电影 | 午夜精品一区二区三区在线观看 | 欧美老妇交乱视频在线观看 | 99久久久无码国产精品免费 | 精品日本一区二区三区在线观看 | 久久午夜夜伦鲁鲁片无码免费 | 人妻无码久久精品人妻 | 少妇高潮喷潮久久久影院 | 国产激情艳情在线看视频 | 蜜桃臀无码内射一区二区三区 | 蜜桃av抽搐高潮一区二区 | 久久综合给合久久狠狠狠97色 | 久9re热视频这里只有精品 | 999久久久国产精品消防器材 | 精品国偷自产在线视频 | 精品夜夜澡人妻无码av蜜桃 | 国产精品无码久久av | 色综合久久久无码中文字幕 | 97久久超碰中文字幕 | 亚洲精品中文字幕久久久久 | 中文精品久久久久人妻不卡 | 欧美日韩一区二区三区自拍 | 好男人社区资源 | 亚洲国产精品毛片av不卡在线 | 久久无码专区国产精品s | 久久亚洲国产成人精品性色 | 十八禁视频网站在线观看 | 国产精品国产自线拍免费软件 | 婷婷丁香六月激情综合啪 | 亚洲色欲色欲欲www在线 | 亚洲精品国产品国语在线观看 | 日本精品人妻无码77777 天堂一区人妻无码 | 中文字幕乱码人妻无码久久 | 中文字幕人妻无码一区二区三区 | 亚洲综合在线一区二区三区 | 高清不卡一区二区三区 | 色 综合 欧美 亚洲 国产 | 国产女主播喷水视频在线观看 | 亚洲伊人久久精品影院 | 人妻少妇精品无码专区动漫 | 国产又爽又黄又刺激的视频 | 欧美午夜特黄aaaaaa片 | 欧美丰满熟妇xxxx | 啦啦啦www在线观看免费视频 | 白嫩日本少妇做爰 | 亚洲国产欧美在线成人 | 天天av天天av天天透 | 欧洲熟妇精品视频 | 国产精品久久精品三级 | 国产亚洲精品久久久久久久久动漫 | 国产一区二区三区日韩精品 | 国产亚洲tv在线观看 | 国产suv精品一区二区五 | 欧美日韩一区二区综合 | 日韩精品无码一本二本三本色 | 欧美 亚洲 国产 另类 | 蜜桃av蜜臀av色欲av麻 999久久久国产精品消防器材 | 国产av剧情md精品麻豆 | 又黄又爽又色的视频 | 中文字幕乱码人妻二区三区 | 高潮毛片无遮挡高清免费视频 | 俺去俺来也在线www色官网 | 国产成人无码a区在线观看视频app | 男人扒开女人内裤强吻桶进去 | 亚洲国产一区二区三区在线观看 | 日本精品久久久久中文字幕 | www国产亚洲精品久久网站 | 国产性猛交╳xxx乱大交 国产精品久久久久久无码 欧洲欧美人成视频在线 | 亚洲成在人网站无码天堂 | 精品久久久中文字幕人妻 | 综合激情五月综合激情五月激情1 | 亚洲国产欧美在线成人 | 国产激情综合五月久久 | 一本色道久久综合狠狠躁 | 久久无码专区国产精品s | 久久五月精品中文字幕 | 国内精品一区二区三区不卡 | 国产午夜视频在线观看 | 日本va欧美va欧美va精品 | 狠狠色噜噜狠狠狠7777奇米 | 六十路熟妇乱子伦 | 久久久婷婷五月亚洲97号色 | 色妞www精品免费视频 | 正在播放东北夫妻内射 | 亚洲一区二区三区香蕉 | 久久99精品久久久久久 | 亚洲欧美精品aaaaaa片 | 成人av无码一区二区三区 | 国产艳妇av在线观看果冻传媒 | 亚洲一区二区三区在线观看网站 | 无套内谢老熟女 | 久久久久久亚洲精品a片成人 | 夫妻免费无码v看片 | 99国产欧美久久久精品 | 欧洲vodafone精品性 | 成人无码视频在线观看网站 | 国产精品嫩草久久久久 | 国产精品理论片在线观看 | 伊在人天堂亚洲香蕉精品区 | 国产成人精品优优av | 欧美精品一区二区精品久久 | 天堂在线观看www | 国产97色在线 | 免 | 中文字幕无码人妻少妇免费 | 国产亚洲视频中文字幕97精品 | 久久综合九色综合97网 | 国产精品手机免费 | 亚洲国产精品无码一区二区三区 | 午夜免费福利小电影 | 双乳奶水饱满少妇呻吟 | 又湿又紧又大又爽a视频国产 | 久久久亚洲欧洲日产国码αv | 亚洲中文字幕va福利 | 亚洲高清偷拍一区二区三区 | 内射白嫩少妇超碰 | av无码不卡在线观看免费 | 色妞www精品免费视频 | 免费男性肉肉影院 | 国产成人无码区免费内射一片色欲 | a国产一区二区免费入口 | 国产精品嫩草久久久久 | 久久aⅴ免费观看 | 国产亚洲日韩欧美另类第八页 | 亚洲国产欧美在线成人 | 精品 日韩 国产 欧美 视频 | 99精品视频在线观看免费 | 日韩 欧美 动漫 国产 制服 | 水蜜桃色314在线观看 | 亚洲自偷自偷在线制服 | 精品乱码久久久久久久 | 天下第一社区视频www日本 | 六月丁香婷婷色狠狠久久 | 99国产欧美久久久精品 | 无码国内精品人妻少妇 | 男人的天堂av网站 | 麻花豆传媒剧国产免费mv在线 | 成人性做爰aaa片免费看 | 中文字幕乱码亚洲无线三区 | 欧美日韩在线亚洲综合国产人 | 精品久久久久久亚洲精品 | 国产亚洲精品久久久久久久 | 初尝人妻少妇中文字幕 | aa片在线观看视频在线播放 | 天天躁日日躁狠狠躁免费麻豆 | 波多野结衣乳巨码无在线观看 | 亚洲色在线无码国产精品不卡 | 亚洲人亚洲人成电影网站色 | 色噜噜亚洲男人的天堂 | 精品人妻人人做人人爽夜夜爽 | 丰满少妇女裸体bbw | 亚洲国产一区二区三区在线观看 | 高潮毛片无遮挡高清免费 | 精品国精品国产自在久国产87 | 99久久久无码国产aaa精品 | 少妇被粗大的猛进出69影院 | 国产色xx群视频射精 | 免费人成在线视频无码 | 国产精品-区区久久久狼 | 奇米综合四色77777久久 东京无码熟妇人妻av在线网址 | 无码国模国产在线观看 | 亚洲熟妇色xxxxx亚洲 | 成熟女人特级毛片www免费 | 成年女人永久免费看片 | 亚洲成av人综合在线观看 | 欧美日韩亚洲国产精品 | 未满小14洗澡无码视频网站 | 国产精品久久久 | 国产精品久久久久久亚洲影视内衣 | 日本xxxx色视频在线观看免费 | 亚洲国产av精品一区二区蜜芽 | 高潮毛片无遮挡高清免费 | 丁香花在线影院观看在线播放 | 国产精品第一国产精品 | 亚洲国产欧美日韩精品一区二区三区 | 亚洲狠狠婷婷综合久久 | 久久久www成人免费毛片 | 国产成人无码区免费内射一片色欲 | 亚洲人成人无码网www国产 | 国精产品一品二品国精品69xx | 久久伊人色av天堂九九小黄鸭 | 国产精品久久久久久久9999 | 色一情一乱一伦一视频免费看 | 最近的中文字幕在线看视频 | 人人妻人人澡人人爽精品欧美 | 永久免费观看美女裸体的网站 | 在线观看国产一区二区三区 | 熟妇人妻中文av无码 | 丰腴饱满的极品熟妇 | 人妻夜夜爽天天爽三区 | 国产人妻人伦精品1国产丝袜 | 精品偷自拍另类在线观看 | 国产猛烈高潮尖叫视频免费 | 日韩在线不卡免费视频一区 | 宝宝好涨水快流出来免费视频 | 国产午夜精品一区二区三区嫩草 | 国产麻豆精品精东影业av网站 | 国产特级毛片aaaaaaa高清 | 欧美 日韩 亚洲 在线 | 漂亮人妻洗澡被公强 日日躁 | 人妻中文无码久热丝袜 | 亚洲色欲色欲天天天www | 国产卡一卡二卡三 | 国产免费久久精品国产传媒 | www国产精品内射老师 | 亚洲欧洲中文日韩av乱码 | 久久成人a毛片免费观看网站 | 色综合久久久无码网中文 | 高中生自慰www网站 | 亚洲精品一区二区三区大桥未久 | 2019午夜福利不卡片在线 | 日本成熟视频免费视频 | 国产高清不卡无码视频 | аⅴ资源天堂资源库在线 | 乌克兰少妇xxxx做受 | 欧美日韩一区二区综合 | 国产女主播喷水视频在线观看 | 97无码免费人妻超级碰碰夜夜 | 亚洲成色在线综合网站 | 亚洲熟妇色xxxxx欧美老妇y | 日本护士xxxxhd少妇 | 国产色xx群视频射精 | 精品无码一区二区三区的天堂 | 色老头在线一区二区三区 | 日日摸夜夜摸狠狠摸婷婷 | 国产精品第一国产精品 | 欧美人与动性行为视频 | 人妻插b视频一区二区三区 | 久久久久人妻一区精品色欧美 | 色婷婷综合激情综在线播放 | 国产综合色产在线精品 | 国产亚洲精品久久久久久久 | 51国偷自产一区二区三区 | 日韩精品成人一区二区三区 | 国产美女精品一区二区三区 | 成人亚洲精品久久久久软件 | 国产精品免费大片 | 日本在线高清不卡免费播放 | 亚洲s色大片在线观看 | 亚洲精品成人福利网站 | 久久久久免费看成人影片 | 久在线观看福利视频 | 国产av无码专区亚洲a∨毛片 | 奇米影视7777久久精品人人爽 | 激情综合激情五月俺也去 | 动漫av一区二区在线观看 | 午夜福利不卡在线视频 | 精品无码一区二区三区爱欲 | 狠狠cao日日穞夜夜穞av | 日本xxxx色视频在线观看免费 | 国产猛烈高潮尖叫视频免费 | 中文字幕乱码人妻无码久久 | 国产精品国产三级国产专播 | 国产熟女一区二区三区四区五区 | 欧美性生交活xxxxxdddd | 精品厕所偷拍各类美女tp嘘嘘 | 精品无人区无码乱码毛片国产 | 在线看片无码永久免费视频 | 久久精品丝袜高跟鞋 | 亚洲七七久久桃花影院 | 久久综合久久自在自线精品自 | 国产乱人偷精品人妻a片 | 97夜夜澡人人双人人人喊 | 国产人成高清在线视频99最全资源 | 四虎影视成人永久免费观看视频 | 人妻天天爽夜夜爽一区二区 | 欧美人与牲动交xxxx | 国产精品毛多多水多 | 给我免费的视频在线观看 | 中文久久乱码一区二区 | 成年美女黄网站色大免费视频 | 婷婷丁香五月天综合东京热 | 国产无av码在线观看 | 在线精品国产一区二区三区 | 精品亚洲成av人在线观看 | 高潮毛片无遮挡高清免费视频 | 国产明星裸体无码xxxx视频 | 亚洲熟妇色xxxxx亚洲 | 亚洲欧洲日本综合aⅴ在线 | 老子影院午夜精品无码 | 国产黄在线观看免费观看不卡 | 亚洲中文字幕av在天堂 | 成人毛片一区二区 | 久久精品女人天堂av免费观看 | 岛国片人妻三上悠亚 | 亚洲精品成a人在线观看 | 对白脏话肉麻粗话av | 又大又紧又粉嫩18p少妇 | 麻豆精品国产精华精华液好用吗 | 亚洲一区二区三区播放 | 97久久超碰中文字幕 | 国产av无码专区亚洲a∨毛片 | 亚洲欧洲中文日韩av乱码 | 无码人妻精品一区二区三区下载 | 国产成人无码午夜视频在线观看 | 99久久久国产精品无码免费 | 国产猛烈高潮尖叫视频免费 | av无码久久久久不卡免费网站 | 88国产精品欧美一区二区三区 | 亚洲中文字幕av在天堂 | 国产特级毛片aaaaaaa高清 | 日韩人妻无码中文字幕视频 | 婷婷五月综合激情中文字幕 | 2019午夜福利不卡片在线 | 免费人成在线视频无码 | 久久久精品国产sm最大网站 | 免费看男女做好爽好硬视频 | 性开放的女人aaa片 | 亚洲а∨天堂久久精品2021 | 亚洲成a人片在线观看无码3d | 日本一卡2卡3卡4卡无卡免费网站 国产一区二区三区影院 | 亚洲精品久久久久avwww潮水 | 精品无人国产偷自产在线 | 久久99精品国产.久久久久 | 内射欧美老妇wbb | 国产乡下妇女做爰 | 精品国产青草久久久久福利 | 日本va欧美va欧美va精品 | 亚洲综合伊人久久大杳蕉 | 又粗又大又硬又长又爽 | 无码乱肉视频免费大全合集 | 国产精品无码一区二区三区不卡 | 免费无码午夜福利片69 | 久精品国产欧美亚洲色aⅴ大片 | 无码人中文字幕 | 狠狠综合久久久久综合网 | 少妇人妻av毛片在线看 | 青草青草久热国产精品 | 亚洲精品无码国产 | 国产色视频一区二区三区 | 东京一本一道一二三区 | 久久久久久国产精品无码下载 | 亚洲国产欧美在线成人 | 中文字幕色婷婷在线视频 | 亚洲综合伊人久久大杳蕉 | 亚洲精品鲁一鲁一区二区三区 | 内射欧美老妇wbb | 精品国产精品久久一区免费式 | 狠狠噜狠狠狠狠丁香五月 | 亚洲の无码国产の无码步美 | 久久综合色之久久综合 | 久久综合给合久久狠狠狠97色 | 日本成熟视频免费视频 | 97久久国产亚洲精品超碰热 | 高清不卡一区二区三区 | 成年女人永久免费看片 | 精品久久久无码中文字幕 | 亚洲熟熟妇xxxx | 99riav国产精品视频 | 国产超碰人人爽人人做人人添 | 国产9 9在线 | 中文 | 真人与拘做受免费视频 | 未满小14洗澡无码视频网站 | 最近免费中文字幕中文高清百度 | 久久视频在线观看精品 | 男女性色大片免费网站 | 成在人线av无码免观看麻豆 | 中国女人内谢69xxxxxa片 | 99精品久久毛片a片 | 亚洲人成网站免费播放 | 日韩欧美群交p片內射中文 | 亚洲熟妇自偷自拍另类 | 丁香花在线影院观看在线播放 | 欧美老人巨大xxxx做受 | 一二三四社区在线中文视频 | 狠狠色噜噜狠狠狠7777奇米 | 婷婷丁香六月激情综合啪 | 精品国产一区av天美传媒 | 色综合久久久无码网中文 | 欧美日本日韩 | 中文字幕日韩精品一区二区三区 | 18黄暴禁片在线观看 | 国产精品99久久精品爆乳 | 国产97在线 | 亚洲 | 亚洲熟女一区二区三区 | 国产成人无码一二三区视频 | 久久zyz资源站无码中文动漫 | 天天爽夜夜爽夜夜爽 | 亚洲精品一区二区三区在线 |