The method of user authentication in IPTABLES for Login`y

Sold 0
Refunds 0
Good feedbacks 0
Bad feedbacks 0

The challenge is to find a method or algorithm for user authentication in IPTABLES. "Is it possible to implement in IPTABLES authorization for the user?". The work proved the relevance of a single method with a detailed description of its installation.
I have analyzed the available market tools to solve such a problem. To my surprise, they were all part of a commercial project (disparate billing systems, traffic analyzers). Problem description User authentication on the Internet is virtually absent.

(Either very scarce, there is only information about the authorization of IP-MAC). After examining the structure of iptables, plus the application of the information that was able to dobyt- I had the idea to solve the problem, which I will describe in sequence in this report. I decided to create a database that will store all user data (which must authorize in iptables):