iptables
Модератор: SLEDopit
iptables
пытаюсь пробросить порт через iptables webmin
получается строка -A nat -p tcp -m tcp -i eth3 --dport 80 -j DNAT --to-destination 192.168.2.2
цепочку назвал nat
При попытке применить-
Не удалось применить конфигурацию :
iptables-restore v1.3.6: Line 38 seems to have a -t table option.
Error occurred at line: 38
Try `iptables-restore -h' or 'iptables-restore --help' for more information.
а через скрипт
iptables -A PREROUTING -i eth3 -p tcp -m tcp --dport 80 -j DNAT --to-destination 192.168.2.2 -t nat
все работает
Помогите разобраться
ЗЫ
конфиг
# Generated by iptables-save v1.3.8 on Thu Nov 27 22:07:42 2008
*mangle
:PREROUTING ACCEPT [16625939:16085960115]
:INPUT ACCEPT [21201:13942809]
:FORWARD ACCEPT [16604714:16072001138]
:OUTPUT ACCEPT [21178:4255417]
:POSTROUTING ACCEPT [16625963:16076263724]
COMMIT
# Completed on Thu Nov 27 22:07:42 2008
# Generated by iptables-save v1.3.8 on Thu Nov 27 22:07:42 2008
*nat
:nat - [0:0]
:PREROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
-A POSTROUTING -o eth0 -j MASQUERADE
-A POSTROUTING -o eth1 -j MASQUERADE
-A POSTROUTING -o eth3 -j MASQUERADE
-A POSTROUTING -o gre0 -j MASQUERADE
-A POSTROUTING -o ppp0 -j MASQUERADE
-A nat -p tcp -m tcp -i eth3 --dport 80 -j DNAT --to-destination 192.168.2.2 -t nat
COMMIT
# Completed on Thu Nov 27 22:07:42 2008
# Generated by iptables-save v1.3.8 on Thu Nov 27 22:07:42 2008
*filter
:FORWARD DROP [0:0]
:INPUT DROP [0:0]
:reject_func - [0:0]
:OUTPUT ACCEPT [0:0]
:forward_ext - [0:0]
:forward_int - [0:0]
:input_ext - [0:0]
:input_int - [0:0]
-A INPUT -i lo -j ACCEPT
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i eth2 -j input_int
-A INPUT -i eth0 -j input_int
-A INPUT -p tcp -m tcp -i eth3 --dport 80 -j nat -t nat
-A INPUT -i eth3 -j input_ext
-A INPUT -j input_ext
-A INPUT -m limit --limit 3/min -j LOG --log-prefix "SFW2-IN-ILL-TARGET " --log-tcp-options --log-ip-options
-A FORWARD -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i eth2 -j forward_int
-A FORWARD -i eth0 -j forward_int
-A FORWARD -i eth3 -j forward_ext
-A FORWARD -m limit --limit 3/min -j LOG --log-prefix "SFW2-FWD-ILL-ROUTING " --log-tcp-options --log-ip-options
-A FORWARD -j DROP
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -m limit --limit 3/min -j LOG --log-prefix "SFW2-OUT-ERROR " --log-tcp-options --log-ip-options
-A forward_ext -p icmp -m state -m icmp --icmp-type 0 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p icmp -m state -m icmp --icmp-type 3 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p icmp -m state -m icmp --icmp-type 11 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p icmp -m state -m icmp --icmp-type 12 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p icmp -m state -m icmp --icmp-type 14 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p icmp -m state -m icmp --icmp-type 18 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p icmp -m state -m icmp --icmp-type 3/2 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p icmp -m state -m icmp --icmp-type 5 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -m state -i eth3 -o eth2 --state ESTABLISHED,RELATED -j ACCEPT
-A forward_ext -m state -i eth3 -o eth0 --state ESTABLISHED,RELATED -j ACCEPT
-A forward_ext -m limit -m pkttype --limit 3/min -j LOG --pkt-type multicast --log-prefix "SFW2-FWDext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_ext -m pkttype -j DROP --pkt-type multicast
-A forward_ext -p tcp -m limit -m tcp --tcp-flags FIN,SYN,RST,ACK SYN --limit 3/min -j LOG --log-prefix "SFW2-FWDext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_ext -p icmp -m limit --limit 3/min -j LOG --log-prefix "SFW2-FWDext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_ext -p udp -m limit --limit 3/min -j LOG --log-prefix "SFW2-FWDext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_ext -m limit -m state --limit 3/min --state INVALID -j LOG --log-prefix "SFW2-FWDext-DROP-DEFLT-INV " --log-tcp-options --log-ip-options
-A forward_int -p icmp -m state -m icmp --icmp-type 0 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -p icmp -m state -m icmp --icmp-type 3 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -p icmp -m state -m icmp --icmp-type 11 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -p icmp -m state -m icmp --icmp-type 12 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -p icmp -m state -m icmp --icmp-type 14 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -p icmp -m state -m icmp --icmp-type 18 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -p icmp -m state -m icmp --icmp-type 3/2 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -p icmp -m state -m icmp --icmp-type 5 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -m state -i eth0 -o eth3 --state NEW,ESTABLISHED,RELATED -j ACCEPT
-A forward_int -m state -i eth2 -o eth3 --state NEW,RELATED,ESTABLISHED -j ACCEPT
-A forward_int -m limit -m pkttype --limit 3/min -j LOG --pkt-type multicast --log-prefix "SFW2-FWDint-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_int -m pkttype -j DROP --pkt-type multicast
-A forward_int -p tcp -m limit -m tcp --tcp-flags FIN,SYN,RST,ACK SYN --limit 3/min -j LOG --log-prefix "SFW2-FWDint-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_int -p icmp -m limit --limit 3/min -j LOG --log-prefix "SFW2-FWDint-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_int -p udp -m limit --limit 3/min -j LOG --log-prefix "SFW2-FWDint-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_int -m limit -m state --limit 3/min --state INVALID -j LOG --log-prefix "SFW2-FWDint-DROP-DEFLT-INV " --log-tcp-options --log-ip-options
-A forward_int -j reject_func
-A input_ext -m pkttype -j DROP --pkt-type broadcast
-A input_ext -p icmp -m icmp --icmp-type 4 -j ACCEPT
-A input_ext -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A input_ext -p tcp -m tcp -m state --dport 113 --state NEW -j reject_func
-A input_ext -m limit -m pkttype --limit 3/min -j LOG --pkt-type multicast --log-prefix "SFW2-INext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A input_ext -m pkttype -j DROP --pkt-type multicast
-A input_ext -p tcp -m limit -m tcp --tcp-flags FIN,SYN,RST,ACK SYN --limit 3/min -j LOG --log-prefix "SFW2-INext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A input_ext -p icmp -m limit --limit 3/min -j LOG --log-prefix "SFW2-INext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A input_ext -p udp -m limit --limit 3/min -j LOG --log-prefix "SFW2-INext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A input_ext -m limit -m state --limit 3/min --state INVALID -j LOG --log-prefix "SFW2-INext-DROP-DEFLT-INV " --log-tcp-options --log-ip-options
-A input_ext -j DROP
-A input_int -j ACCEPT
-A reject_func -p tcp -j REJECT --reject-with tcp-reset
-A reject_func -p udp -j REJECT --reject-with icmp-port-unreachable
-A reject_func -j REJECT --reject-with icmp-proto-unreachable
-A forward_ext -j DROP
-A INPUT -j DROP
COMMIT
# Completed on Thu Nov 27 22:07:42 2008
получается строка -A nat -p tcp -m tcp -i eth3 --dport 80 -j DNAT --to-destination 192.168.2.2
цепочку назвал nat
При попытке применить-
Не удалось применить конфигурацию :
iptables-restore v1.3.6: Line 38 seems to have a -t table option.
Error occurred at line: 38
Try `iptables-restore -h' or 'iptables-restore --help' for more information.
а через скрипт
iptables -A PREROUTING -i eth3 -p tcp -m tcp --dport 80 -j DNAT --to-destination 192.168.2.2 -t nat
все работает
Помогите разобраться
ЗЫ
конфиг
# Generated by iptables-save v1.3.8 on Thu Nov 27 22:07:42 2008
*mangle
:PREROUTING ACCEPT [16625939:16085960115]
:INPUT ACCEPT [21201:13942809]
:FORWARD ACCEPT [16604714:16072001138]
:OUTPUT ACCEPT [21178:4255417]
:POSTROUTING ACCEPT [16625963:16076263724]
COMMIT
# Completed on Thu Nov 27 22:07:42 2008
# Generated by iptables-save v1.3.8 on Thu Nov 27 22:07:42 2008
*nat
:nat - [0:0]
:PREROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
-A POSTROUTING -o eth0 -j MASQUERADE
-A POSTROUTING -o eth1 -j MASQUERADE
-A POSTROUTING -o eth3 -j MASQUERADE
-A POSTROUTING -o gre0 -j MASQUERADE
-A POSTROUTING -o ppp0 -j MASQUERADE
-A nat -p tcp -m tcp -i eth3 --dport 80 -j DNAT --to-destination 192.168.2.2 -t nat
COMMIT
# Completed on Thu Nov 27 22:07:42 2008
# Generated by iptables-save v1.3.8 on Thu Nov 27 22:07:42 2008
*filter
:FORWARD DROP [0:0]
:INPUT DROP [0:0]
:reject_func - [0:0]
:OUTPUT ACCEPT [0:0]
:forward_ext - [0:0]
:forward_int - [0:0]
:input_ext - [0:0]
:input_int - [0:0]
-A INPUT -i lo -j ACCEPT
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i eth2 -j input_int
-A INPUT -i eth0 -j input_int
-A INPUT -p tcp -m tcp -i eth3 --dport 80 -j nat -t nat
-A INPUT -i eth3 -j input_ext
-A INPUT -j input_ext
-A INPUT -m limit --limit 3/min -j LOG --log-prefix "SFW2-IN-ILL-TARGET " --log-tcp-options --log-ip-options
-A FORWARD -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i eth2 -j forward_int
-A FORWARD -i eth0 -j forward_int
-A FORWARD -i eth3 -j forward_ext
-A FORWARD -m limit --limit 3/min -j LOG --log-prefix "SFW2-FWD-ILL-ROUTING " --log-tcp-options --log-ip-options
-A FORWARD -j DROP
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -m limit --limit 3/min -j LOG --log-prefix "SFW2-OUT-ERROR " --log-tcp-options --log-ip-options
-A forward_ext -p icmp -m state -m icmp --icmp-type 0 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p icmp -m state -m icmp --icmp-type 3 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p icmp -m state -m icmp --icmp-type 11 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p icmp -m state -m icmp --icmp-type 12 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p icmp -m state -m icmp --icmp-type 14 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p icmp -m state -m icmp --icmp-type 18 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p icmp -m state -m icmp --icmp-type 3/2 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p icmp -m state -m icmp --icmp-type 5 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -m state -i eth3 -o eth2 --state ESTABLISHED,RELATED -j ACCEPT
-A forward_ext -m state -i eth3 -o eth0 --state ESTABLISHED,RELATED -j ACCEPT
-A forward_ext -m limit -m pkttype --limit 3/min -j LOG --pkt-type multicast --log-prefix "SFW2-FWDext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_ext -m pkttype -j DROP --pkt-type multicast
-A forward_ext -p tcp -m limit -m tcp --tcp-flags FIN,SYN,RST,ACK SYN --limit 3/min -j LOG --log-prefix "SFW2-FWDext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_ext -p icmp -m limit --limit 3/min -j LOG --log-prefix "SFW2-FWDext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_ext -p udp -m limit --limit 3/min -j LOG --log-prefix "SFW2-FWDext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_ext -m limit -m state --limit 3/min --state INVALID -j LOG --log-prefix "SFW2-FWDext-DROP-DEFLT-INV " --log-tcp-options --log-ip-options
-A forward_int -p icmp -m state -m icmp --icmp-type 0 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -p icmp -m state -m icmp --icmp-type 3 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -p icmp -m state -m icmp --icmp-type 11 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -p icmp -m state -m icmp --icmp-type 12 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -p icmp -m state -m icmp --icmp-type 14 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -p icmp -m state -m icmp --icmp-type 18 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -p icmp -m state -m icmp --icmp-type 3/2 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -p icmp -m state -m icmp --icmp-type 5 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -m state -i eth0 -o eth3 --state NEW,ESTABLISHED,RELATED -j ACCEPT
-A forward_int -m state -i eth2 -o eth3 --state NEW,RELATED,ESTABLISHED -j ACCEPT
-A forward_int -m limit -m pkttype --limit 3/min -j LOG --pkt-type multicast --log-prefix "SFW2-FWDint-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_int -m pkttype -j DROP --pkt-type multicast
-A forward_int -p tcp -m limit -m tcp --tcp-flags FIN,SYN,RST,ACK SYN --limit 3/min -j LOG --log-prefix "SFW2-FWDint-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_int -p icmp -m limit --limit 3/min -j LOG --log-prefix "SFW2-FWDint-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_int -p udp -m limit --limit 3/min -j LOG --log-prefix "SFW2-FWDint-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_int -m limit -m state --limit 3/min --state INVALID -j LOG --log-prefix "SFW2-FWDint-DROP-DEFLT-INV " --log-tcp-options --log-ip-options
-A forward_int -j reject_func
-A input_ext -m pkttype -j DROP --pkt-type broadcast
-A input_ext -p icmp -m icmp --icmp-type 4 -j ACCEPT
-A input_ext -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A input_ext -p tcp -m tcp -m state --dport 113 --state NEW -j reject_func
-A input_ext -m limit -m pkttype --limit 3/min -j LOG --pkt-type multicast --log-prefix "SFW2-INext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A input_ext -m pkttype -j DROP --pkt-type multicast
-A input_ext -p tcp -m limit -m tcp --tcp-flags FIN,SYN,RST,ACK SYN --limit 3/min -j LOG --log-prefix "SFW2-INext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A input_ext -p icmp -m limit --limit 3/min -j LOG --log-prefix "SFW2-INext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A input_ext -p udp -m limit --limit 3/min -j LOG --log-prefix "SFW2-INext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A input_ext -m limit -m state --limit 3/min --state INVALID -j LOG --log-prefix "SFW2-INext-DROP-DEFLT-INV " --log-tcp-options --log-ip-options
-A input_ext -j DROP
-A input_int -j ACCEPT
-A reject_func -p tcp -j REJECT --reject-with tcp-reset
-A reject_func -p udp -j REJECT --reject-with icmp-port-unreachable
-A reject_func -j REJECT --reject-with icmp-proto-unreachable
-A forward_ext -j DROP
-A INPUT -j DROP
COMMIT
# Completed on Thu Nov 27 22:07:42 2008
Re: iptables
Зачем вам новая цепочка? Есть ведь стандартная PREROUTING (в которой и должен быть DNAT).
В общем замените на такую строчку
-A PREROUTING -p tcp -m tcp -i eth3 --dport 80 -j DNAT --to-destination 192.168.2.2
И еще надо в FORWARD разрешить прохождение пакетов к/от 192.168.2.2:80
В общем замените на такую строчку
-A PREROUTING -p tcp -m tcp -i eth3 --dport 80 -j DNAT --to-destination 192.168.2.2
И еще надо в FORWARD разрешить прохождение пакетов к/от 192.168.2.2:80
Re: iptables
Эта строчка не имеет смысла
-A INPUT -p tcp -m tcp -i eth3 --dport 80 -j nat -t nat
Пакеты прошедшие через DNAT/SNAT проходят только через цепочку FORWARD
В INPUT/OUTPUT попадают пакеты которые относятся непосредственно к этому компьютеру.
Перед
-A forward_ext -m state -i eth3 -o eth2 --state ESTABLISHED,RELATED -j ACCEPT
вставьте
-A forward_ext -i eth3 -m tcp -p tcp -d 192.168.2.2 --dport 80 -j ACCEPT
Этого вроде должно хватить
-A INPUT -p tcp -m tcp -i eth3 --dport 80 -j nat -t nat
Пакеты прошедшие через DNAT/SNAT проходят только через цепочку FORWARD
В INPUT/OUTPUT попадают пакеты которые относятся непосредственно к этому компьютеру.
Перед
-A forward_ext -m state -i eth3 -o eth2 --state ESTABLISHED,RELATED -j ACCEPT
вставьте
-A forward_ext -i eth3 -m tcp -p tcp -d 192.168.2.2 --dport 80 -j ACCEPT
Этого вроде должно хватить
Re: iptables
skor писал(а): ↑26.01.2009 13:55Эта строчка не имеет смысла
-A INPUT -p tcp -m tcp -i eth3 --dport 80 -j nat -t nat
Пакеты прошедшие через DNAT/SNAT проходят только через цепочку FORWARD
В INPUT/OUTPUT попадают пакеты которые относятся непосредственно к этому компьютеру.
Перед
-A forward_ext -m state -i eth3 -o eth2 --state ESTABLISHED,RELATED -j ACCEPT
вставьте
-A forward_ext -i eth3 -m tcp -p tcp -d 192.168.2.2 --dport 80 -j ACCEPT
Этого вроде должно хватить
применил, но из нета сайт не грузит((
Re: iptables
Хм... я заметил такое правило
-A POSTROUTING -o ppp0 -j MASQUERADE
А вы через какой интерфейс получаете интернет?
Через eth3 (на нем прописан ваш внешний интернетовский адрес) или через ppp0 (подключаетесь с логином/паролем к серверу провайдера и уже через это соединение получаете интернет)?
И вообще, правил накручено дофига.
Лучше все это стереть и писать правила с 0 (с полным пониманием того зачем вам это правило и что оно будет делать).
-A POSTROUTING -o ppp0 -j MASQUERADE
А вы через какой интерфейс получаете интернет?
Через eth3 (на нем прописан ваш внешний интернетовский адрес) или через ppp0 (подключаетесь с логином/паролем к серверу провайдера и уже через это соединение получаете интернет)?
И вообще, правил накручено дофига.
Лучше все это стереть и писать правила с 0 (с полным пониманием того зачем вам это правило и что оно будет делать).
Re: iptables
skor писал(а): ↑26.01.2009 14:10Хм... я заметил такое правило
-A POSTROUTING -o ppp0 -j MASQUERADE
А вы через какой интерфейс получаете интернет?
Через eth3 (на нем прописан ваш внешний интернетовский адрес) или через ppp0 (подключаетесь с логином/паролем к серверу провайдера и уже через это соединение получаете интернет)?
через eth3
gre0 и ppp0 не активные в данный момент
Re: iptables
Кстати посмотрите в логах (вроде в kern.log) нет ли там сообщений со строчкой SFW2-FWDext-DROP-DEFLT или подобное.
Re: iptables
есть Jan 26 16:12:51 gw kernel: SFW2-INext-DROP-DEFLT IN=eth3 OUT= MAC=00:15:17:24:bb:c5:00:1b:54:43:7f:30:08:00 SRC=89.151.х.х DST=77.240.х.х LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=17567 DF PROTO=TCP SPT=34485 DPT=80 WINDOW=5440 RES=0x00 SYN URGP=0 OPT (020405500402080A078660DE0000000001030307)
Re: iptables
А покажите еще раз конфиг, только включите его в теги
чтоб небыло "простыни"
Код: Выделить всё
[codebox] ... [/codebox]
чтоб небыло "простыни"
Re: iptables
skor писал(а): ↑26.01.2009 14:34А покажите еще раз конфиг, только включите его в теги
Код: Выделить всё
[codebox] ... [/codebox]
чтоб небыло "простыни"
Код:
# Generated by iptables-save v1.3.8 on Thu Nov 27 22:07:42 2008
*mangle
:PREROUTING ACCEPT [16625939:16085960115]
:INPUT ACCEPT [21201:13942809]
:FORWARD ACCEPT [16604714:16072001138]
:OUTPUT ACCEPT [21178:4255417]
:POSTROUTING ACCEPT [16625963:16076263724]
COMMIT
# Completed on Thu Nov 27 22:07:42 2008
# Generated by iptables-save v1.3.8 on Thu Nov 27 22:07:42 2008
*nat
:PREROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
-A POSTROUTING -o eth0 -j MASQUERADE
-A POSTROUTING -o eth1 -j MASQUERADE
-A POSTROUTING -o eth3 -j MASQUERADE
-A POSTROUTING -o gre0 -j MASQUERADE
-A POSTROUTING -o ppp0 -j MASQUERADE
COMMIT
# Completed on Thu Nov 27 22:07:42 2008
# Generated by iptables-save v1.3.8 on Thu Nov 27 22:07:42 2008
*filter
:FORWARD DROP [0:0]
:INPUT DROP [0:0]
:reject_func - [0:0]
:OUTPUT ACCEPT [0:0]
:forward_ext - [0:0]
:forward_int - [0:0]
:input_ext - [0:0]
:input_int - [0:0]
-A INPUT -i lo -j ACCEPT
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i eth2 -j input_int
-A INPUT -i eth0 -j input_int
-A INPUT -i eth3 -j input_ext
-A INPUT -j input_ext
-A INPUT -m limit --limit 3/min -j LOG --log-prefix "SFW2-IN-ILL-TARGET " --log-tcp-options --log-ip-options
-A FORWARD -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i eth2 -j forward_int
-A FORWARD -i eth0 -j forward_int
-A FORWARD -i eth3 -j forward_ext
-A FORWARD -m limit --limit 3/min -j LOG --log-prefix "SFW2-FWD-ILL-ROUTING " --log-tcp-options --log-ip-options
-A FORWARD -j DROP
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -m limit --limit 3/min -j LOG --log-prefix "SFW2-OUT-ERROR " --log-tcp-options --log-ip-options
-A forward_ext -p icmp -m state -m icmp --icmp-type 0 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p icmp -m state -m icmp --icmp-type 3 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p icmp -m state -m icmp --icmp-type 11 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p icmp -m state -m icmp --icmp-type 12 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p icmp -m state -m icmp --icmp-type 14 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p icmp -m state -m icmp --icmp-type 18 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p icmp -m state -m icmp --icmp-type 3/2 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p icmp -m state -m icmp --icmp-type 5 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_ext -p tcp -m tcp -d 192.168.2.2 -i eth3 --dport 80 -j ACCEPT
-A forward_ext -m state -i eth3 -o eth2 --state ESTABLISHED,RELATED -j ACCEPT
-A forward_ext -m state -i eth3 -o eth0 --state ESTABLISHED,RELATED -j ACCEPT
-A forward_ext -m limit -m pkttype --limit 3/min -j LOG --pkt-type multicast --log-prefix "SFW2-FWDext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_ext -m pkttype -j DROP --pkt-type multicast
-A forward_ext -p tcp -m limit -m tcp --tcp-flags FIN,SYN,RST,ACK SYN --limit 3/min -j LOG --log-prefix "SFW2-FWDext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_ext -p icmp -m limit --limit 3/min -j LOG --log-prefix "SFW2-FWDext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_ext -p udp -m limit --limit 3/min -j LOG --log-prefix "SFW2-FWDext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_ext -m limit -m state --limit 3/min --state INVALID -j LOG --log-prefix "SFW2-FWDext-DROP-DEFLT-INV " --log-tcp-options --log-ip-options
-A forward_int -p icmp -m state -m icmp --icmp-type 0 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -p icmp -m state -m icmp --icmp-type 3 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -p icmp -m state -m icmp --icmp-type 11 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -p icmp -m state -m icmp --icmp-type 12 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -p icmp -m state -m icmp --icmp-type 14 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -p icmp -m state -m icmp --icmp-type 18 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -p icmp -m state -m icmp --icmp-type 3/2 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -p icmp -m state -m icmp --icmp-type 5 --state RELATED,ESTABLISHED -j ACCEPT
-A forward_int -m state -i eth0 -o eth3 --state NEW,ESTABLISHED,RELATED -j ACCEPT
-A forward_int -m state -i eth2 -o eth3 --state NEW,RELATED,ESTABLISHED -j ACCEPT
-A forward_int -m limit -m pkttype --limit 3/min -j LOG --pkt-type multicast --log-prefix "SFW2-FWDint-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_int -m pkttype -j DROP --pkt-type multicast
-A forward_int -p tcp -m limit -m tcp --tcp-flags FIN,SYN,RST,ACK SYN --limit 3/min -j LOG --log-prefix "SFW2-FWDint-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_int -p icmp -m limit --limit 3/min -j LOG --log-prefix "SFW2-FWDint-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_int -p udp -m limit --limit 3/min -j LOG --log-prefix "SFW2-FWDint-DROP-DEFLT " --log-tcp-options --log-ip-options
-A forward_int -m limit -m state --limit 3/min --state INVALID -j LOG --log-prefix "SFW2-FWDint-DROP-DEFLT-INV " --log-tcp-options --log-ip-options
-A forward_int -j reject_func
-A input_ext -m pkttype -j DROP --pkt-type broadcast
-A input_ext -p icmp -m icmp --icmp-type 4 -j ACCEPT
-A input_ext -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A input_ext -p tcp -m tcp -m state --dport 113 --state NEW -j reject_func
-A input_ext -m limit -m pkttype --limit 3/min -j LOG --pkt-type multicast --log-prefix "SFW2-INext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A input_ext -m pkttype -j DROP --pkt-type multicast
-A input_ext -p tcp -m limit -m tcp --tcp-flags FIN,SYN,RST,ACK SYN --limit 3/min -j LOG --log-prefix "SFW2-INext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A input_ext -p icmp -m limit --limit 3/min -j LOG --log-prefix "SFW2-INext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A input_ext -p udp -m limit --limit 3/min -j LOG --log-prefix "SFW2-INext-DROP-DEFLT " --log-tcp-options --log-ip-options
-A input_ext -m limit -m state --limit 3/min --state INVALID -j LOG --log-prefix "SFW2-INext-DROP-DEFLT-INV " --log-tcp-options --log-ip-options
-A input_ext -j DROP
-A input_int -j ACCEPT
-A reject_func -p tcp -j REJECT --reject-with tcp-reset
-A reject_func -p udp -j REJECT --reject-with icmp-port-unreachable
-A reject_func -j REJECT --reject-with icmp-proto-unreachable
-A forward_ext -j DROP
-A INPUT -j DROP
COMMIT
# Completed on Thu Nov 27 22:07:42 2008
Re: iptables
*nat
:PREROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
-A POSTROUTING -o eth0 -j MASQUERADE
-A POSTROUTING -o eth1 -j MASQUERADE
-A POSTROUTING -o eth3 -j MASQUERADE
-A POSTROUTING -o gre0 -j MASQUERADE
-A POSTROUTING -o ppp0 -j MASQUERADE
-A PREROUTING -p tcp -m tcp -i eth3 --dport 80 -j DNAT --to-destination 192.168.2.2
Главного то правила и нету...
Re: iptables
skor писал(а): ↑26.01.2009 15:25*nat
:PREROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
-A POSTROUTING -o eth0 -j MASQUERADE
-A POSTROUTING -o eth1 -j MASQUERADE
-A POSTROUTING -o eth3 -j MASQUERADE
-A POSTROUTING -o gre0 -j MASQUERADE
-A POSTROUTING -o ppp0 -j MASQUERADE
-A PREROUTING -p tcp -m tcp -i eth3 --dport 80 -j DNAT --to-destination 192.168.2.2
Главного то правила и нету...
упппссс спасибо)))))