All of lore.kernel.org
 help / color / mirror / Atom feed
* Prob com REDIRECT + IPROUT2
@ 2005-06-24  0:36 Sebastião Antônio Campos (Infojoi)
  2005-06-24 12:43 ` iptables h323 rrq and sip 5060 ADEGOKE ARUNA
  0 siblings, 1 reply; 3+ messages in thread
From: Sebastião Antônio Campos (Infojoi) @ 2005-06-24  0:36 UTC (permalink / raw)
  To: netfilter

Alguém tem uma solução para mim???

Galera...

I have two links to internet, one by ADSL (512 kbps) e other EMBRATEL ( 1024 
Kpbs ).
I did "ip route" e it happen ok, but whem I put the with iptables to traffic 
on 80 port redirect to 3128 port of SQUID, I can only use the ADSL link, 
what is default link.
The configurations:

( ADSL 512K )       eth0
Server IP  = 192.168.7.2
Modem IP     = 192.168.7.1

( EMBRATEL 1024K )  eth1
Server IP  = 200.200.200.2
Router IP    = 200.200.200.1

( LAN 1)      eth2
Server IP  = 10.0.0.1
LAN   = 10.0.0.0/24

( LAN 2)      eth2:1
Server IP  = 192.168.0.1
LAN   = 192.168.0.0/24

#iptables -t nat -A POSTROUTING -o eth0 -s 192.168.0.0/24 -j 
SNAT --to-soutce 192.168.7.1
#iptables -t nat -A POSTROUTING -o eth1 -s 10.0.0.20 -j SNAT --to-soutce 
200.200.200.2
#ip rule add from 10.0.0.20/32 table embratel
#ip route add 200.200.200.1 dev eth1 table embratel
#ip route add default via 200.200.200.1 table embratel
#ip route add 10.0.0.20/32 via 10.0.0.1 table embratel

Here everything is workingm, but when I put the following rule....the 
traffic goes to only ADSL Link that is the default gateway.

#iptables -t nat -A PREROUTING -p tcp -i eth2 --dport 80 -j 
REDIRECT --to-port 3128

I am some help me.

Tks

Sebastião Antônio Campos



^ permalink raw reply	[flat|nested] 3+ messages in thread

* iptables h323 rrq and sip 5060
  2005-06-24  0:36 Prob com REDIRECT + IPROUT2 Sebastião Antônio Campos (Infojoi)
@ 2005-06-24 12:43 ` ADEGOKE ARUNA
  0 siblings, 0 replies; 3+ messages in thread
From: ADEGOKE ARUNA @ 2005-06-24 12:43 UTC (permalink / raw)
  To: netfilter-bounces, netfilter

kindly help,

I am new to iptables and I wish to allow my workstations behind a firewall
to get registred to h323 gatekeeper and sip proxy.

And for h323 gatekeeper, the workstation need to connect with port 1720 and
iptables does not allow this.

And again the sip proxy too needs port 5060. can somebody please help. My
firewall tables is as below.

Aruna



*mangle
:PREROUTING ACCEPT [693725:269731615]
:INPUT ACCEPT [17143:2024798]
:FORWARD ACCEPT [668493:267392562]
:OUTPUT ACCEPT [12304:1113266]
:POSTROUTING ACCEPT [681449:268539732]
COMMIT
# Completed on Fri Jun 24 13:42:48 2005
# Generated by iptables-save v1.2.7a on Fri Jun 24 13:42:48 2005
*nat
:PREROUTING ACCEPT [89368:5853018]
:POSTROUTING ACCEPT [36:5295]
:OUTPUT ACCEPT [767:52073]
-A PREROUTING -i eth0 -p udp -m udp --dport 0 -j REDIRECT --to-ports 5060
-A PREROUTING -i eth1 -p udp -m udp --dport 0 -j REDIRECT --to-ports 5060
-A PREROUTING -p tcp -m tcp --dport 1719 -j DNAT --to-destination
62.193.164.82:1719
-A PREROUTING -p tcp -m tcp --dport 1720 -j DNAT --to-destination
62.193.164.82:1720
-A PREROUTING -p udp -m udp --dport 1720 -j DNAT --to-destination
62.193.164.82:1720
-A PREROUTING -p udp -m udp --dport 1719 -j DNAT --to-destination
62.193.164.82:1719
-A PREROUTING -p udp -m udp --dport 1720 -j DNAT --to-destination
62.193.164.82:1719
-A PREROUTING -p tcp -m tcp --dport 1720 -j DNAT --to-destination
62.193.164.82:1719
-A POSTROUTING -o eth1 -j MASQUERADE
-A POSTROUTING -o eth0 -j MASQUERADE
-A POSTROUTING -o eth0 -j MASQUERADE
COMMIT
# Completed on Fri Jun 24 13:42:48 2005
# Generated by iptables-save v1.2.7a on Fri Jun 24 13:42:48 2005
*filter
:INPUT DROP [8020:1171278]
:FORWARD ACCEPT [111159:6603935]
:OUTPUT ACCEPT [12403:1157055]
-A INPUT -i lo -j ACCEPT
-A INPUT -p tcp -m tcp --dport 6000:6009 -j DROP
-A INPUT -p tcp -m tcp --dport 7100 -j DROP
-A INPUT -p tcp -m tcp --dport 111 -j DROP
-A INPUT -p udp -m udp --dport 111 -j DROP
-A INPUT -s 127.0.0.1 -i eth0 -j DROP
-A INPUT -i lo -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 22 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 22 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 80 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 80 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 22 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 80 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 80 -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -p tcp -m tcp --dport 6000:6009 -j DROP
-A INPUT -p tcp -m tcp --dport 7100 -j DROP
-A INPUT -p tcp -m tcp --dport 111 -j DROP
-A INPUT -p udp -m udp --dport 111 -j DROP
-A INPUT -s 127.0.0.1 -i eth0 -j DROP
-A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -p tcp -m tcp ! --tcp-option 2 -j REJECT --reject-with tcp-reset
-A INPUT -i eth0 -p tcp -m tcp --dport 22 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 22 -j ACCEPT
-A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -p tcp -m tcp --dport 6000:6009 -j DROP
-A INPUT -p tcp -m tcp --dport 7100 -j DROP
-A INPUT -p tcp -m tcp --dport 111 -j DROP
-A INPUT -p udp -m udp --dport 111 -j DROP
-A INPUT -s 127.0.0.1 -i eth0 -j DROP
-A INPUT -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -p tcp -m tcp ! --tcp-option 2 -j REJECT --reject-with tcp-reset
-A INPUT -i eth0 -p tcp -m tcp --dport 22 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 22 -j ACCEPT
-A INPUT -i eth1 -p udp -m udp --dport 21 -j ACCEPT
-A INPUT -i eth1 -p tcp -m tcp --dport 21 -j ACCEPT
-A INPUT -i eth1 -p tcp -m tcp --dport 80 -j ACCEPT
-A INPUT -i eth1 -p udp -m udp --dport 80 -j ACCEPT
-A INPUT -s 10.60.0.0/255.255.0.0 -p tcp -m tcp --dport 139 --tcp-flags
SYN,RST,ACK SYN -j ACCEPT
-A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i eth0 -p icmp -j ACCEPT
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
COMMIT



^ permalink raw reply	[flat|nested] 3+ messages in thread

* iptables h323 rrq and sip 5060
@ 2005-06-24 18:42 Goke Aruna
  0 siblings, 0 replies; 3+ messages in thread
From: Goke Aruna @ 2005-06-24 18:42 UTC (permalink / raw)
  To: netfilter

kindly help,

 I am new to iptables and I wish to allow my workstations behind a firewall

to get registred to h323 gatekeeper and sip proxy (the two servers are on 
public ip i.e. outside nat).

 And for h323 gatekeeper, the workstation need to connect with port 1720 and

iptables does not allow this.

 And again the sip proxy too needs port 5060. can somebody please help. My

firewall tables is as below.

 Aruna

   *mangle

:PREROUTING ACCEPT [693725:269731615]

:INPUT ACCEPT [17143:2024798]

:FORWARD ACCEPT [668493:267392562]

:OUTPUT ACCEPT [12304:1113266]

:POSTROUTING ACCEPT [681449:268539732]

COMMIT

# Completed on Fri Jun 24 13:42:48 2005

# Generated by iptables-save v1.2.7a on Fri Jun 24 13:42:48 2005

*nat

:PREROUTING ACCEPT [89368:5853018]

:POSTROUTING ACCEPT [36:5295]

:OUTPUT ACCEPT [767:52073]

-A PREROUTING -i eth0 -p udp -m udp --dport 0 -j REDIRECT --to-ports 5060

-A PREROUTING -i eth1 -p udp -m udp --dport 0 -j REDIRECT --to-ports 5060

-A PREROUTING -p tcp -m tcp --dport 1719 -j DNAT --to-destination

62.193.164.82:1719 <http://62.193.164.82:1719>

-A PREROUTING -p tcp -m tcp --dport 1720 -j DNAT --to-destination

62.193.164.82:1720 <http://62.193.164.82:1720>

-A PREROUTING -p udp -m udp --dport 1720 -j DNAT --to-destination

62.193.164.82:1720 <http://62.193.164.82:1720>

-A PREROUTING -p udp -m udp --dport 1719 -j DNAT --to-destination

62.193.164.82:1719 <http://62.193.164.82:1719>

-A PREROUTING -p udp -m udp --dport 1720 -j DNAT --to-destination

62.193.164.82:1719 <http://62.193.164.82:1719>

-A PREROUTING -p tcp -m tcp --dport 1720 -j DNAT --to-destination

62.193.164.82:1719 <http://62.193.164.82:1719>

-A POSTROUTING -o eth1 -j MASQUERADE

-A POSTROUTING -o eth0 -j MASQUERADE

-A POSTROUTING -o eth0 -j MASQUERADE

COMMIT

# Completed on Fri Jun 24 13:42:48 2005

# Generated by iptables-save v1.2.7a on Fri Jun 24 13:42:48 2005

*filter

:INPUT DROP [8020:1171278]

:FORWARD ACCEPT [111159:6603935]

:OUTPUT ACCEPT [12403:1157055]

-A INPUT -i lo -j ACCEPT

-A INPUT -p tcp -m tcp --dport 6000:6009 -j DROP

-A INPUT -p tcp -m tcp --dport 7100 -j DROP

-A INPUT -p tcp -m tcp --dport 111 -j DROP

-A INPUT -p udp -m udp --dport 111 -j DROP

-A INPUT -s 127.0.0.1 <http://127.0.0.1> -i eth0 -j DROP

-A INPUT -i lo -j ACCEPT

-A INPUT -i eth0 -p tcp -m tcp --dport 22 -j ACCEPT

-A INPUT -i eth0 -p udp -m udp --dport 22 -j ACCEPT

-A INPUT -i eth0 -p tcp -m tcp --dport 80 -j ACCEPT

-A INPUT -i eth0 -p udp -m udp --dport 80 -j ACCEPT

-A INPUT -i eth0 -p udp -m udp --dport 22 -j ACCEPT

-A INPUT -i eth0 -p tcp -m tcp --dport 80 -j ACCEPT

-A INPUT -i eth0 -p udp -m udp --dport 80 -j ACCEPT

-A INPUT -i lo -j ACCEPT

-A INPUT -p tcp -m tcp --dport 6000:6009 -j DROP

-A INPUT -p tcp -m tcp --dport 7100 -j DROP

-A INPUT -p tcp -m tcp --dport 111 -j DROP

-A INPUT -p udp -m udp --dport 111 -j DROP

-A INPUT -s 127.0.0.1 <http://127.0.0.1> -i eth0 -j DROP

-A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT

-A INPUT -i lo -j ACCEPT

-A INPUT -p tcp -m tcp ! --tcp-option 2 -j REJECT --reject-with tcp-reset

-A INPUT -i eth0 -p tcp -m tcp --dport 22 -j ACCEPT

-A INPUT -i eth0 -p udp -m udp --dport 22 -j ACCEPT

-A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT

-A INPUT -i lo -j ACCEPT

-A INPUT -p tcp -m tcp --dport 6000:6009 -j DROP

-A INPUT -p tcp -m tcp --dport 7100 -j DROP

-A INPUT -p tcp -m tcp --dport 111 -j DROP

-A INPUT -p udp -m udp --dport 111 -j DROP

-A INPUT -s 127.0.0.1 <http://127.0.0.1> -i eth0 -j DROP

-A INPUT -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT

-A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT

-A INPUT -i lo -j ACCEPT

-A INPUT -p tcp -m tcp ! --tcp-option 2 -j REJECT --reject-with tcp-reset

-A INPUT -i eth0 -p tcp -m tcp --dport 22 -j ACCEPT

-A INPUT -i eth0 -p udp -m udp --dport 22 -j ACCEPT

-A INPUT -i eth1 -p udp -m udp --dport 21 -j ACCEPT

-A INPUT -i eth1 -p tcp -m tcp --dport 21 -j ACCEPT

-A INPUT -i eth1 -p tcp -m tcp --dport 80 -j ACCEPT

-A INPUT -i eth1 -p udp -m udp --dport 80 -j ACCEPT

-A INPUT -s 10.60.0.0/255.255.0.0 <http://10.60.0.0/255.255.0.0> -p tcp -m 
tcp --dport 139 --tcp-flags

SYN,RST,ACK SYN -j ACCEPT

-A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT

-A INPUT -i eth0 -p icmp -j ACCEPT

-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT

-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT

-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT

-A OUTPUT -o lo -j ACCEPT

-A OUTPUT -o lo -j ACCEPT

-A OUTPUT -o lo -j ACCEPT

-A OUTPUT -o lo -j ACCEPT

-A OUTPUT -o lo -j ACCEPT

-A OUTPUT -o lo -j ACCEPT

COMMIT

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2005-06-24 18:42 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2005-06-24  0:36 Prob com REDIRECT + IPROUT2 Sebastião Antônio Campos (Infojoi)
2005-06-24 12:43 ` iptables h323 rrq and sip 5060 ADEGOKE ARUNA
2005-06-24 18:42 Goke Aruna

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.