All of lore.kernel.org
 help / color / mirror / Atom feed
* iptables h323 rrq and sip 5060
@ 2005-06-24 18:42 Goke Aruna
  0 siblings, 0 replies; 2+ messages in thread
From: Goke Aruna @ 2005-06-24 18:42 UTC (permalink / raw)
  To: netfilter

kindly help,

 I am new to iptables and I wish to allow my workstations behind a firewall

to get registred to h323 gatekeeper and sip proxy (the two servers are on 
public ip i.e. outside nat).

 And for h323 gatekeeper, the workstation need to connect with port 1720 and

iptables does not allow this.

 And again the sip proxy too needs port 5060. can somebody please help. My

firewall tables is as below.

 Aruna

   *mangle

:PREROUTING ACCEPT [693725:269731615]

:INPUT ACCEPT [17143:2024798]

:FORWARD ACCEPT [668493:267392562]

:OUTPUT ACCEPT [12304:1113266]

:POSTROUTING ACCEPT [681449:268539732]

COMMIT

# Completed on Fri Jun 24 13:42:48 2005

# Generated by iptables-save v1.2.7a on Fri Jun 24 13:42:48 2005

*nat

:PREROUTING ACCEPT [89368:5853018]

:POSTROUTING ACCEPT [36:5295]

:OUTPUT ACCEPT [767:52073]

-A PREROUTING -i eth0 -p udp -m udp --dport 0 -j REDIRECT --to-ports 5060

-A PREROUTING -i eth1 -p udp -m udp --dport 0 -j REDIRECT --to-ports 5060

-A PREROUTING -p tcp -m tcp --dport 1719 -j DNAT --to-destination

62.193.164.82:1719 <http://62.193.164.82:1719>

-A PREROUTING -p tcp -m tcp --dport 1720 -j DNAT --to-destination

62.193.164.82:1720 <http://62.193.164.82:1720>

-A PREROUTING -p udp -m udp --dport 1720 -j DNAT --to-destination

62.193.164.82:1720 <http://62.193.164.82:1720>

-A PREROUTING -p udp -m udp --dport 1719 -j DNAT --to-destination

62.193.164.82:1719 <http://62.193.164.82:1719>

-A PREROUTING -p udp -m udp --dport 1720 -j DNAT --to-destination

62.193.164.82:1719 <http://62.193.164.82:1719>

-A PREROUTING -p tcp -m tcp --dport 1720 -j DNAT --to-destination

62.193.164.82:1719 <http://62.193.164.82:1719>

-A POSTROUTING -o eth1 -j MASQUERADE

-A POSTROUTING -o eth0 -j MASQUERADE

-A POSTROUTING -o eth0 -j MASQUERADE

COMMIT

# Completed on Fri Jun 24 13:42:48 2005

# Generated by iptables-save v1.2.7a on Fri Jun 24 13:42:48 2005

*filter

:INPUT DROP [8020:1171278]

:FORWARD ACCEPT [111159:6603935]

:OUTPUT ACCEPT [12403:1157055]

-A INPUT -i lo -j ACCEPT

-A INPUT -p tcp -m tcp --dport 6000:6009 -j DROP

-A INPUT -p tcp -m tcp --dport 7100 -j DROP

-A INPUT -p tcp -m tcp --dport 111 -j DROP

-A INPUT -p udp -m udp --dport 111 -j DROP

-A INPUT -s 127.0.0.1 <http://127.0.0.1> -i eth0 -j DROP

-A INPUT -i lo -j ACCEPT

-A INPUT -i eth0 -p tcp -m tcp --dport 22 -j ACCEPT

-A INPUT -i eth0 -p udp -m udp --dport 22 -j ACCEPT

-A INPUT -i eth0 -p tcp -m tcp --dport 80 -j ACCEPT

-A INPUT -i eth0 -p udp -m udp --dport 80 -j ACCEPT

-A INPUT -i eth0 -p udp -m udp --dport 22 -j ACCEPT

-A INPUT -i eth0 -p tcp -m tcp --dport 80 -j ACCEPT

-A INPUT -i eth0 -p udp -m udp --dport 80 -j ACCEPT

-A INPUT -i lo -j ACCEPT

-A INPUT -p tcp -m tcp --dport 6000:6009 -j DROP

-A INPUT -p tcp -m tcp --dport 7100 -j DROP

-A INPUT -p tcp -m tcp --dport 111 -j DROP

-A INPUT -p udp -m udp --dport 111 -j DROP

-A INPUT -s 127.0.0.1 <http://127.0.0.1> -i eth0 -j DROP

-A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT

-A INPUT -i lo -j ACCEPT

-A INPUT -p tcp -m tcp ! --tcp-option 2 -j REJECT --reject-with tcp-reset

-A INPUT -i eth0 -p tcp -m tcp --dport 22 -j ACCEPT

-A INPUT -i eth0 -p udp -m udp --dport 22 -j ACCEPT

-A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT

-A INPUT -i lo -j ACCEPT

-A INPUT -p tcp -m tcp --dport 6000:6009 -j DROP

-A INPUT -p tcp -m tcp --dport 7100 -j DROP

-A INPUT -p tcp -m tcp --dport 111 -j DROP

-A INPUT -p udp -m udp --dport 111 -j DROP

-A INPUT -s 127.0.0.1 <http://127.0.0.1> -i eth0 -j DROP

-A INPUT -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT

-A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT

-A INPUT -i lo -j ACCEPT

-A INPUT -p tcp -m tcp ! --tcp-option 2 -j REJECT --reject-with tcp-reset

-A INPUT -i eth0 -p tcp -m tcp --dport 22 -j ACCEPT

-A INPUT -i eth0 -p udp -m udp --dport 22 -j ACCEPT

-A INPUT -i eth1 -p udp -m udp --dport 21 -j ACCEPT

-A INPUT -i eth1 -p tcp -m tcp --dport 21 -j ACCEPT

-A INPUT -i eth1 -p tcp -m tcp --dport 80 -j ACCEPT

-A INPUT -i eth1 -p udp -m udp --dport 80 -j ACCEPT

-A INPUT -s 10.60.0.0/255.255.0.0 <http://10.60.0.0/255.255.0.0> -p tcp -m 
tcp --dport 139 --tcp-flags

SYN,RST,ACK SYN -j ACCEPT

-A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT

-A INPUT -i eth0 -p icmp -j ACCEPT

-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT

-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT

-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT

-A OUTPUT -o lo -j ACCEPT

-A OUTPUT -o lo -j ACCEPT

-A OUTPUT -o lo -j ACCEPT

-A OUTPUT -o lo -j ACCEPT

-A OUTPUT -o lo -j ACCEPT

-A OUTPUT -o lo -j ACCEPT

COMMIT

^ permalink raw reply	[flat|nested] 2+ messages in thread

* iptables h323 rrq and sip 5060
  2005-06-24  0:36 Prob com REDIRECT + IPROUT2 Sebastião Antônio Campos (Infojoi)
@ 2005-06-24 12:43 ` ADEGOKE ARUNA
  0 siblings, 0 replies; 2+ messages in thread
From: ADEGOKE ARUNA @ 2005-06-24 12:43 UTC (permalink / raw)
  To: netfilter-bounces, netfilter

kindly help,

I am new to iptables and I wish to allow my workstations behind a firewall
to get registred to h323 gatekeeper and sip proxy.

And for h323 gatekeeper, the workstation need to connect with port 1720 and
iptables does not allow this.

And again the sip proxy too needs port 5060. can somebody please help. My
firewall tables is as below.

Aruna



*mangle
:PREROUTING ACCEPT [693725:269731615]
:INPUT ACCEPT [17143:2024798]
:FORWARD ACCEPT [668493:267392562]
:OUTPUT ACCEPT [12304:1113266]
:POSTROUTING ACCEPT [681449:268539732]
COMMIT
# Completed on Fri Jun 24 13:42:48 2005
# Generated by iptables-save v1.2.7a on Fri Jun 24 13:42:48 2005
*nat
:PREROUTING ACCEPT [89368:5853018]
:POSTROUTING ACCEPT [36:5295]
:OUTPUT ACCEPT [767:52073]
-A PREROUTING -i eth0 -p udp -m udp --dport 0 -j REDIRECT --to-ports 5060
-A PREROUTING -i eth1 -p udp -m udp --dport 0 -j REDIRECT --to-ports 5060
-A PREROUTING -p tcp -m tcp --dport 1719 -j DNAT --to-destination
62.193.164.82:1719
-A PREROUTING -p tcp -m tcp --dport 1720 -j DNAT --to-destination
62.193.164.82:1720
-A PREROUTING -p udp -m udp --dport 1720 -j DNAT --to-destination
62.193.164.82:1720
-A PREROUTING -p udp -m udp --dport 1719 -j DNAT --to-destination
62.193.164.82:1719
-A PREROUTING -p udp -m udp --dport 1720 -j DNAT --to-destination
62.193.164.82:1719
-A PREROUTING -p tcp -m tcp --dport 1720 -j DNAT --to-destination
62.193.164.82:1719
-A POSTROUTING -o eth1 -j MASQUERADE
-A POSTROUTING -o eth0 -j MASQUERADE
-A POSTROUTING -o eth0 -j MASQUERADE
COMMIT
# Completed on Fri Jun 24 13:42:48 2005
# Generated by iptables-save v1.2.7a on Fri Jun 24 13:42:48 2005
*filter
:INPUT DROP [8020:1171278]
:FORWARD ACCEPT [111159:6603935]
:OUTPUT ACCEPT [12403:1157055]
-A INPUT -i lo -j ACCEPT
-A INPUT -p tcp -m tcp --dport 6000:6009 -j DROP
-A INPUT -p tcp -m tcp --dport 7100 -j DROP
-A INPUT -p tcp -m tcp --dport 111 -j DROP
-A INPUT -p udp -m udp --dport 111 -j DROP
-A INPUT -s 127.0.0.1 -i eth0 -j DROP
-A INPUT -i lo -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 22 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 22 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 80 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 80 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 22 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 80 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 80 -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -p tcp -m tcp --dport 6000:6009 -j DROP
-A INPUT -p tcp -m tcp --dport 7100 -j DROP
-A INPUT -p tcp -m tcp --dport 111 -j DROP
-A INPUT -p udp -m udp --dport 111 -j DROP
-A INPUT -s 127.0.0.1 -i eth0 -j DROP
-A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -p tcp -m tcp ! --tcp-option 2 -j REJECT --reject-with tcp-reset
-A INPUT -i eth0 -p tcp -m tcp --dport 22 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 22 -j ACCEPT
-A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -p tcp -m tcp --dport 6000:6009 -j DROP
-A INPUT -p tcp -m tcp --dport 7100 -j DROP
-A INPUT -p tcp -m tcp --dport 111 -j DROP
-A INPUT -p udp -m udp --dport 111 -j DROP
-A INPUT -s 127.0.0.1 -i eth0 -j DROP
-A INPUT -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -p tcp -m tcp ! --tcp-option 2 -j REJECT --reject-with tcp-reset
-A INPUT -i eth0 -p tcp -m tcp --dport 22 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 22 -j ACCEPT
-A INPUT -i eth1 -p udp -m udp --dport 21 -j ACCEPT
-A INPUT -i eth1 -p tcp -m tcp --dport 21 -j ACCEPT
-A INPUT -i eth1 -p tcp -m tcp --dport 80 -j ACCEPT
-A INPUT -i eth1 -p udp -m udp --dport 80 -j ACCEPT
-A INPUT -s 10.60.0.0/255.255.0.0 -p tcp -m tcp --dport 139 --tcp-flags
SYN,RST,ACK SYN -j ACCEPT
-A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i eth0 -p icmp -j ACCEPT
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
COMMIT



^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2005-06-24 18:42 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2005-06-24 18:42 iptables h323 rrq and sip 5060 Goke Aruna
  -- strict thread matches above, loose matches on Subject: below --
2005-06-24  0:36 Prob com REDIRECT + IPROUT2 Sebastião Antônio Campos (Infojoi)
2005-06-24 12:43 ` iptables h323 rrq and sip 5060 ADEGOKE ARUNA

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.