daniel_4fun
(usa Debian)
Enviado em 08/08/2011 - 14:51h
bem pessoal, meu firewall eh do fedora15, o que vem com ele msm, preciso liberar o conectividade social nele, mas nao posso ta reiniciando ele muito, pois o pessoal aqui acessa um servido via rdp e sempre q reinicio a conexao cai... me digam quais regras adicionar e onde adicionar para liberar o conexao segura da caixa ... cmt.caixa.gov.br
ta aqui meu iptables
# Firewall configuration written by system-config-firewall
# Manual customization of this file is not recommended.
*mangle
:PREROUTING ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
-A PREROUTING -i p1p1 -p udp --dport 80 -j MARK --set-mark 0x64
-A PREROUTING -i p1p1 -p tcp --dport 80 -j MARK --set-mark 0x65
COMMIT
*nat
:PREROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
-A POSTROUTING -o p35p1 -j MASQUERADE
-A POSTROUTING -o p1p1 -j MASQUERADE
-A POSTROUTING -o eth+ -j MASQUERADE
-A POSTROUTING -o ippp+ -j MASQUERADE
-A POSTROUTING -o ppp+ -j MASQUERADE
-A POSTROUTING -o wlan+ -j MASQUERADE
-A PREROUTING -i p1p1 -p udp --dport 80 -m mark --mark 0x64 -j DNAT --to-destination :3128
-A PREROUTING -i p1p1 -p tcp --dport 80 -j DNAT --to-destination 192.168.254.201:3128
-A PREROUTING -i p1p1 -p tcp --dport 80 -m mark --mark 0x65 -j DNAT --to-destination :3128
COMMIT
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
-A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
-A INPUT -p icmp -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -i p35p1 -j ACCEPT
-A INPUT -i p1p1 -j ACCEPT
-A INPUT -i eth+ -j ACCEPT
-A INPUT -i ippp+ -j ACCEPT
-A INPUT -i ppp+ -j ACCEPT
-A INPUT -i wlan+ -j ACCEPT
-A INPUT -i p1p1 -m state --state NEW -m udp -p udp --dport 3128 -m mark --mark 0x64 -j ACCEPT
-A INPUT -i p1p1 -m state --state NEW -m tcp -p tcp --dport 3128 -m mark --mark 0x65 -j ACCEPT
-A INPUT -m state --state NEW -m udp -p udp --dport 631 -j ACCEPT
-A INPUT -m state --state NEW -m udp -p udp --dport 137 -j ACCEPT
-A INPUT -m state --state NEW -m udp -p udp --dport 138 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 25 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 53 -j ACCEPT
-A INPUT -m state --state NEW -m udp -p udp --dport 53 -j ACCEPT
-A INPUT -m state --state NEW -m udp -p udp --dport 5353 -d 224.0.0.251 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 995 -j ACCEPT
-A INPUT -m state --state NEW -m udp -p udp --dport 137 -j ACCEPT
-A INPUT -m state --state NEW -m udp -p udp --dport 138 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 139 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 445 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 631 -j ACCEPT
-A INPUT -m state --state NEW -m udp -p udp --dport 631 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 443 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 2631 -j ACCEPT
-A INPUT -m state --state NEW -m udp -p udp --dport 2631 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 3128 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j ACCEPT
-A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
-A FORWARD -p icmp -j ACCEPT
-A FORWARD -i lo -j ACCEPT
-A FORWARD -i p35p1 -j ACCEPT
-A FORWARD -i p1p1 -j ACCEPT
-A FORWARD -i eth+ -j ACCEPT
-A FORWARD -i ippp+ -j ACCEPT
-A FORWARD -i ppp+ -j ACCEPT
-A FORWARD -i wlan+ -j ACCEPT
-A FORWARD -o p35p1 -j ACCEPT
-A FORWARD -o p1p1 -j ACCEPT
-A FORWARD -o eth+ -j ACCEPT
-A FORWARD -o ippp+ -j ACCEPT
-A FORWARD -o ppp+ -j ACCEPT
-A FORWARD -o wlan+ -j ACCEPT
-A FORWARD -i p1p1 -m state --state NEW -m tcp -p tcp -d 192.168.254.201 --dport 3128 -j ACCEPT
-A INPUT -j REJECT --reject-with icmp-host-prohibited
-A FORWARD -j REJECT --reject-with icmp-host-prohibited
COMMIT