On Mon, Aug 23, 2010 at 2:07 PM, Mark Chong <[email protected]> wrote:

> Hi Makara
>
> That would be correct
> iptables -I FORWARD -i eth1 -o eth1 -j DROP
> would stop routing packets between your two networks assuming eth1 is
> plugged into your switch and eth0 is not
>

That's correct eth1 is connected to switch and eth0 is connected directly to
ISP media.

Thank you for confirmation. Just for first stage I allow all I will block
input chain from eth0 interface and forward chain soon after everything is
done.

Thank again for all professional recommendation.



>
> however as pascal mentioned this relies on at least 1 of the hosts not
> having a route back to the machine trying to contact it, but even if it
> can't respond to requests it is still open to potential attacks from the
> hosts that can still send the requests
>
>
> with your eth0 -> eth1 firewall rules you want to ensure that you allow
> outbound but restrict inbound connections, and usually you would do
> this by setting a default DROP policy on the FORWARD chain followed by
> rules to allow eth1 -> internet, and statefull rules to allow internet
> -> eth1
> like (and this is just an example)
> iptables -P FORWARD DROP
> iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
> iptables -A FORWARD -i eth1 -o eth0 -j ACCEPT
>
> you would also want to put rules to block packets on the INPUT chain
> too to protect unwanted connections comming from the internet
> connecting direclty to your router
>
> On Mon, 23 Aug 2010 09:10:48 +0700
> Makara <[email protected]> wrote:
>
> > Hi List,
> >
> > Thank for your help specially Pascal, thank for you detail and
> > meaningful description.
> >
> > I hope I can get it done soon.
> >
> > I'm not so clear or maybe you get confused about that, if possible
> > please reply because I can not test the script right now
> >
> > Your advise
> >
> > iptables -I FORWARD -i eth0 -o eth0 -j DROP
> >
> > eth0 ,<<< WAN
> > eth1 <<< is LAN
> >
> > I think you are talking about
> >
> > iptables -I FORWARD -i eth1 -o eth1 -j DROP
> >
> >
> > Please help?
> >
> >
> > On Sat, Aug 21, 2010 at 7:33 PM, Pascal Hambourg <
> > [email protected]> wrote:
> >
> > > Hello,
> > >
> > > Makara a écrit :
> > > >
> > > > Here is my network diagram
> > > >
> > > >
> > > >          / LAN1 [10.101.189.0/24 <http://10.101.189.0/24>]
> > > >
> internet---------------[eth0]--------------{Linux}-----------------[eth1]
> > > >
> > > >          \LAN2 [192.168.0/24]
> > > >
> > > > My iptables script
> > > >
> > > > # EDIT This line only
> > > >
> > > > IP_WAN=x.x.x.x
> > > >
> > > > # DO NOT EDIT
> > > >
> > > > echo "1" > /proc/sys/net/ipv4/ip_forward
> > > >
> > > > modprobe ip_conntrack
> > >
> > > Unnecessary, should be automatically loaded by ip_conntrack_ftp
> > >
> > > > modprobe ip_nat_ftp
> > > > modprobe ip_conntrack_ftp
> > >
> > > Unnecessary, should be automatically loaded by ip_nat_ftp
> > >
> > > > # Flush all rules
> > > >
> > > > iptables -F INPUT
> > > > iptables -F FORWARD
> > > > iptables -F OUTPUT
> > > > iptables -F -t nat
> > > > iptables -F -t mangle
> > > >
> > > > # Default Policies
> > > >
> > > > iptables -P INPUT ACCEPT
> > > > iptables -P FORWARD ACCEPT
> > > > iptables -P OUTPUT ACCEPT
> > > >
> > > > # Allow UDP, DNS and Passive FTP
> > > > iptables -A INPUT -m state --state NEW,RELATED,ESTABLISHED -j
> > > > ACCEPT iptables -A FORWARD -m state --state
> > > > NEW,RELATED,ESTABLISHED -j ACCEPT iptables -A OUTPUT -m state
> > > > --state NEW,RELATED,ESTABLISHED -j ACCEPT
> > >
> > > All 3 rules are useless, as the default policies are already ACCEPT
> > > and there are no DROP nor REJECT rules. Also, the comment is
> > > misleading : they accept much more than just UDP, DNS and passive
> > > FTP. They actually accept almost anything.
> > >
> > > > # garena game
> > > > iptables -t nat -A PREROUTING -p udp -i eth0 -d 0/0 --dport
> > > > 1511:1611
> > >
> > > This rule has no target (-j <target>) and therefore no action.
> > >
> > > > # Transparent Proxy if it's network game
> > > > iptables -A PREROUTING -t nat -i eth1 -s 10.101.189.0/24
> > > > 10.101.189.0/24 -p tcp --dport 80 -j REDIRECT --to-port 3128
> > > >
> > > >
> > > > # NAT
> > > > iptables -A POSTROUTING -t nat -o eth0 -j SNAT --to-source $IP_WAN
> > > >
> > > >
> > > > Both LAN1 n LAN2 can access internet it's good but they can
> > > > access to each other.
> > > >
> > > > Please kindly help, I don't want LAN1 connect to LAN2 or LAN2
> > > > connect to LAN1.
> > >
> > > If both subnets share the same ethernet network (e.g. use the same
> > > switches without any separate VLANs), then they can communicate
> > > directly over this ethernet network, skipping the Linux router. If
> > > some hosts do not have a direct route to the other subnet they will
> > > use the router to reach hosts in the other subnet and then you can
> > > insert iptables rules to DROP traffic in the FORWARD chain :
> > >
> > > iptables -I FORWARD -i eth0 -o eth0 -j DROP
> > >
> > > But be warned that it will have no effect on hosts which have a
> > > direct route to the other subnet.
> > >
> > >
> > > --
> > > To UNSUBSCRIBE, email to [email protected]
> > > with a subject of "unsubscribe". Trouble? Contact
> > > [email protected]
> > > Archive: http://lists.debian.org/[email protected]
> > >
> > >
> >
> >
>
>
>
> --
> To UNSUBSCRIBE, email to [email protected]
> with a subject of "unsubscribe". Trouble? Contact
> [email protected]
> Archive: http://lists.debian.org/[email protected]
>
>


-- 
The person who loves others will also be loved.

Reply via email to