Cara

iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -o eth1 -p udp -j
SNAT --to 192.168.4.3
iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -o eth1 -p tcp -j
SNAT --to 192.168.4.3


te aconselho a usar tb o endereço Broadcast da rede, ao invés de usar
192.168.0.0 use 192.168.0.255, se a dica do amigo acima não funcionar faz o
que eu te falei e testa.

Em 28 de abril de 2010 22:54, Catulo Hansen <catu...@gmail.com> escreveu:

> Beltrane,
>
> Comenta a seguinte linha no teu script d firewall:
>
> #ptables -t nat -A POSTROUTING -o eth1 -s 192.168.0.0/24 -j MASQUERADE
>
> Isso não tá te ajudando, tú já tá fazendo nat N:1 com a seguinte regra
> no teu script:
>
> iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -o eth1 -p udp -j
> SNAT --to 192.168.4.3
> iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -o eth1 -p tcp -j
> SNAT --to 192.168.4.3
>
> Só use "MASQUERADE", quando o ip de saida for dinâmico, no seu caso está
> fixo.
>
>
> 2010/4/28 Carlos Beltrame <beltr...@ieee.org>:
> > Ola pessoal, volto eu com mais problemas pedidno ajuda =]
> > O sinal de internet xega via radio pela eth1 configurada como
> 192.168.4.3, e
> > atraves do firewall compartilhando para minha rede 192.168.0.0/24. A
> > intensão é rodar squid transparente e até funciona, porem a rede ta
> lenta, o
> > acesso a sites e download ta lento, qdo acesso direto com o AP que recebe
> o
> > sinal de fora no meu pc, a net voa kkkkk. O msn principalmente, qdo
> conecta,
> > fica uns 2 minutos conectado e dp cai. Enfim, segue abaixo meu
> firewall.sh e
> > meu squid.conf gostaria de saber se há como melhorar o desempenho, se ha
> > algo errado. Procurei comentar minha intensao em cada linha abaixo:
> >
> > ==============firewall====================
> > #!/bin/bash
> >
> > ## Apaga quaisquer regras que por ventura existam
> > iptables -F
> > iptables -X
> > iptables -t nat -F
> > iptables -t nat -X
> > #### Regras de policiamento ####
> >
> > ## bloqueia qualquer pacote que não seja explicitament permitio
> > iptables -P INPUT DROP
> > iptables -P FORWARD DROP
> > iptables -P OUTPUT DROP
> >
> > ## Permite acesso a interface loopback
> > iptables -A INPUT -i lo -j ACCEPT
> >
> > ## Permite apenas entrada das respostas as conexões desaida
> > iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
> >
> > #protecao contra port scanners ocultos
> > iptables -A INPUT -p tcp --tcp-flags SYN,ACK,FIN,RST RST -m limit --limit
> > 1/s -j ACCEPT
> > iptables -t filter -A INPUT -p icmp --icmp-type echo-request -m limit
> > --limit 1/s -j ACCEPT
> >
> > #Protecao contra ataques
> > iptables -A INPUT -m state --state INVALID -j DROP
> >
> > #setando delay minimo
> > iptables -t mangle -A OUTPUT -o ppp0 -p tcp --dport 53 -j TOS --set-tos
> > Minimize-Delay
> > iptables -t mangle -A OUTPUT -o ppp0 -p tcp --dport 80 -j TOS --set-tos
> > Minimize-Delay
> > iptables -t mangle -A OUTPUT -o ppp0 -p tcp --dport 443 -j TOS --set-tos
> > Minimize-Delay
> > iptables -t mangle -A OUTPUT -o ppp0 -p tcp --dport 10000 -j TOS
> --set-tos
> > Minimize-Delay
> >
> > #### OUTPUT ####
> > # Permite que o servidor acesse outras maquinas
> > iptables -A OUTPUT -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
> >
> > ### PREROUTING ###
> > iptables -t nat -A PREROUTING -s 192.168.0.0/24  -p tcp --dport 80 -j
> > REDIRECT --to-port 3128
> > iptables -t nat -A PREROUTING -s 192.168.0.0/24  -p udp --dport 80 -j
> > REDIRECT --to-port 3128
> >
> > ### FORWARD ###
> >
> > # Connection tracking (aceita pacotes para conexoes já estabelecidas)
> > iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
> >
> > ## Redireciona dados dos administradores
> > /etc/firewall/admin/adminporta.sh
> > /etc/firewall/admin/adminssh.sh
> >
> > ## Redireciona dados dos usuarios squid e outro barramento
> > #exemplo:
> > # iptables -I INPUT -s 192.168.0.106 -p tcp --dport 3128 -j ACCEPT
> > # iptables -A FORWARD -s 192.168.0.106 -o eth1 -j ACCEPT
> > /etc/firewall/liberados/liberados.sh
> >
> > #### POSTROUTING ####
> >
> > ## Compartilhamento da internet
> > iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -o eth1 -p udp -j SNAT
> --to
> > 192.168.4.3
> > iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -o eth1 -p tcp -j SNAT
> --to
> > 192.168.4.3
> >
> >
> > iptables -t nat -A POSTROUTING -o eth1 -s 192.168.0.0/24 -j MASQUERADE
> > iptables -t mangle -A POSTROUTING -p tcp --tcp-flags SYN,RST SYN -j
> TCPMSS
> > -o eth1 --set-mss 1412
> >
> > ### Ativa o modulo responsavel pelo encaminhamento de pacotes ###
> > echo 1 > /proc/sys/net/ipv4/ip_forward
> > ========================================================================
> >
> >
> > ====================squid.conf===========================
> > http_port 3128 transparent
> > visible_hostname INTERNET
> >
> > cache_mem 512 MB
> > maximum_object_size_in_memory 64 KB
> > maximum_object_size 700 MB
> > minimum_object_size 0 KB
> >
> > cache_swap_low 90
> > cache_swap_high 95
> >
> > cache_dir ufs /var/spool/squid  50000 16 256
> >
> > hierarchy_stoplist cgi-bin ?
> > acl QUERY urlpath_regex cgi-bin \?
> >
> > cache deny QUERY
> > acl apache rep_header Server ^Apache
> > broken_vary_encoding allow apache
> > access_log /var/log/squid/access.log squid
> > hosts_file /etc/hosts
> > refresh_pattern ^ftp:           1440    20%     10080
> > refresh_pattern ^gopher:        1440    0%      1440
> > refresh_pattern .               0       20%     4320
> > acl all src 0.0.0.0/0.0.0.0
> > acl manager proto cache_object
> > acl localhost src 127.0.0.1/255.255.255.255
> > acl to_localhost dst 127.0.0.0/8
> > acl SSL_ports port 443          # https
> > acl SSL_ports port 563          # snews
> > acl SSL_ports port 873          # rsync
> > acl Safe_ports port 80          # http
> > acl Safe_ports port 21          # ftp
> > acl Safe_ports port 443         # https
> > acl Safe_ports port 70          # gopher
> > acl Safe_ports port 210         # wais
> > acl Safe_ports port 1025-65535  # unregistered ports
> > acl Safe_ports port 280         # http-mgmt
> > acl Safe_ports port 488         # gss-http
> > acl Safe_ports port 591         # filemaker
> > acl Safe_ports port 777         # multiling http
> > acl Safe_ports port 631         # cups
> > acl Safe_ports port 873         # rsync
> > acl Safe_ports port 901         # SWAT
> > acl Safe_ports port 6881
> > acl purge method PURGE
> > acl CONNECT method CONNECT
> >
> > acl servidor src 192.168.0.1
> >
> > acl horario time 00:30-06:00
> > acl proibir_dominio dstdomain "/etc/squid/bloqueio"
> > acl proibir_url url_regex -i "/etc/squid/bloqurl"
> >
> > acl aceitar_dom dstdomain "/etc/squid/aceitar"
> >
> > http_access deny proibir_dominio !horario
> > http_access deny proibir_url !horario
> >
> > http_access allow aceitar_dom
> > http_access allow manager localhost
> > http_access deny manager
> > http_access allow purge localhost
> > http_access deny purge
> > http_access deny !Safe_ports
> > http_access deny CONNECT !SSL_ports
> > http_access allow localhost
> > http_access allow servidor
> > http_access allow all
> > http_reply_access allow all
> > icp_access allow all
> > coredump_dir /var/spool/squid
> > ===========================================================
> >
> > Espero ter sido claro, no aguardo, gde abraço.
> >
> > Yours Truly
> > Carlos Beltrame - Eletrical Engineer
> > IEEE - HTC Brazilian Representative
> > Mobile: +55 18-9795-5271
> > MSN   : c_beltr...@hotmail.com
> > Skype : zebacking
> > UNESP - Campus of Ilha Solteira
> >
> >
> >
>
>
>
> --
> -
> Catulo Kruuse Hansen
> LPI000199593
> LPIC-2
> CompTIA Linux+
> CLA (Novell Certified Linux Administrator)
> Data Center Technical Specialist
> catulohansen.blogspot.com
>
>
> --
> To UNSUBSCRIBE, email to debian-user-portuguese-requ...@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact
> listmas...@lists.debian.org
> Archive:
> http://lists.debian.org/s2x85da0e3a1004281954o75229275zb177b4893ddb...@mail.gmail.com
>
>

Responder a