Olha pessoal,

alguma coisa não faz as regras iptables funcionar, instalei o squid e esta
funcionando pela porta 3128, mas mesmo dando

iptables -t nat -A PREROUTING -p tcp -m tcp --dport 80 -s 192.168.1.0/24 -j
REDIRECT --to 3128

não funciona

:(










Em 11 de agosto de 2014 14:38, Rudimar <[email protected]> escreveu:

>
> na verdade é 255.255.255.248 , eu ja tinha testado e voltei para padrão,
> voltei para .248 e teste e nada...
>
> outra coisa na interface
> network xxx.xxx.xxx.184/29
> é valido por assim essa configuração? é a minha rede.
>
>
> eu havia instalado o webmin  e removi, pode ter ficado algum configuração?
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> Em 11 de agosto de 2014 14:15, Anderson Eckhardt <[email protected]>
> escreveu:
>
> Tem certeza que sua netmask é 255.255.255.0? Me parece muito para IP
>> válido...
>>
>> Em 11/08/2014, às 14:10, Rudimar <[email protected]> escreveu:
>>
>>
>> bom galera, tentei as dicas mas não foi,  não sei o que pode ser,
>>
>>
>>  vou postar meu script fica mais fácil,
>>
>>
>>
>> #!/bin/bash
>> modprobe iptable_nat
>> modprobe iptable_filter
>> modprobe ipt_LOG
>> modprobe ipt_state
>> modprobe ipt_limit
>>
>> echo 1 > /proc/sys/net/ipv4/ip_forward
>> echo 1 > /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts
>>
>> IPT="/sbin/iptables"
>> REDE="192.168.1.0/24"
>> LAN="eth1"
>> WAN="eth0"
>>
>> IP1="x.186"
>> IP2="x.187"
>> IP3="x.188"
>> IP4="x.189"
>>
>>
>> # Seta IPs nas interfaces virtuais
>> ifconfig eth0:0 x.186 netmask 255.255.255.0
>> ifconfig eth0:1 x.187 netmask 255.255.255.0
>> ifconfig eth0:2 x.188 netmask 255.255.255.0
>> ifconfig eth0:2 x.189 netmask 255.255.255.0
>>
>> # Arquivos de portas liberadas
>> PT_TCP="/etc/squid/PT_TCP"
>> PT_UDP="/etc/squid/PT_UDP"
>>
>> # Limpando Regras existentes
>> $IPT -F
>> $IPT -Z
>>
>> $IPT -t nat -F
>> $IPT -t mangle -F
>> $IPT -t filter -F
>> $IPT -t nat -Z
>> $IPT -t mangle -Z
>> $IPT -t filter -Z
>>
>> echo "Regras Zeradas."
>>
>> # Definindo Politicas Padrão
>> $IPT -P INPUT DROP
>> $IPT -P FORWARD DROP
>> $IPT -P OUTPUT ACCEPT
>>
>> # Habilitanto NAT
>> $IPT -t nat -A POSTROUTING -o $WAN  -j MASQUERADE
>>
>> # Liberando Input loopback
>> $IPT -A INPUT -i lo -j ACCEPT
>>
>>
>>
>> # Ativa Proxy Transparente
>> $IPT -t nat -A PREROUTING -i $LAN -s $REDE -p tcp --dport 80 -j REDIRECT
>> --to-port 3128
>> # Forca o uso do proxy
>> #$IPT -t nat -A PREROUTING -i $LAN -p tcp --dport 80    -j DNAT --to
>> 192.168.0.253:80
>>
>> # Liberando Conexoes Estabelecidas pela LAN
>> $IPT -A INPUT -m state --state ESTABLISHED,RELATED      -j ACCEPT
>> $IPT -A FORWARD -m state --state RELATED,ESTABLISHED    -j ACCEPT
>>
>>
>> # Libera Resposta a ping WAN
>> $IPT -A INPUT -p icmp -i $WAN           -j ACCEPT
>>
>> ######### Libera Acessos LAN_to_WAN #########
>>
>> $IPT -A FORWARD -i $LAN -o $WAN -p icmp                 -j ACCEPT
>>
>> for i in `cat $PT_TCP`; do
>> $IPT -A FORWARD -i $LAN -o $WAN -p tcp --dport $i       -j ACCEPT
>> done
>>
>> for i in `cat $PT_UDP`; do
>> $IPT -A FORWARD -i $LAN -o $WAN -p udp --dport $i       -j ACCEPT
>> done
>>
>> # Bloqueia IPs
>> #IPT -A INPUT -s 81.35.253.20 -j DROP
>>
>> # Libera Porta para fora
>> #$IPT -A FORWARD -i $LAN -s 192.168.1.119 -o $WAN -p tcp --dport 5432 -j
>> ACCEPT
>>
>> # Libera PC Acesso geral LAN_to_WAN
>> #$IPT -A FORWARD -i $LAN -o $WAN -s 192.168.1.219         -j ACCEPT
>>
>> # Acessos LAN_to_Server
>> $IPT -A INPUT -p icmp -i $LAN -s $REDE                  -j ACCEPT
>> $IPT -A INPUT -p tcp --dport 53 -i $LAN -s $REDE        -j ACCEPT
>> $IPT -A INPUT -p udp --dport 53 -i $LAN -s $REDE        -j ACCEPT
>> $IPT -A INPUT -p tcp --dport 80 -i $LAN -s $REDE        -j ACCEPT
>> $IPT -A INPUT -p tcp --dport 3128 -i $LAN -s $REDE      -j ACCEPT
>> $IPT -A INPUT -p tcp --dport 2222 -i $LAN -s $REDE      -j ACCEPT
>>
>> # Servicos WAN_to_Server
>> $IPT -A INPUT -p tcp --dport 2222 -i $WAN              -j ACCEPT
>> $IPT -A INPUT -p tcp --dport 80 -i $WAN                -j ACCEPT
>> $IPT -A INPUT -p tcp --dport 3128 -i $WAN              -j ACCEPT
>>
>> # Servicos WAN_to_LAN
>> $IPT -A INPUT -p tcp --dport 3389 -i $WAN -j ACCEPT
>> $IPT -A FORWARD -i $WAN -o $LAN -p tcp --dport 3389 -j ACCEPT
>>
>> $IPT -t nat -A PREROUTING -p tcp --dport 3389 -i $WAN -d $IP1 -j DNAT
>> --to 192.168.1.2
>> $IPT -t nat -A PREROUTING -p tcp --dport 3389 -i $WAN -d $IP2 -j DNAT
>> --to 192.168.1.3
>> $IPT -t nat -A PREROUTING -p tcp --dport 3389 -i $WAN -d $IP3 -j DNAT
>> --to 192.168.1.4
>> $IPT -t nat -A PREROUTING -p tcp --dport 3389 -i $WAN -d $IP4 -j DNAT
>> --to 192.168.1.5
>>
>>
>> #Redirect para Servidor PostgreSQL SERVIDOR NOVO
>> $IPT -A INPUT -p tcp --dport 5432 -i $WAN -j ACCEPT
>> $IPT -A FORWARD -i $WAN -o $LAN -p tcp --dport 5432 -j ACCEPT
>> $IPT -t nat -A PREROUTING -p tcp --dport 5432 -i $WAN -d $IP2 -j DNAT
>> --to 192.168.1.4
>>
>> #Redirect para Servidor FTP
>> $IPT -A INPUT -p tcp --dport 21 -i $WAN -j ACCEPT
>> $IPT -A FORWARD -i $WAN -o $LAN -p tcp --dport 21 -j ACCEPT
>> $IPT -t nat -A PREROUTING -p tcp --dport 21 -i $WAN -d $IP1 -j DNAT --to
>> 192.168.1.2
>>
>> # Redireciona acessos internos ao $IP1 para o 192.168.1.2
>> $IPT -A INPUT -p tcp --dport 84 -i $LAN -j ACCEPT
>> $IPT -A FORWARD -i $LAN -p tcp --dport 84 -j ACCEPT
>> $IPT -t nat -A PREROUTING -p tcp --dport 84 -i $LAN -d $IP1 -j DNAT --to
>> 192.168.1.2
>>
>> # Desabilitando Filtro martian source
>> for eee in /proc/sys/net/ipv4/conf/*/rp_filter; do
>> echo 0 > $eee
>> done
>>
>> # Libera uso do FTP
>> modprobe ip_conntrack_ftp
>> modprobe ip_nat_ftp
>> iptables -A OUTPUT -p tcp --dport 21 -m state --state
>> NEW,ESTABLISHED,RELATED              -j ACCEPT
>> iptables -A INPUT -p tcp --sport 21 -m state --state
>> ESTABLISHED,RELATED                   -j ACCEPT
>> iptables -A INPUT -p tcp --sport 20 -m state --state
>> ESTABLISHED,RELATED                   -j ACCEPT
>> iptables -A OUTPUT -p tcp --dport 20 -m state --state
>> ESTABLISHED                          -j ACCEPT
>> iptables -A INPUT -p tcp --sport 1024: --dport 1024: -m state --state
>> ESTABLISHED          -j ACCEPT
>> iptables -A OUTPUT -p tcp --sport 1024: --dport 1024: -m state --state
>> ESTABLISHED,RELATED -j ACCEPT
>>
>> echo "Fim do Firewall."
>>
>>
>>
>>
>> Em 8 de agosto de 2014 18:38, paulo bruck <[email protected]>
>> escreveu:
>>
>>> mais alguns pontos para vc verificar.  o firewall antes de tudo é um
>>> roteador.
>>> vc setou o ip_forward  ?
>>>
>>> De uma olhada no arquivo /etc/sysctl.conf que normalmente no debian esta
>>> linha está comentada.
>>>
>>> reinicialize ioo seu firewall aos a modificação ou de o comando sysctl
>>> -w ou algo assim , estou longe de um terminal...
>>>
>>> Aproveite e coloque no começo do seu script:
>>>
>>> iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
>>> iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
>>> iptables -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
>>>
>>> e aproveite para ler este doc que é o melhor que eu já ví até hoje sobre
>>> iptables:
>>> https://www.frozentux.net/iptables-tutorial/iptables-tutorial.html
>>>
>>> []s
>>>
>>>
>>>
>>> Em 8 de agosto de 2014 14:48, Rudimar <[email protected]> escreveu:
>>>
>>> tentei,
>>>>
>>>> $IPT -A FORWARD -i $WAN -o $LAN -p tcp --dport 3389 -j ACCEPT
>>>>
>>>> $IPT -t nat -A PREROUTING -p tcp --dport 3389 -i $WAN -d $IP1 -j DNAT
>>>> --to 192.168.1.2
>>>> $IPT -t filter -A FORWARD -p tcp --dport 3389 -i $WAN -d 192.168.1.2 -j
>>>> ACCEPT
>>>>
>>>> isso certo?  mesma coisa...
>>>>
>>>>
>>>>
>>>> Em 6 de agosto de 2014 19:35, paulo bruck <[email protected]>
>>>> escreveu:
>>>>
>>>>> Toda regra de NAT obrigatoriamente tem que ter uma regra de FORWARD (
>>>>> se for entre redes....)
>>>>>
>>>>> $IPT -t nat -A PREROUTING -p tcp --dport 3389 -i $WAN -d $IP3 -j DNAT
>>>>> --to 192.168.1.4
>>>>> $IPT -t filter -A FORWARD -p tcp --dport 3389 -i $WAN -d 192.168.1.4
>>>>> -j ACCEPT
>>>>>
>>>>>
>>>>> outra coisa que vc está confundindo é INPUT com FORWARD abaixo:
>>>>>  # Servicos WAN_to_LAN
>>>>> $IPT -A INPUT -p tcp --dport 3389 -i $WAN -j ACCEPT
>>>>> $IPT -A FORWARD -i $WAN -o $LAN -p tcp --dport 3389 -j ACCEPT
>>>>>
>>>>> INPUT é usado quando vc quer acessar algum  serviço NO firewall.
>>>>> FORWARD é usado quando vc quer acessar serviço entre redes.
>>>>>
>>>>>
>>>>> ats
>>>>>
>>>>> Paulo Ricardo Bruck
>>>>> http://www.contatogs.com.br
>>>>> http://www.protejasuarede.com.br
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> Em 6 de agosto de 2014 19:25, Rudimar <[email protected]> escreveu:
>>>>>
>>>>> Galera preciso de ajuda,
>>>>>>
>>>>>> estou tentando fazer um firewall para a rede aqui e preciso de uma
>>>>>> ajuda. Para entender, esse é configuração do meu link (x é ip valido,
>>>>>> logicamente ocultei botando x):
>>>>>>
>>>>>> Rede: x.184/29
>>>>>> x.184 - endereço da Rede
>>>>>> x.185 - Gateway
>>>>>> x.186 - livre para uso
>>>>>> x.187 - livre para uso
>>>>>> x.188 - livre para uso
>>>>>> x.191 - Broadcast
>>>>>> Máscara: 255.255.255.248
>>>>>>
>>>>>>
>>>>>> ----------------------------------
>>>>>> no  /etc/network/interfaces botei assim:
>>>>>>
>>>>>> # Link
>>>>>> # The primary network interface
>>>>>> allow-hotplug eth0
>>>>>> iface eth0 inet static
>>>>>>         address x.186
>>>>>>         netmask 255.255.255.248
>>>>>>         network x.0
>>>>>>         broadcast x.191
>>>>>>         gateway x.185
>>>>>>
>>>>>> #Rede local
>>>>>> allow-hotplug eth1
>>>>>> iface eth1 inet static
>>>>>>   address 192.168.1.100
>>>>>>   netmask 255.255.255.0
>>>>>>   network 192.168.1.0
>>>>>>   broadcast 192.168.1.255
>>>>>>
>>>>>> --------------------------
>>>>>>
>>>>>> quero direcionar ip/porta especifica para cada servidor,  exemplo
>>>>>> terminal service
>>>>>>
>>>>>> ...
>>>>>> IPT="/sbin/iptables"
>>>>>> REDE="192.168.1.0/24"
>>>>>> LAN="eth1"
>>>>>> WAN="eth0"
>>>>>> IP1="x.186"
>>>>>> IP2="x.187"
>>>>>> IP3="x.188"
>>>>>>
>>>>>>
>>>>>> ifconfig eth0:0 x.186 netmask 255.255.255.248
>>>>>> ifconfig eth0:1 x.187 netmask 255.255.255.248
>>>>>> ifconfig eth0:2 x.188 netmask 255.255.255.248
>>>>>>
>>>>>>
>>>>>> # Servicos WAN_to_LAN
>>>>>> $IPT -A INPUT -p tcp --dport 3389 -i $WAN -j ACCEPT
>>>>>> $IPT -A FORWARD -i $WAN -o $LAN -p tcp --dport 3389 -j ACCEPT
>>>>>>
>>>>>> # Direciona para cada Servidor
>>>>>> $IPT -t nat -A PREROUTING -p tcp --dport 3389 -i $WAN -d $IP1 -j DNAT
>>>>>> --to 192.168.1.2
>>>>>> $IPT -t nat -A PREROUTING -p tcp --dport 3389 -i $WAN -d $IP2 -j DNAT
>>>>>> --to 192.168.1.3
>>>>>> $IPT -t nat -A PREROUTING -p tcp --dport 3389 -i $WAN -d $IP3 -j DNAT
>>>>>> --to 192.168.1.4
>>>>>>
>>>>>> ......
>>>>>>
>>>>>>
>>>>>> O que falta fazer? pois não funciona...
>>>>>>
>>>>>> se acessar os ips externamente todos caem no firewall...
>>>>>>
>>>>>> squid.conf é só saída certo?
>>>>>>
>>>>>
>>>>>
>>>>>
>>>>> --
>>>>> Paulo Ricardo Bruck consultor
>>>>> tel 011 3596-4881/4882  011 98140-9184 (TIM)
>>>>> http://www.contatogs.com.br
>>>>> http://www.protejasuarede.com.br
>>>>> gpg AAA59989 at wwwkeys.us.pgp.net
>>>>>
>>>>
>>>>
>>>
>>>
>>> --
>>> Paulo Ricardo Bruck consultor
>>> tel 011 3596-4881/4882  011 98140-9184 (TIM)
>>> http://www.contatogs.com.br
>>> http://www.protejasuarede.com.br
>>> gpg AAA59989 at wwwkeys.us.pgp.net
>>>
>>
>>
>

Responder a