Iptables does it actually make it advertise on the master lists? I tried
for about 3 months, and got everything (people could direct connect),
except
it being on a master list. And it wasn't just Iptables, it was Freesco,
and
Coyote too. And yes I know its all the same, just kernel variants (linux
mailing list, I could be killed if I didn't say that) Then as soon as I
could hookup a Trendnet Router I got, the CS server was up in full force
in
under an hour. I don't wish to pan the linux router, because its a
freakin
awesome thing to do with old equipment that has "passed its finest hour."
Just curious "after the fact" if it totally works I guess.
----- Original Message -----
From: "Kennycom" <[EMAIL PROTECTED]>
To: <[email protected]>
Sent: Saturday, December 25, 2004 10:37 PM
Subject: Re: [hlds_linux] Iptables help! ;-)
Here is my iptables setup,, there is a port range, as at times I have
more
then 1 server running (CSS/HL2dm). If you are just going to be running 1
game process on the 1 server then edit it . I am sure that someone here
will
probably point out a few lines that could be dropped for your purposes.
If
there is no need to insure access from the inside network to the
gameserver
with a client game then drop the postrouting strings, as they are
probably
redundent but help insure everything works.
# CS
iptables -A PREROUTING -t nat -p udp -d ${OUTSIDE_IP} --dport 1200 -j
DNAT --to ${KENNYCOM1_IP}:1200
iptables -A FORWARD -p udp -d ${KENNYCOM1_IP} --dport 1200 -o
${INSIDE_DEVICE} -j ACCEPT
iptables -A PREROUTING -t nat -p udp -d ${OUTSIDE_IP} --dport 27020 -j
DNAT --to ${KENNYCOM1_IP}:27020
iptables -A FORWARD -p udp -d ${KENNYCOM1_IP} --dport 27020 -o
${INSIDE_DEVICE} -j ACCEPT
iptables -A PREROUTING -t nat -p udp -d ${OUTSIDE_IP} --dport
27000:27016 -j
DNAT --to ${KENNYCOM1_IP}:27000-27016
iptables -A FORWARD -p udp -d ${KENNYCOM1_IP} --dport 27000:27016 -o
${INSIDE_DEVICE} -j ACCEPT
iptables -A POSTROUTING -t nat -p udp -d ${KENNYCOM1_IP} --dport
27000:27016 -s ${INSIDE_NETWORK}/${INSIDE_NETMASK} -j SNAT --to
${OUTSIDE_IP}
iptables -A PREROUTING -t nat -p tcp -d ${OUTSIDE_IP} --dport
27030:27039 -j
DNAT --to ${KENNYCOM1_IP}:27030-27039
iptables -A FORWARD -p tcp -d ${KENNYCOM1_IP} --dport 27030:27039 -o
${INSIDE_DEVICE} -j ACCEPT
iptables -A POSTROUTING -t nat -p tcp -d ${KENNYCOM1_IP} --dport
27030:27039 -s ${INSIDE_NETWORK}/${INSIDE_NETMASK} -j SNAT --to
${OUTSIDE_IP}
iptables -A PREROUTING -t nat -p tcp -d ${OUTSIDE_IP} --dport
27015:27016 -j
DNAT --to ${KENNYCOM1_IP}:27015-27016
iptables -A FORWARD -p tcp -d ${KENNYCOM1_IP} --dport 27015:27016 -o
${INSIDE_DEVICE} -j ACCEPT
iptables -A POSTROUTING -t nat -p tcp -d ${KENNYCOM1_IP} --dport
27015:27016 -s ${INSIDE_NETWORK}/${INSIDE_NETMASK} -j SNAT --to
${OUTSIDE_IP}
Other information can be found at www.iptables.org
=)
----- Original Message -----
From: "danal1" <[EMAIL PROTECTED]>
To: <[email protected]>
Sent: Saturday, December 25, 2004 3:37 PM
Subject: [hlds_linux] Iptables help! ;-)
> Hi,
> Does anyone use the Linux server behind an iptables firewall?
>
> If so, could you email your Ipmasquerade and forwarding rules and port
> settings tcp and udp for
> the HLDS?
>
> Thanks!
>
> This is a great list to be on!
> Dana
>
>
> --
> No virus found in this outgoing message.
> Checked by AVG Anti-Virus.
> Version: 7.0.296 / Virus Database: 265.6.4 - Release Date: 12/22/2004
>
>
>
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list archives,
> please visit:
> http://list.valvesoftware.com/mailman/listinfo/hlds_linux
>
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives,
please visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives,
please visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux