Galera,

como n�s sabemos, cada empresa tem suas necessidades e muitas vezes bloquear 
tudo e liberar somente o necess�rio n�o � o ideal por v�rios motivos. 
O que tentei fazer aqui foi compartilhar as informa��es mais relevantes que 
s�o os servidores do MSN e Kazaa e suas portas, mas a forma como isso vai ser 
aplicado no firewall vai depender da prefer�ncia de cada um.

Agrade�o as sugest�es, mas n�o quis levantar nenhuma discuss�o a respeito, e 
sim disponibilizar uma pequena ajuda as pessoas que por ventura tenham 
procurado alguma coisa na Internet e n�o tiveram sucesso.

-- 
[ ]'s
Fabr�cio Lamonica
Analista de T.I.
Linux User # 169949
Net & Net Tecnologia em Inform�tica Ltda.
http://www.netenet.com.br


Em Qua 11 Mai 2005 18:25, Edson Ricardo Sim�o escreveu:
> Sem querer desmerecer o seu trabalho, n�o seria mais f�cil mudar a pol�tica
> padr�o das chains para DROP e liberar s� o que � necess�rio, ao inv�s de
> usar esse tanto de regras?
>
> Em Qua 11 Mai 2005 15:53, Fabr�cio Lamonica escreveu:
> > Pessoal,
> > segue as regras de iptables agora para bloquear Kazaa. Aqui funcionou
> > belezinha.
> >
> > iptables -t nat -A POSTROUTING -p tcp -s 192.168.0.0/24 -d 0.0.0.0/0
> > --dport 1214 -j DROP iptables -t nat -A POSTROUTING -p tcp -s
> > 192.168.0.0/24 -d 0.0.0.0/0 --dport 1286 -j DROP iptables -t nat -A
> > POSTROUTING -p tcp -s 192.168.0.0/24 -d 0.0.0.0/0 --dport 1334 -j DROP
> > iptables -t nat -A POSTROUTING -p tcp -s 192.168.0.0/24 -d 0.0.0.0/0
> > --dport 1337 -j DROP iptables -t nat -A POSTROUTING -p tcp -s
> > 192.168.0.0/24 -d 0.0.0.0/0 --dport 1349 -j DROP iptables -t nat -A
> > POSTROUTING -p tcp -s 192.168.0.0/24 -d 0.0.0.0/0 --dport 1374 -j DROP
> > iptables -t nat -A POSTROUTING -p tcp -s 192.168.0.0/24 -d 0.0.0.0/0
> > --dport 1406 -j DROP iptables -t nat -A POSTROUTING -p tcp -s
> > 192.168.0.0/24 -d 0.0.0.0/0 --dport 1894 -j DROP iptables -t nat -A
> > POSTROUTING -p tcp -s 192.168.0.0/24 -d 0.0.0.0/0 --dport 2206 -j DROP
> > iptables -t nat -A POSTROUTING -p tcp -s 192.168.0.0/24 -d 0.0.0.0/0
> > --dport 2243 -j DROP iptables -t nat -A POSTROUTING -p tcp -s
> > 192.168.0.0/24 -d 0.0.0.0/0 --dport 2250 -j DROP iptables -t nat -A
> > POSTROUTING -p tcp -s 192.168.0.0/24 -d 0.0.0.0/0 --dport 2258 -j DROP
> > iptables -t nat -A POSTROUTING -p tcp -s 192.168.0.0/24 -d 0.0.0.0/0
> > --dport 2358 -j DROP iptables -t nat -A POSTROUTING -p tcp -s
> > 192.168.0.0/24 -d 0.0.0.0/0 --dport 2391 -j DROP iptables -t nat -A
> > POSTROUTING -p tcp -s 192.168.0.0/24 -d 0.0.0.0/0 --dport 2464 -j DROP
> > iptables -t nat -A POSTROUTING -p tcp -s 192.168.0.0/24 -d 0.0.0.0/0
> > --dport 2589 -j DROP iptables -t nat -A POSTROUTING -p tcp -s
> > 192.168.0.0/24 -d 0.0.0.0/0 --dport 2597 -j DROP iptables -t nat -A
> > POSTROUTING -p tcp -s 192.168.0.0/24 -d 0.0.0.0/0 --dport 2861 -j DROP
> > iptables -t nat -A POSTROUTING -p tcp -s 192.168.0.0/24 -d 0.0.0.0/0
> > --dport 3003 -j DROP iptables -t nat -A POSTROUTING -p tcp -s
> > 192.168.0.0/24 -d 0.0.0.0/0 --dport 3074 -j DROP iptables -t nat -A
> > POSTROUTING -p tcp -s 192.168.0.0/24 -d 0.0.0.0/0 --dport 3292 -j DROP
> > iptables -t nat -A POSTROUTING -p tcp -s 192.168.0.0/24 -d 0.0.0.0/0
> > --dport 3474 -j DROP iptables -t nat -A POSTROUTING -p tcp -s
> > 192.168.0.0/24 -d 0.0.0.0/0 --dport 3640 -j DROP iptables -t nat -A
> > POSTROUTING -p tcp -s 192.168.0.0/24 -d 0.0.0.0/0 --dport 3756 -j DROP
> > iptables -t nat -A POSTROUTING -p tcp -s 192.168.0.0/24 -d 0.0.0.0/0
> > --dport 3808 -j DROP iptables -t nat -A POSTROUTING -p tcp -s
> > 192.168.0.0/24 -d 0.0.0.0/0 --dport 3958 -j DROP
> >
> >
> > iptables -t nat -A POSTROUTING -p tcp -s 192.168.0.0/24 -d 0.0.0.0/0
> > --dport 32656 -j DROP iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -d
> > 200.155.63.5/24 -j DROP iptables -t nat -A POSTROUTING -s 192.168.0.0/24
> > -d 64.14.124.65/24 -j DROP iptables -t nat -A POSTROUTING -s
> > 192.168.0.0/24 -d 200.155.63.7/24 -j DROP iptables -t nat -A POSTROUTING
> > -s 192.168.0.0/24 -d 68.97.73.224/24 -j DROP iptables -t nat -A
> > POSTROUTING -s 192.168.0.0/24 -d 67.140.33.50/24 -j DROP iptables -t nat
> > -A POSTROUTING -s 192.168.0.0/24 -d 64.233.161.104/24 -j DROP iptables -t
> > nat -A POSTROUTING -s 192.168.0.0/24 -d 12.202.146.153/24 -j DROP
> > iptables -t nat -A POSTROUTING -s
> > 192.168.0.0/24 -d 172.164.197.186/24 -j DROP iptables -t nat -A
> > POSTROUTING -s 192.168.0.0/24 -d 68.35.78.53/24 -j DROP iptables -t nat
> > -A POSTROUTING -s 192.168.0.0/24 -d 69.70.244.213/24 -j DROP iptables -t
> > nat -A POSTROUTING -s 192.168.0.0/24 -d 85.226.71.201/24 -j DROP iptables
> > -t nat -A POSTROUTING -s 192.168.0.0/24 -d 200.113.117.79/24 -j DROP
> > iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -d 201.13.83.97/24 -j
> > DROP iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -d 68.204.44.183/24
> > -j DROP iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -d
> > 68.119.69.171/24 -j DROP iptables -t nat -A POSTROUTING -s 192.168.0.0/24
> > -d 69.149.82.100/24 -j DROP iptables -t nat -A POSTROUTING -s
> > 192.168.0.0/24 -d 24.122.71.237/24 -j DROP
>
> ---------------------------------------------------------------------------
> Esta lista  patrocinada pela Conectiva S.A. Visite
> http://www.conectiva.com.br
>
> Arquivo: http://bazar2.conectiva.com.br/mailman/listinfo/linux-br
> Regras de utilizao da lista: http://linux-br.conectiva.com.br
> FAQ: http://www.zago.eti.br/menu.html


---------------------------------------------------------------------------
Esta lista � patrocinada pela Conectiva S.A. Visite http://www.conectiva.com.br

Arquivo: http://bazar2.conectiva.com.br/mailman/listinfo/linux-br
Regras de utiliza��o da lista: http://linux-br.conectiva.com.br
FAQ: http://www.zago.eti.br/menu.html

Responder a