hi,

i think

-A INPUT -i eth1 --state NEW -j ACCEPT
-A INPUT -i eth1 --state RELATED,ESTABLISHED -j ACCEPT

greets
Jo

>
>
>
>     Thanks to Stephen earlier, I solved one problem, now I have
> another.  The following rules work in that they block everything
> incoming to the server except for those services opened, and it
> allows traffic back and forth to and from the internal network.
> However, from the internal network, I can not get onto the server
> itself.  What do I have to change or add to make folks on the
> private network (192.168.1.0/24) to be able to get onto the server itself?
>
>     Basically I want only those 4 opened ports from the outside
> to reach the server, but anything from the internal network
> should be able to reach the server as well (and right now nothing
> does) and be able to go out to the net.
>
>     Also, if anyone sees some blatant problem with these rules,
> please let me know since I'm still learning about iptables.  My
> requirements are simple:
>
>     From the outside:
>     - Drop everything incoming to the server
>         except for ports 21, 22, 25 and 80.
>
>     From the inside (private) network:
>     - Forward traffic from the inside network to the outside world
>     - Allow everything in and out of the server itself
>
>     From the server itself:
>     - Allow everything/anything to go out to the world.
>
>     What'd I forget?  Here are the current set of rules:
>
> # Generated by iptables-save v1.2.5 on Sat Jul  6 21:18:47 2002
> *nat
> :PREROUTING ACCEPT [148:20680]
> :POSTROUTING ACCEPT [10:774]
> :OUTPUT ACCEPT [10:774]
> -A POSTROUTING -s 192.168.1.0/255.255.255.0 -d !
> 192.168.1.0/255.255.255.0 -j SNAT --to-source 12.253.88.33
> COMMIT
> # Completed on Sat Jul  6 21:18:47 2002
> # Generated by iptables-save v1.2.5 on Sat Jul  6 21:18:47 2002
> *filter
> :INPUT DROP [129:18877]
> :FORWARD ACCEPT [0:0]
> :OUTPUT ACCEPT [10881:581839]
> -A INPUT -i lo -j ACCEPT
> -A INPUT -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
> -A INPUT -p tcp -m tcp ! --tcp-option 2 -j REJECT --reject-with tcp-reset
> -A INPUT -i eth0 -p tcp -m tcp --dport 21 -j ACCEPT
> -A INPUT -i eth0 -p udp -m udp --dport 21 -j ACCEPT
> -A INPUT -i eth0 -p tcp -m tcp --dport 22 -j ACCEPT
> -A INPUT -i eth0 -p udp -m udp --dport 22 -j ACCEPT
> -A INPUT -i eth0 -p tcp -m tcp --dport 25 -j ACCEPT
> -A INPUT -i eth0 -p tcp -m tcp --dport 80 -j ACCEPT
> -A INPUT -i eth0 -p udp -m udp --dport 80 -j ACCEPT
> -A FORWARD -d 192.168.1.0/255.255.255.0 -m state --state
> RELATED,ESTABLISHED -j ACCEPT
> -A FORWARD -s 192.168.1.0/255.255.255.0 -j ACCEPT
> -A OUTPUT -o lo -j ACCEPT
> COMMIT
> # Completed on Sat Jul  6 21:18:47 2002
>
> --
> H | "Life is the art of drawing without an eraser." - John Gardner
>   +--------------------------------------------------------------------
>   Ashley M. Kirchner <mailto:[EMAIL PROTECTED]>   .   303.442.6410 x130
>   Director of Internet Operations / SysAdmin    .     800.441.3873 x130
>   Photo Craft Laboratories, Inc.            .     3550 Arapahoe Ave, #6
>   http://www.pcraft.com ..... .  .    .       Boulder, CO 80303, U.S.A.
>
>
>
>
>
> _______________________________________________
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to