Hi Morten,
Thanks for the reply:
[EMAIL PROTECTED] /home/users/sprabv# iptables -vnL
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source
destination
  100  9730 ACCEPT     all  --  lo     *       127.0.0.1
0.0.0.0/0
  261 22214 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0           state RELATED,ESTABLISHED
 1495  192K srvports   all  --  *      *       0.0.0.0/0
0.0.0.0/0

Chain FORWARD (policy DROP 1634 packets, 81538 bytes)
 pkts bytes target     prot opt in     out     source
destination
97022   11M seat_upd   all  --  !eth0  *       0.0.0.0/0
0.0.0.0/0
 187K   74M ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0           state RELATED,ESTABLISHED
 6792  370K ipsec      all  --  *      *       0.0.0.0/0
0.0.0.0/0
    0     0 logdrop    tcp  --  eth1   eth0    192.168.0.0/24
130.117.156.32
    0     0 logaccept  tcp  --  eth1   eth0    192.168.0.9
0.0.0.0/0           tcp dpt:3333
    1    48 logaccept  tcp  --  eth1   eth0    192.168.0.0/24
0.0.0.0/0           tcp dpt:22
   32  1536 logaccept  tcp  --  eth1   eth0    192.168.0.0/24
0.0.0.0/0           tcp dpt:53
   46 24208 logaccept  tcp  --  eth1   eth0    192.168.0.0/24
0.0.0.0/0           tcp spts:1024:65535 dpt:20
  262 12568 logaccept  tcp  --  eth1   eth0    192.168.0.0/24
0.0.0.0/0           tcp spts:1024:65535 dpt:21
 3607  175K logaccept  tcp  --  eth1   eth0    192.168.0.0/24
0.0.0.0/0           tcp spts:1024:65535 dpt:80
    0     0 logaccept  tcp  --  eth1   eth0    192.168.0.0/24
0.0.0.0/0           tcp dpt:113
    4   192 logaccept  tcp  --  eth1   eth0    192.168.0.0/24
0.0.0.0/0           tcp spts:1024:65535 dpt:25
  156  7488 logaccept  tcp  --  eth1   eth0    192.168.0.0/24
0.0.0.0/0           tcp spts:1024:65535 dpt:110
  190  9104 logaccept  tcp  --  eth1   eth0    192.168.0.0/24
0.0.0.0/0           tcp spts:1024:65535 dpt:443
    1    48 logaccept  tcp  --  eth1   eth0    192.168.0.0/24
0.0.0.0/0           tcp dpt:465
    3   144 logaccept  tcp  --  eth1   eth0    192.168.0.0/24
0.0.0.0/0           tcp dpt:995
    1    48 logaccept  tcp  --  eth1   eth0    192.168.0.0/24
0.0.0.0/0           tcp spts:1024:65535 dpt:6667
    5   240 logaccept  tcp  --  eth1   eth0    192.168.0.0/24
0.0.0.0/0           tcp dpt:5050
  850 57188 logaccept  udp  --  eth1   eth0    192.168.0.0/24
0.0.0.0/0           udp dpt:53

Chain OUTPUT (policy ACCEPT 937 packets, 75882 bytes)
 pkts bytes target     prot opt in     out     source
destination

Chain clt (0 references)
 pkts bytes target     prot opt in     out     source
destination
    0     0 ACCEPT     all  --  *      *       192.168.0.9
0.0.0.0/0
    0     0 ACCEPT     all  --  *      *       202.152.206.5
0.0.0.0/0
    0     0 ACCEPT     all  --  *      *       192.168.0.9
0.0.0.0/0
    0     0 ACCEPT     all  --  *      *       202.152.206.5
0.0.0.0/0

Chain ipsec (1 references)
 pkts bytes target     prot opt in     out     source
destination
    0     0 ACCEPT     all  --  ipsec+ *       0.0.0.0/0
0.0.0.0/0
    0     0 ACCEPT     all  --  *      ipsec+  0.0.0.0/0
0.0.0.0/0

Chain logaccept (15 references)
 pkts bytes target     prot opt in     out     source
destination
 5158  288K LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0           LOG flags 0 level 4 prefix `[FW ACCEPT]: '
 5158  288K ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0

Chain logdrop (1 references)
 pkts bytes target     prot opt in     out     source
destination
    0     0 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0           LOG flags 0 level 4 prefix `[FW DROP]: '
    0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0

Chain seat_ord (0 references)
 pkts bytes target     prot opt in     out     source
destination

Chain seat_upd (1 references)
 pkts bytes target     prot opt in     out     source
destination
    0     0 RETURN     all  --  *      *       0.0.0.0/0
0.0.0.0/0           recent: UPDATE name: seater side: source

Chain srvports (1 references)
 pkts bytes target     prot opt in     out     source
destination
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0
0.0.0.0/0           udp dpt:500
    0     0 ACCEPT     esp  --  *      *       0.0.0.0/0
0.0.0.0/0
    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0
0.0.0.0/0
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp dpt:350
   29  1713 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0           icmp type 8
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp dpt:10000
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0           icmp type 0
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0           icmp type 3
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0           icmp type 4
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0           icmp type 11
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0           icmp type 12
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp dpt:30000
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp dpt:25000
  576 43065 REJECT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           reject-with tcp-reset
  890  147K DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0

[EMAIL PROTECTED] /home/users/sprabv# iptables -vnL -t nat
Chain PREROUTING (policy ACCEPT 9208 packets, 734K bytes)
 pkts bytes target     prot opt in     out     source
destination
 3102  150K proxy      tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp dpt:80
    4   192 proxy      tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp dpt:25
  147  7056 proxy      tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           tcp dpt:110
11916 1120K devfilter  all  --  *      *       0.0.0.0/0
0.0.0.0/0
    1    44 malpacket  all  --  *      *       0.0.0.0/0
0.0.0.0/0           unclean

Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source
destination
    0     0 SNAT       tcp  --  *      eth0    192.168.0.9
0.0.0.0/0           tcp dpt:3333 to:202.6.225.34
   30  1440 SNAT       tcp  --  *      eth0    192.168.0.0/24
0.0.0.0/0           tcp dpt:53 to:202.6.225.34
   11  4868 SNAT       tcp  --  *      eth0    192.168.0.0/24
0.0.0.0/0           tcp spts:1024:65535 dpt:20 to:202.6.225.34
  245 11752 SNAT       tcp  --  *      eth0    192.168.0.0/24
0.0.0.0/0           tcp spts:1024:65535 dpt:21 to:202.6.225.34
    4   192 SNAT       tcp  --  *      eth0    192.168.0.0/24
0.0.0.0/0           tcp spts:1024:65535 dpt:25 to:202.6.225.34
 3102  150K SNAT       tcp  --  *      eth0    192.168.0.0/24
0.0.0.0/0           tcp spts:1024:65535 dpt:80 to:202.6.225.34
    0     0 SNAT       tcp  --  *      eth0    192.168.0.0/24
0.0.0.0/0           tcp dpt:113 to:202.6.225.34
  147  7056 SNAT       tcp  --  *      eth0    192.168.0.0/24
0.0.0.0/0           tcp spts:1024:65535 dpt:110 to:202.6.225.34
  164  7856 SNAT       tcp  --  *      eth0    192.168.0.0/24
0.0.0.0/0           tcp spts:1024:65535 dpt:443 to:202.6.225.34
    1    48 SNAT       tcp  --  *      eth0    192.168.0.0/24
0.0.0.0/0           tcp dpt:22 to:202.6.225.34
    1    48 SNAT       tcp  --  *      eth0    192.168.0.0/24
0.0.0.0/0           tcp dpt:465 to:202.6.225.34
    3   144 SNAT       tcp  --  *      eth0    192.168.0.0/24
0.0.0.0/0           tcp dpt:995 to:202.6.225.34
    1    48 SNAT       tcp  --  *      eth0    192.168.0.0/24
0.0.0.0/0           tcp spts:1024:65535 dpt:6667 to:202.6.225.34
    4   192 SNAT       tcp  --  *      eth0    192.168.0.0/24
0.0.0.0/0           tcp dpt:5050 to:202.6.225.34
  618 42162 SNAT       udp  --  *      eth0    192.168.0.0/24
0.0.0.0/0           udp dpt:53 to:202.6.225.34
  575 25104 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0

Chain OUTPUT (policy ACCEPT 13 packets, 2624 bytes)
 pkts bytes target     prot opt in     out     source
destination

Chain devfilter (1 references)
 pkts bytes target     prot opt in     out     source
destination
 8553  680K RETURN     all  --  eth1   *       192.168.0.0/24
0.0.0.0/0
 2613  373K devlog     all  --  !eth1  *       192.168.0.0/24
0.0.0.0/0
   94 12763 devlog     all  --  eth1   *      !192.168.0.0/24
0.0.0.0/0

Chain devlog (2 references)
 pkts bytes target     prot opt in     out     source
destination
 2707  386K LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0           LOG flags 0 level 4 prefix `[POSSIBLE SPOOF ATTEMPT]: '
 2707  386K DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0

Chain malpacket (1 references)
 pkts bytes target     prot opt in     out     source
destination
    1    44 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0           LOG flags 0 level 4 prefix `[MALFORMED PACKED FOUND]: '
    1    44 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0

Chain proxy (3 references)
 pkts bytes target     prot opt in     out     source
destination

Thanks again for your help.

Regards


Willy
----- Original Message -----
From: "Morten Nilsen" <[EMAIL PROTECTED]>
To: <[email protected]>
Sent: Tuesday, February 13, 2007 2:44 PM
Subject: Re: Trustix Enterprise Firewall 4.7 Port 137 and 138 blocked


> [EMAIL PROTECTED] wrote:
> > Hi,
> > what does port 137 and 138 does? Because I always get this log everytime
a host on my LAN access that port.
>
> Ports 137 and 138 are used by the windows network (smb), and are popular
> targets for worms.
>
> > Feb 13 13:33:10 fw kernel: [POSSIBLE SPOOF ATTEMPT]: IN=eth0 OUT=
MAC=ff:ff:ff:ff:ff:ff:00:e0:18:6c:3c:0f:08:00 SRC=192.168.0.3
DST=192.168.0.255 LEN=78 TOS=0x00 PREC=0x00 TTL=128 ID=33702 PROTO=UDP
SPT=137 DPT=137 LEN=58
> >
> > Is it necessary to open the ports? How to allow it using TEF 4.7?
>
> No idea, I've never used TEF, only iptables on standard TSL.
>
> > And also have other problem. Sometimes packet from my network on eth1
missdirected to eth0. Thanks.
>
> If you would post the output of iptables -vnL and iptables -vnL -t nat
> on a web server and post links here, I might be able to give you a
> complete answer..
>
> --
> Cheers,
> Morten
> :wq
> _______________________________________________
> tsl-discuss mailing list
> [email protected]
> http://lists.trustix.org/mailman/listinfo/tsl-discuss

_______________________________________________
tsl-discuss mailing list
[email protected]
http://lists.trustix.org/mailman/listinfo/tsl-discuss

Reply via email to