Oops, guess my eyes were moving faster than my brain again.

-----Original Message-----
From: Alexey Fadyushin [mailto:[EMAIL PROTECTED] 
Sent: Sunday, August 31, 2003 12:29 PM
To: [EMAIL PROTECTED]
Subject: Re: IP tables help


Did you note the last line in the INPUT chain?
The firewall will not accept anything not listed in the first two lines
of the INPUT chain regardless of the default policy because the
catch-all
REJECT rule in the chain will be always used instead of the default
policy.

The default ACCEPT policy is just a precaution intended to be used when
something happens during the loading of rules. In that case the REJECT
or DROP default policy may prevent further communication with the
machine
if the rule which allows, for example, SSH and rules that folow it
has not been loaded due to some error.

Alexey Fadyushin
Brainbench MVP for Linux
http://www.brainbench.com

Jason Staudenmayer wrote:
> 
> I would change that 'INPUT ACCEPT' to DROP or else the firewall really
isn't
> a firewall since it will accept anything.
> 
> -----Original Message-----
> From: Alexey Fadyushin [mailto:[EMAIL PROTECTED]
> Sent: Sunday, August 31, 2003 11:42 AM
> To: [EMAIL PROTECTED]
> Subject: Re: IP tables help
> 
> I think that the following configuration will help.
> Put the following lines in /etc/sysconfig/iptables:
> 
> *nat
> :PREROUTING ACCEPT
> :POSTROUTING ACCEPT
> :OUTPUT ACCEPT
> -A POSTROUTING -s 192.168.1.0/24 -j SNAT --to-source <YOUR EXTERNAL
> ADDRESS HERE>
> COMMIT
> 
> *filter
> :INPUT ACCEPT
> :FORWARD ACCEPT
> :OUTPUT ACCEPT
> -A INPUT -i eth1 -j ACCEPT
> -A INPUT -i eth0 -p tcp -m multiport --destination-port
> ssh,http,ftp,ftp-data,smtp -j ACCEPT
> -A INPUT -j REJECT
> -A FORWARD -i eth0 -o eth1 -d 192.168.1.0/24 -j ACCEPT
> -A FORWARD -i eth1 -o eth0 -s 192.168.1.0/24 -j ACCEPT
> -A FORWARD -j DROP
> COMMIT
> 
> Alexey Fadyushin
> Brainbench MVP for Linux
> http://www.brainbench.com
> 
> Rudik Amirjanyan wrote:
> >
> > Hello
> > In my small office we have local lan 192.168.1.0 and we have put a RH9
as
> a
> > router, and want to masquerade the local ip addreses of the network. The
> > server has 2 interfaces, eth0 whit global IP adress, and eth1
192.168.1.1.
> > we want to open only ssh, ftp, www, mail, ports from outsaid, and
> everewhere
> > from local lan.
> > We have setup iptables, but do not know how to make it work. the
question
> > is,
> > what entries must be in the /etc/sysconfig/iptables file to work the
> > firewall properly.
> > Any halp is appreciated.
> >
> > Thanks.
> >
> > --
> > redhat-list mailing list
> > unsubscribe mailto:[EMAIL PROTECTED]
> > https://www.redhat.com/mailman/listinfo/redhat-list
> 
> --
> redhat-list mailing list
> unsubscribe mailto:[EMAIL PROTECTED]
> https://www.redhat.com/mailman/listinfo/redhat-list
> 
> --
> redhat-list mailing list
> unsubscribe mailto:[EMAIL PROTECTED]
> https://www.redhat.com/mailman/listinfo/redhat-list


-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]
https://www.redhat.com/mailman/listinfo/redhat-list


-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]
https://www.redhat.com/mailman/listinfo/redhat-list

Reply via email to