Hi Ashley!  I believe that another response answers the question that 
you asked.  I have a similar setup here at my house, although maybe a 
bit more complex.  I would be happy to share my rules with you off line 
and discuss the issues that they are set up to address.  If you are 
interested, send me a personal e-mail.

Stephen

Ashley M. Kirchner wrote:

>    Thanks to Stephen earlier, I solved one problem, now I have another.  The 
>following rules work in that they block everything incoming to the server except for 
>those services opened, and it allows traffic back and forth to and from the internal 
>network.  However, from the internal network, I can not get onto the server itself.  
>What do I have to change or add to make folks on the private network (192.168.1.0/24) 
>to be able to get onto the server itself?
>
>    Basically I want only those 4 opened ports from the outside to reach the server, 
>but anything from the internal network should be able to reach the server as well 
>(and right now nothing does) and be able to go out to the net.
>
>    Also, if anyone sees some blatant problem with these rules, please let me know 
>since I'm still learning about iptables.  My requirements are simple:
>
>    From the outside:
>    - Drop everything incoming to the server
>        except for ports 21, 22, 25 and 80.
>
>    From the inside (private) network:
>    - Forward traffic from the inside network to the outside world
>    - Allow everything in and out of the server itself
>
>    From the server itself:
>    - Allow everything/anything to go out to the world.
>
>    What'd I forget?  Here are the current set of rules:
>
># Generated by iptables-save v1.2.5 on Sat Jul  6 21:18:47 2002
>*nat
>:PREROUTING ACCEPT [148:20680]
>:POSTROUTING ACCEPT [10:774]
>:OUTPUT ACCEPT [10:774]
>-A POSTROUTING -s 192.168.1.0/255.255.255.0 -d ! 192.168.1.0/255.255.255.0 -j SNAT 
>--to-source 12.253.88.33
>COMMIT
># Completed on Sat Jul  6 21:18:47 2002
># Generated by iptables-save v1.2.5 on Sat Jul  6 21:18:47 2002
>*filter
>:INPUT DROP [129:18877]
>:FORWARD ACCEPT [0:0]
>:OUTPUT ACCEPT [10881:581839]
>-A INPUT -i lo -j ACCEPT
>-A INPUT -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
>-A INPUT -p tcp -m tcp ! --tcp-option 2 -j REJECT --reject-with tcp-reset
>-A INPUT -i eth0 -p tcp -m tcp --dport 21 -j ACCEPT
>-A INPUT -i eth0 -p udp -m udp --dport 21 -j ACCEPT
>-A INPUT -i eth0 -p tcp -m tcp --dport 22 -j ACCEPT
>-A INPUT -i eth0 -p udp -m udp --dport 22 -j ACCEPT
>-A INPUT -i eth0 -p tcp -m tcp --dport 25 -j ACCEPT
>-A INPUT -i eth0 -p tcp -m tcp --dport 80 -j ACCEPT
>-A INPUT -i eth0 -p udp -m udp --dport 80 -j ACCEPT
>-A FORWARD -d 192.168.1.0/255.255.255.0 -m state --state RELATED,ESTABLISHED -j ACCEPT
>-A FORWARD -s 192.168.1.0/255.255.255.0 -j ACCEPT
>-A OUTPUT -o lo -j ACCEPT
>COMMIT
># Completed on Sat Jul  6 21:18:47 2002
>
>--
>H | "Life is the art of drawing without an eraser." - John Gardner
>  +--------------------------------------------------------------------
>  Ashley M. Kirchner <mailto:[EMAIL PROTECTED]>   .   303.442.6410 x130
>  Director of Internet Operations / SysAdmin    .     800.441.3873 x130
>  Photo Craft Laboratories, Inc.            .     3550 Arapahoe Ave, #6
>  http://www.pcraft.com ..... .  .    .       Boulder, CO 80303, U.S.A.
>
>
>
>
>
>_______________________________________________
>Redhat-list mailing list
>[EMAIL PROTECTED]
>https://listman.redhat.com/mailman/listinfo/redhat-list
>  
>





_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to