Ok here's what I have (the long version).
RH8 firewall/VPN server
Winblows clients connect to vpn server.
We have an Exchange server running to handle the email etc..
I have another vpn with ipchains and everything is great.
I have tried to "convert" the chains to tables but it's not 
that easy. I've tried SNAT and forward and some how I'm missing
Packets when I view the logs. Here's what I have so far.

The clients can connect but that's it. No drive mapping to the domain server
or 
Exchange email. I have used the LOGs but I get to the point when I think I'm
adding my 
Last rule and then everything disappears.

# Generated by iptables-save v1.2.6a on Fri Nov 15 16:53:31 2002
*filter
:INPUT DROP [1514:251666]
:FORWARD DROP [487:46536]
:OUTPUT DROP [36:2231]
:logit - [0:0]
-A INPUT -s 192.9.199.0/255.255.255.0 -p tcp -m tcp --dport 22 -j ACCEPT 
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT 
-A INPUT -s 192.9.199.0/255.255.255.0 -d 192.9.199.231 -i eth0 -p tcp -m tcp
--dport 10000 -j ACCEPT 
-A INPUT -d 111.222.333.444 -i eth1 -p tcp -m tcp --dport 1723 -j ACCEPT 
-A INPUT -d 111.222.333.444 -i eth1 -p 47 -j ACCEPT 
-A INPUT -s 192.9.199.0/255.255.255.0 -d 255.255.255.255 -i ppp+ -p udp -m
udp --sport 137 --dport 137 -j ACCEPT 
-A INPUT -s 192.9.199.0/255.255.255.0 -d 255.255.255.255 -i ppp+ -p udp -m
udp --sport 138 --dport 138 -j ACCEPT 
-A INPUT -s 192.9.199.0/255.255.255.0 -d 192.9.199.231 -i ppp+ -p tcp -m tcp
--sport 1024:65535 --dport 139 -j ACCEPT 
-A INPUT -s 192.9.199.0/255.255.255.0 -d 192.9.199.0/255.255.255.0 -i eth0
-p tcp -m tcp --sport 445 --dport 1024:65535 -j ACCEPT 
-A INPUT -s 192.9.199.0/255.255.255.0 -d 192.9.199.0/255.255.255.0 -i eth0
-p tcp -m tcp --sport 139 --dport 1024:65535 -j ACCEPT 
-A INPUT -s 192.9.199.0/255.255.255.0 -d 192.9.199.0/255.255.255.0 -i eth0
-p tcp -m tcp --sport 135 --dport 1024:65535 -j ACCEPT 
-A INPUT -d 192.9.199.231 -i eth0 -p udp -m udp --sport 53 --dport
1024:65535 -j ACCEPT 
-A INPUT -p udp -m udp --sport 53 --dport 1024:65535 -j ACCEPT 
-A INPUT -i lo -j ACCEPT 
-A INPUT -s 192.9.199.0/255.255.255.0 -i eth0 -p udp -m udp --sport
1024:65535 --dport 53 -j ACCEPT 
-A INPUT -s 192.9.199.0/255.255.255.0 -i eth0 -p tcp -m tcp --sport
1024:65535 --dport 139 -j ACCEPT 
-A FORWARD -s 192.9.199.0/255.255.255.0 -d 192.9.199.0/255.255.255.0 -p tcp
-m tcp --sport 1024:65535 --dport 80 -j ACCEPT 
-A FORWARD -s 192.9.199.0/255.255.255.0 -d 192.9.199.0/255.255.255.0 -p tcp
-m tcp --sport 1024:65535 --dport 445 -j ACCEPT 
-A FORWARD -s 192.9.199.0/255.255.255.0 -d 192.9.199.0/255.255.255.0 -p tcp
-m tcp --sport 1024:65535 --dport 139 -j ACCEPT 
-A OUTPUT -s 192.9.199.0/255.255.255.0 -p tcp -m tcp --sport 22 -j ACCEPT 
-A OUTPUT -p tcp -m tcp --sport 80 -j ACCEPT 
-A OUTPUT -s 192.9.199.0/255.255.255.0 -d 192.9.199.0/255.255.255.0 -o eth0
-p tcp -m tcp --sport 10000 -j ACCEPT 
-A OUTPUT -s 111.222.333.444 -o eth1 -p 47 -j ACCEPT 
-A OUTPUT -s 111.222.333.444 -o eth1 -p tcp -m tcp --sport 1723 --dport
1024:65535 -j ACCEPT 
-A OUTPUT -s 192.9.199.231 -d 192.9.199.0/255.255.255.0 -o ppp+ -p udp -m
udp --sport 138 --dport 138 -j ACCEPT 
-A OUTPUT -s 192.9.199.231 -d 192.9.199.0/255.255.255.0 -o ppp+ -p udp -m
udp --sport 137 --dport 137 -j ACCEPT 
-A OUTPUT -s 192.9.199.231 -d 192.9.199.0/255.255.255.0 -o eth0 -p udp -m
udp --sport 137 --dport 137 -j ACCEPT 
-A OUTPUT -s 192.9.199.231 -d 192.9.199.0/255.255.255.0 -o eth0 -p udp -m
udp --sport 138 --dport 138 -j ACCEPT 
-A OUTPUT -s 192.9.199.231 -d 192.9.199.0/255.255.255.0 -o ppp+ -p tcp -m
tcp --sport 139 --dport 1024:65535 -j ACCEPT 
-A OUTPUT -s 192.9.199.0/255.255.255.0 -d 192.9.199.0/255.255.255.0 -o eth0
-p tcp -m tcp --sport 1024:65535 --dport 445 -j ACCEPT 
-A OUTPUT -s 192.9.199.0/255.255.255.0 -d 192.9.199.0/255.255.255.0 -o eth0
-p tcp -m tcp --sport 1024:65535 --dport 135 -j ACCEPT 
-A OUTPUT -s 192.9.199.231 -o eth0 -p udp -m udp --sport 1024:65535 --dport
53 -j ACCEPT 
-A OUTPUT -p udp -m udp --sport 1024:65535 --dport 53 -j ACCEPT 
-A OUTPUT -o lo -j ACCEPT 
-A OUTPUT -d 192.9.199.0/255.255.255.0 -o eth0 -p udp -m udp --sport 53
--dport 1024:65535 -j ACCEPT 
-A OUTPUT -d 192.9.199.0/255.255.255.0 -o eth0 -p tcp -m tcp --sport 139
--dport 1024:65535 -j ACCEPT 
-A logit -m state --state ESTABLISHED -j RETURN 
-A logit -j LOG 
-A logit -j RETURN 
COMMIT
# Completed on Fri Nov 15 16:53:31 2002
# Generated by iptables-save v1.2.6a on Fri Nov 15 16:53:31 2002
*nat
:PREROUTING ACCEPT [1886:285229]
:POSTROUTING ACCEPT [46:4712]
:OUTPUT ACCEPT [66:5972]
-A POSTROUTING -o ppp+ -j MASQUERADE 
-A POSTROUTING -o eth1 -j MASQUERADE 
COMMIT
# Completed on Fri Nov 15 16:53:31 2002

-----Original Message-----
From: Jason Costomiris [mailto:[EMAIL PROTECTED]] 
Sent: Saturday, November 16, 2002 9:45 AM
To: [EMAIL PROTECTED]
Subject: Re: Iptables HELP vpn



On Friday, November 15, 2002, at 09:00  PM, Yoink! wrote:
> Try something like this if it's imap you are after:
>
> iptables -A INPUT  -i ppp0 -p tcp --sport 143 -m state -j ACCEPT 
> iptables -A OUTPUT -o ppp0 -p tcp --dport 143 -m state -j ACCEPT

That would only work if the IMAP server was running on the firewall 
(and you've got the sport/dport backwards :) ).  You most likely want 
to use the FORWARD chain.

-- 
Jason Costomiris <><
E: jcostom {at} jasons {dot} org / W: http://www.jasons.org/ Quidquid latine
dictum sit, altum viditur.



-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list



-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to