search for: rango_ip

Displaying 4 results from an estimated 4 matches for "rango_ip".

Did you mean: range_sp
2005 May 20
1
Iptables - PREROUTING
...n ##Note: eth0 is the network interface connect to router and ## eth1 comnect to lan ## The localhost full iptables -A INPUT -i lo -j ACCEPT ## DROP the ping for eth0 iptables -A INPUT -i eth0 -p ICMP --icmp-type echo-request -j DROP ## All pack of router acept. iptables -A INPUT -i eth0 -s rango_ip/29 -d 0/0 -p all -j ACCEPT iptables -A INPUT -i eth1 -s 172.16.0.0/24 -d 172.16.0.211/32 -p all -j ACCEPT ##Redirect server web iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 80 -j DNAT --to 172.16.0.3:80 iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 443 -j DNAT --to 172.16.0.3:443 i...
2005 May 23
1
RE: Wireless Networking
...PT [0:0] [spot for nat rules] COMMIT *filter :INPUT DROP [0:0] :FORWARD DROP [0:0] :OUTPUT ACCEPT [0:0] [spot for filter rules] COMMIT [in the filter rules:] -A INPUT -i lo -j ACCEPT # the following is _not_ nice -A INPUT -i eth0 -p ICMP --icmp-type echo-request -j DROP -A INPUT -i eth0 -s rango_ip/29 -d 0/0 -p all -j ACCEPT -A INPUT -i eth1 -s 172.16.0.0/24 -d 172.16.0.211/32 -p all -j ACCEPT [above in the nat spot] -A PREROUTING -i eth0 -p tcp --dport 80 -j DNAT --to 172.16.0.3:80 -A PREROUTING -i eth0 -p tcp --dport 443 -j DNAT --to 172.16.0.3:443 [again in the filter spot] -A FORWARD...
2005 May 23
0
RE: Wireless Networking
...WARD DROP [0:0] > :OUTPUT ACCEPT [0:0] > > [spot for filter rules] > > COMMIT > > > [in the filter rules:] > -A INPUT -i lo -j ACCEPT > > # the following is _not_ nice > -A INPUT -i eth0 -p ICMP --icmp-type echo-request -j DROP > > -A INPUT -i eth0 -s rango_ip/29 -d 0/0 -p all -j ACCEPT > -A INPUT -i eth1 -s 172.16.0.0/24 -d 172.16.0.211/32 -p all -j ACCEPT > > > [above in the nat spot] > -A PREROUTING -i eth0 -p tcp --dport 80 -j DNAT --to 172.16.0.3:80 -A > PREROUTING -i eth0 -p tcp --dport 443 -j DNAT --to 172.16.0.3:443 > &gt...
2005 May 23
0
iptables problem
...RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 21 -j ACCEPT -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT -A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited #todo al localhost y a infocom -A INPUT -i lo -j ACCEPT -A INPUT -i eth0 -s rango_ip -d 0/0 -p all -j ACCEPT -A INPUT -i eth1 -s 172.16.0.0/24 -d 172.16.0.1/32 -p all -j ACCEPT #negamos el ping -A INPUT -i eth0 -p ICMP --icmp-type echo-request -j DROP -A INPUT -i eth1 -p ICMP --icmp-type echo-request -j DROP ## SALIDA SMTP - Para que el servidor se pueda conectar a otros MTA # Perm...