Displaying 4 results from an estimated 4 matches for "rango_ip".
Did you mean:
range_sp
2005 May 20
1
Iptables - PREROUTING
...n
##Note: eth0 is the network interface connect to router and
## eth1 comnect to lan
## The localhost full
iptables -A INPUT -i lo -j ACCEPT
## DROP the ping for eth0
iptables -A INPUT -i eth0 -p ICMP --icmp-type echo-request -j DROP
## All pack of router acept.
iptables -A INPUT -i eth0 -s rango_ip/29 -d 0/0 -p all -j ACCEPT
iptables -A INPUT -i eth1 -s 172.16.0.0/24 -d 172.16.0.211/32 -p all -j
ACCEPT
##Redirect server web
iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 80 -j DNAT --to
172.16.0.3:80
iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 443 -j DNAT --to
172.16.0.3:443
i...
2005 May 23
1
RE: Wireless Networking
...PT [0:0]
[spot for nat rules]
COMMIT
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
[spot for filter rules]
COMMIT
[in the filter rules:]
-A INPUT -i lo -j ACCEPT
# the following is _not_ nice
-A INPUT -i eth0 -p ICMP --icmp-type echo-request -j DROP
-A INPUT -i eth0 -s rango_ip/29 -d 0/0 -p all -j ACCEPT
-A INPUT -i eth1 -s 172.16.0.0/24 -d 172.16.0.211/32 -p all -j ACCEPT
[above in the nat spot]
-A PREROUTING -i eth0 -p tcp --dport 80 -j DNAT --to 172.16.0.3:80 -A
PREROUTING -i eth0 -p tcp --dport 443 -j DNAT --to 172.16.0.3:443
[again in the filter spot]
-A FORWARD...
2005 May 23
0
RE: Wireless Networking
...WARD DROP [0:0]
> :OUTPUT ACCEPT [0:0]
>
> [spot for filter rules]
>
> COMMIT
>
>
> [in the filter rules:]
> -A INPUT -i lo -j ACCEPT
>
> # the following is _not_ nice
> -A INPUT -i eth0 -p ICMP --icmp-type echo-request -j DROP
>
> -A INPUT -i eth0 -s rango_ip/29 -d 0/0 -p all -j ACCEPT
> -A INPUT -i eth1 -s 172.16.0.0/24 -d 172.16.0.211/32 -p all -j ACCEPT
>
>
> [above in the nat spot]
> -A PREROUTING -i eth0 -p tcp --dport 80 -j DNAT --to 172.16.0.3:80 -A
> PREROUTING -i eth0 -p tcp --dport 443 -j DNAT --to 172.16.0.3:443
>
>...
2005 May 23
0
iptables problem
...RH-Firewall-1-INPUT -m state --state NEW -m tcp -p
tcp --dport 21 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p
tcp --dport 22 -j ACCEPT
-A RH-Firewall-1-INPUT -j REJECT --reject-with
icmp-host-prohibited
#todo al localhost y a infocom
-A INPUT -i lo -j ACCEPT
-A INPUT -i eth0 -s rango_ip -d 0/0 -p all -j ACCEPT
-A INPUT -i eth1 -s 172.16.0.0/24 -d 172.16.0.1/32 -p
all -j ACCEPT
#negamos el ping
-A INPUT -i eth0 -p ICMP --icmp-type echo-request -j
DROP
-A INPUT -i eth1 -p ICMP --icmp-type echo-request -j
DROP
## SALIDA SMTP - Para que el servidor se pueda
conectar a otros MTA
# Perm...