Enviado em 16/07/2009 - 10:59h
Boas! Não estou conseguindo fazer minha rede acessar ftp fora dela.
Todas as requisições de ftp caem no meu firewall.
Segue abaixo meu script de firewall:
--------------------------------- FIREWALL------------------------------------------------------
#!/bin/sh -x
iptables -t nat -F
iptables -t nat -X
iptables -t filter -F
iptables -t filter -X
iptables -F
iptables -X
iptables -t nat -A PREROUTING -p tcp -d 192.168.0.0/24 -j LOG
#----------
# Regras para funcionamento do Conectividade Social da CEF
#----------
iptables -t nat -A PREROUTING -p tcp -d 200.201.0.0/16 -j ACCEPT
iptables -A FORWARD -p tcp -d 200.201.0.0/16 -j ACCEPT
iptables -t nat -A PREROUTING -d 200.201.174.202 -p tcp -m tcp --dport 80 -j DNAT --to-destination 200.201.174.202:80
iptables -t nat -A PREROUTING -d 200.201.174.203 -p tcp -m tcp --dport 80 -j DNAT --to-destination 200.201.174.203:80
iptables -t nat -A PREROUTING -d 200.201.174.204 -p tcp -m tcp --dport 80 -j DNAT --to-destination 200.201.174.204:80
iptables -t nat -A PREROUTING -d 200.201.174.205 -p tcp -m tcp --dport 80 -j DNAT --to-destination 200.201.174.205:80
iptables -t nat -A PREROUTING -d 200.201.174.206 -p tcp -m tcp --dport 80 -j DNAT --to-destination 200.201.174.206:80
iptables -t nat -A PREROUTING -d 200.201.174.207 -p tcp -m tcp --dport 80 -j DNAT --to-destination 200.201.174.207:80
iptables -t nat -A PREROUTING -d 200.201.174.208 -p tcp -m tcp --dport 80 -j DNAT --to-destination 200.201.174.208:80
iptables -t nat -A PREROUTING -d 200.201.174.209 -p tcp -m tcp --dport 80 -j DNAT --to-destination 200.201.174.209:80
iptables -t nat -A PREROUTING -p tcp -s 192.168.0.0/24 --dport 80 -j REDIRECT --to-port 3128
iptables -t filter -P FORWARD ACCEPT
iptables -t filter -P INPUT ACCEPT
iptables -t filter -P OUTPUT ACCEPT
iptables -t filter -A OUTPUT -o eth0 -p tcp -m multiport --dport domain,http,https -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
iptables -t filter -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -t filter -A INPUT -p icmp -m icmp --icmp-type echo-request -j ACCEPT
#iptables -A FORWARD -p udp -s 192.168.0.0/24 --dport 53 -j ACCEPT
iptables -A FORWARD -p tcp --sport 22 -s 192.168.0.0/24 --dport 22 -j ACCEPT
iptables -A FORWARD -p tcp --sport 25 -j ACCEPT
iptables -I FORWARD -s 192.168.0.0/24 -p tcp --dport 21 -j ACCEPT
iptables -I FORWARD -d 192.168.0.0/24 -m state --state ESTABLISHED,RELATED -j ACCEPT
#iptables -A FORWARD -p tcp --dport 21 -j ACCEPT
iptables -t nat -A PREROUTING -p tcp -i eth0 --dport 110 -j REDIRECT --to 110
#iptables -t nat -A PREROUTING -p tcp -i eth0 --dport 21 -j DNAT --to-destination 192.168.0.5:21
#iptables -t nat -A PREROUTING -p udp -i eth0 --dport 21 -j DNAT --to-destination 192.168.0.5:21
#iptables -t nat -A PREROUTING -p tcp -d 201.24.152.2 -o eth0 --sport 21 -j REDIRECT --to 21
iptables -A FORWARD -p tcp --sport 110 -j ACCEPT
iptables -t nat -A PREROUTING -p tcp --sport 22 --dport 22 -j DNAT --to 64.233.161.99:22
#echo "Impedindo o recebimento de arquivos via msn!"
echo "Cliente: CAIXA"
iptables -t nat -A PREROUTING -p tcp --sport 6891 -d 192.168.0.23 -j DROP
echo "Cliente: COMPRAS"
iptables -t nat -A PREROUTING -p tcp --sport 6891 -d 192.168.0.25 -j DROP
iptables -t nat -A PREROUTING -p tcp -d 192.168.1.2 --dport 21 -j ACCEPT
iptables -t nat -A PREROUTING -p tcp -d 192.168.1.2 --dport 22 -j DNAT --to 192.168.0.1:22
iptables -t nat -A PREROUTING -p tcp -d 192.168.1.2 --dport 22 -j DNAT --to 192.168.0.1:22
iptables -t nat -I POSTROUTING -s 192.168.0.0/24 -o eth0 -j MASQUERADE
iptables -t nat -A POSTROUTING -o tun0 -j MASQUERADE
---------------------------------FIREWALL-------------------------------------------------------
Todas as requisições de ftp caem no meu firewall.
Segue abaixo meu script de firewall:
--------------------------------- FIREWALL------------------------------------------------------
#!/bin/sh -x
iptables -t nat -F
iptables -t nat -X
iptables -t filter -F
iptables -t filter -X
iptables -F
iptables -X
iptables -t nat -A PREROUTING -p tcp -d 192.168.0.0/24 -j LOG
#----------
# Regras para funcionamento do Conectividade Social da CEF
#----------
iptables -t nat -A PREROUTING -p tcp -d 200.201.0.0/16 -j ACCEPT
iptables -A FORWARD -p tcp -d 200.201.0.0/16 -j ACCEPT
iptables -t nat -A PREROUTING -d 200.201.174.202 -p tcp -m tcp --dport 80 -j DNAT --to-destination 200.201.174.202:80
iptables -t nat -A PREROUTING -d 200.201.174.203 -p tcp -m tcp --dport 80 -j DNAT --to-destination 200.201.174.203:80
iptables -t nat -A PREROUTING -d 200.201.174.204 -p tcp -m tcp --dport 80 -j DNAT --to-destination 200.201.174.204:80
iptables -t nat -A PREROUTING -d 200.201.174.205 -p tcp -m tcp --dport 80 -j DNAT --to-destination 200.201.174.205:80
iptables -t nat -A PREROUTING -d 200.201.174.206 -p tcp -m tcp --dport 80 -j DNAT --to-destination 200.201.174.206:80
iptables -t nat -A PREROUTING -d 200.201.174.207 -p tcp -m tcp --dport 80 -j DNAT --to-destination 200.201.174.207:80
iptables -t nat -A PREROUTING -d 200.201.174.208 -p tcp -m tcp --dport 80 -j DNAT --to-destination 200.201.174.208:80
iptables -t nat -A PREROUTING -d 200.201.174.209 -p tcp -m tcp --dport 80 -j DNAT --to-destination 200.201.174.209:80
iptables -t nat -A PREROUTING -p tcp -s 192.168.0.0/24 --dport 80 -j REDIRECT --to-port 3128
iptables -t filter -P FORWARD ACCEPT
iptables -t filter -P INPUT ACCEPT
iptables -t filter -P OUTPUT ACCEPT
iptables -t filter -A OUTPUT -o eth0 -p tcp -m multiport --dport domain,http,https -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
iptables -t filter -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -t filter -A INPUT -p icmp -m icmp --icmp-type echo-request -j ACCEPT
#iptables -A FORWARD -p udp -s 192.168.0.0/24 --dport 53 -j ACCEPT
iptables -A FORWARD -p tcp --sport 22 -s 192.168.0.0/24 --dport 22 -j ACCEPT
iptables -A FORWARD -p tcp --sport 25 -j ACCEPT
iptables -I FORWARD -s 192.168.0.0/24 -p tcp --dport 21 -j ACCEPT
iptables -I FORWARD -d 192.168.0.0/24 -m state --state ESTABLISHED,RELATED -j ACCEPT
#iptables -A FORWARD -p tcp --dport 21 -j ACCEPT
iptables -t nat -A PREROUTING -p tcp -i eth0 --dport 110 -j REDIRECT --to 110
#iptables -t nat -A PREROUTING -p tcp -i eth0 --dport 21 -j DNAT --to-destination 192.168.0.5:21
#iptables -t nat -A PREROUTING -p udp -i eth0 --dport 21 -j DNAT --to-destination 192.168.0.5:21
#iptables -t nat -A PREROUTING -p tcp -d 201.24.152.2 -o eth0 --sport 21 -j REDIRECT --to 21
iptables -A FORWARD -p tcp --sport 110 -j ACCEPT
iptables -t nat -A PREROUTING -p tcp --sport 22 --dport 22 -j DNAT --to 64.233.161.99:22
#echo "Impedindo o recebimento de arquivos via msn!"
echo "Cliente: CAIXA"
iptables -t nat -A PREROUTING -p tcp --sport 6891 -d 192.168.0.23 -j DROP
echo "Cliente: COMPRAS"
iptables -t nat -A PREROUTING -p tcp --sport 6891 -d 192.168.0.25 -j DROP
iptables -t nat -A PREROUTING -p tcp -d 192.168.1.2 --dport 21 -j ACCEPT
iptables -t nat -A PREROUTING -p tcp -d 192.168.1.2 --dport 22 -j DNAT --to 192.168.0.1:22
iptables -t nat -A PREROUTING -p tcp -d 192.168.1.2 --dport 22 -j DNAT --to 192.168.0.1:22
iptables -t nat -I POSTROUTING -s 192.168.0.0/24 -o eth0 -j MASQUERADE
iptables -t nat -A POSTROUTING -o tun0 -j MASQUERADE
---------------------------------FIREWALL-------------------------------------------------------