PedroSP
(usa Conectiva)
Enviado em 31/07/2007 - 16:51h
Sobre as regras normais, são as regrasq já estavam configuradas antes deu assumir aqui o CPD da empresa.
Não sei se é aqui q eu vejo as regras ativas, mas fiz o seguite.
=> Entrei no WEBADMIn do Coyote e fui na Opção "Ferramentas de Diagnóstico"..
=> Ai fui nas opções:
- Regras Ativas do Firewall
- Regras Ativas do Firewall - nat
- Regras Ativas do Firewall - mangle
Abixo listo o que está escrito em cada uma delas:
########## Regras Ativas do Firewall
Chain INPUT (policy ACCEPT)
target prot opt source destination
remote-admin all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
DROP all -- 0.0.0.0/0 0.0.0.0/0 state INVALID
DROP all -- 0.0.0.0/0 0.0.0.0/0 state NEW
Chain FORWARD (policy ACCEPT)
target prot opt source destination
access-acl all -- 0.0.0.0/0 0.0.0.0/0
autofw-acl all -- 0.0.0.0/0 0.0.0.0/0
portfw-acl all -- 0.0.0.0/0 0.0.0.0/0
user-filter all -- 0.0.0.0/0 0.0.0.0/0
port-filter all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
DROP all -- 0.0.0.0/0 0.0.0.0/0 state INVALID
DROP all -- 0.0.0.0/0 0.0.0.0/0 state NEW
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain access-acl (1 references)
target prot opt source destination
Chain autofw-acl (1 references)
target prot opt source destination
Chain port-filter (1 references)
target prot opt source destination
Chain portfw-acl (1 references)
target prot opt source destination
Chain remote-admin (1 references)
target prot opt source destination
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:65535 dpt:22
Chain user-filter (1 references)
target prot opt source destination
######### Regras Ativas do Firewall - nat
Chain PREROUTING (policy ACCEPT)
target prot opt source destination
nat-acl all -- 0.0.0.0/0 0.0.0.0/0
dns-preroute all -- 0.0.0.0/0 0.0.0.0/0
auto-forward all -- 0.0.0.0/0 0.0.0.0/0
port-forward all -- 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT)
target prot opt source destination
MASQUERADE all -- 192.171.1.0/24 0.0.0.0/0
dns-postroute all -- 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain auto-forward (1 references)
target prot opt source destination
Chain dns-postroute (1 references)
target prot opt source destination
Chain dns-preroute (1 references)
target prot opt source destination
Chain nat-acl (1 references)
target prot opt source destination
Chain port-forward (1 references)
target prot opt source destination
########## - Regras Ativas do Firewall - mangle
Chain PREROUTING (policy ACCEPT)
target prot opt source destination
MARK all -- 192.171.1.0/24 0.0.0.0/0 MARK set 0xff
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain POSTROUTING (policy ACCEPT)
target prot opt source destination
Vou testaressasua nova dica e retorno para falar o resultado.
Caso precisem de alguma informação extra, me pergunte.
Até mais.