fernandoguialves
(usa CentOS)
Enviado em 21/08/2015 - 13:39h
Preciso liberar alguns URLS, fazer com que elas não passem pelo squid no servidor de proxy
São as seguintes urls:
raw.githubusercontent.com porta 443
slack-ssb-updates.global.ssl.fastly.net porta 443
slack.com porta 443
Tenho tentado usar a regra a baixo porem não obtive sucesso, alguem sabe como fazer esse tipo de liberação?
#URLS SLACK
-I FORWARD -p tcp -s 10.0.0.0/24 -d raw.githubusercontent.com --dport 443 -j ACCEPT
-I FORWARD -p tcp -s 10.0.0.0/24 -d slack-ssb-updates.global.ssl.fastly.net --dport 443 -j ACCEPT
-I FORWARD -p tcp -s 10.0.0.0/24 -d slack.com --dport 443 -j ACCEPT
#Generated by iptables-save v1.4.2 on Fri Feb 13 11:33:53 2015
*filter
:INPUT ACCEPT [130971221:91500332887]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [135863286:94256771930]
:Bloqueia - [0:0]
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
#URLS SLACK
-I FORWARD -p tcp -s 10.0.0.0/24 -d raw.githubusercontent.com --dport 443 -j ACCEPT
-I FORWARD -p tcp -s 10.0.0.0/24 -d slack-ssb-updates.global.ssl.fastly.net --dport 443 -j ACCEPT
-I FORWARD -p tcp -s 10.0.0.0/24 -d slack.com --dport 443 -j ACCEPT
#----------SERVIDORES---------------
#WEB
-A FORWARD -s 10.10.1.80/32 -j ACCEPT
-A FORWARD -d 10.10.1.80/32 -j ACCEPT
-A FORWARD -s 10.10.1.79/32 -j ACCEPT
-A FORWARD -d 10.10.1.79/32 -j ACCEPT
#SACI
-A FORWARD -s 10.10.1.161/32 -j ACCEPT
-A FORWARD -d 10.10.1.161/32 -j ACCEPT
-A FORWARD -s 10.10.1.79/32 -j ACCEPT
-A FORWARD -d 10.10.1.79/32 -j ACCEPT
#MYSQLDB
-A FORWARD -s 10.10.1.160/32 -j ACCEPT
-A FORWARD -d 10.10.1.160/32 -j ACCEPT
-A FORWARD -s 10.10.1.170/32 -j ACCEPT
-A FORWARD -d 10.10.1.170/32 -j ACCEPT
-A FORWARD -s 10.10.1.81/32 -j ACCEPT
-A FORWARD -d 10.10.1.81/32 -j ACCEPT
#AD/DNS
-A FORWARD -s 10.10.1.3/32 -j ACCEPT
-A FORWARD -d 10.10.1.3/32 -j ACCEPT
-A FORWARD -s 10.10.1.2/32 -j ACCEPT
-A FORWARD -d 10.10.1.2/32 -j ACCEPT
#SRVNFE/NFSE
-A FORWARD -s 10.10.1.100/32 -j ACCEPT
-A FORWARD -d 10.10.1.100/32 -j ACCEPT
-A FORWARD -s 10.10.1.199/32 -j ACCEPT
-A FORWARD -d 10.10.1.199/32 -j ACCEPT
#CONTAB
-A FORWARD -s 10.10.1.13/32 -j ACCEPT
-A FORWARD -d 10.10.1.13/32 -j ACCEPT
#RM
-A FORWARD -s 10.10.1.90/32 -j ACCEPT
-A FORWARD -d 10.10.1.90/32 -j ACCEPT
#TI
-A FORWARD -s 10.10.1.9/32 -j ACCEPT
-A FORWARD -d 10.10.1.9/32 -j ACCEPT
-A FORWARD -s 10.10.1.7/32 -j ACCEPT
-A FORWARD -d 10.10.1.7/32 -j ACCEPT
-A FORWARD -s 10.10.1.106/32 -j ACCEPT
-A FORWARD -d 10.10.1.106/32 -j ACCEPT
-A FORWARD -s 10.10.1.163/32 -j ACCEPT
-A FORWARD -d 10.10.1.163/32 -j ACCEPT
#YODA
-A FORWARD -s 10.10.1.52/32 -j ACCEPT
-A FORWARD -d 10.10.1.52/32 -j ACCEPT
#SRVBACKUP
-A FORWARD -s 10.10.1.31/32 -j ACCEPT
-A FORWARD -d 10.10.1.31/32 -j ACCEPT
#---------------------------------
-A FORWARD -d 67.228.2.213/32 -j ACCEPT
-A FORWARD -d 67.228.2.210/32 -j ACCEPT
-A FORWARD -d 67.228.2.211/32 -j ACCEPT
-A FORWARD -d 67.228.2.212/32 -j ACCEPT
-A FORWARD -d 75.126.195.10/32 -j ACCEPT
-A FORWARD -d 75.126.195.12/32 -j ACCEPT
-A FORWARD -d 75.126.195.13/32 -j ACCEPT
-A FORWARD -d 75.126.195.11/32 -j ACCEPT
-A FORWARD -s 67.228.2.213/32 -j ACCEPT
-A FORWARD -s 67.228.2.210/32 -j ACCEPT
-A FORWARD -s 67.228.2.211/32 -j ACCEPT
-A FORWARD -s 67.228.2.212/32 -j ACCEPT
-A FORWARD -s 75.126.195.10/32 -j ACCEPT
-A FORWARD -s 75.126.195.13/32 -j ACCEPT
-A FORWARD -s 75.126.195.12/32 -j ACCEPT
-A FORWARD -s 75.126.195.11/32 -j ACCEPT
-A FORWARD -s 23.235.46.249/32 -j ACCEPT
-A FORWARD -d 23.235.46.249/32 -j ACCEPT
-A FORWARD -s 199.27.76.249/32 -j ACCEPT
-A FORWARD -d 199.27.76.249/32 -j ACCEPT
-A FORWARD -s 54.175.60.206/32 -j ACCEPT
-A FORWARD -d 54.175.60.206/32 -j ACCEPT
#-A FORWARD -d 10.0.0.0/8 -j ACCEPT
#-A FORWARD -s 10.0.0.0/8 -j ACCEPT
-A FORWARD -p tcp -m tcp --dport 80 -j Bloqueia
-A Bloqueia -j LOG --log-prefix "BlockFW -> " --log-level 6
-A Bloqueia -j DROP
COMMIT
# Completed on Fri Feb 13 11:33:53 2015
# Generated by iptables-save v1.4.2 on Fri Feb 13 11:33:53 2015
*nat
:PREROUTING ACCEPT [13755565:1253402515]
:POSTROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [7115662:521197344]
-A PREROUTING -p tcp -m tcp --dport 5222 -j DNAT --to-destination 10.10.1.3:5222
-A PREROUTING -p tcp -m tcp --dport 5223 -j DNAT --to-destination 10.10.1.3:5223
-A PREROUTING -p tcp -m tcp --dport 7777 -j DNAT --to-destination 10.10.1.3:7777
-A PREROUTING -p tcp -m tcp --dport 7070 -j DNAT --to-destination 10.10.1.3:7070
-A PREROUTING -p tcp -m tcp --dport 3389 -j DNAT --to-destination 10.10.1.2:3389
-A PREROUTING -p tcp -m tcp --dport 2020 -j DNAT --to-destination 10.10.1.161:22
-A PREROUTING -p tcp -m tcp --dport 2026 -j DNAT --to-destination 10.10.1.111:22
-A PREROUTING -p tcp -m tcp --dport 2021 -j DNAT --to-destination 10.10.1.160:22
-A PREROUTING -p tcp -m tcp --dport 2022 -j DNAT --to-destination 10.10.1.170:22
-A PREROUTING -p tcp -m tcp --dport 2023 -j DNAT --to-destination 10.10.1.72:22
-A PREROUTING -d 172.16.10.56/32 -p tcp -m tcp --dport 8082 -j DNAT --to-destination 10.10.1.79:80
-A PREROUTING -d 172.16.10.56/32 -p tcp -m tcp --dport 8081 -j DNAT --to-destination 10.10.1.161:80
-A PREROUTING -d 172.16.10.56/32 -p tcp -m tcp --dport 8001 -j DNAT --to-destination 10.10.1.70:8001
-A PREROUTING -d 172.16.10.56/32 -p tcp -m tcp --dport 37777 -j DNAT --to-destination 10.10.1.70:37777
-A PREROUTING -d 172.16.10.56/32 -p tcp -m tcp --dport 8080 -j DNAT --to-destination 10.10.1.80:80
-A PREROUTING -d 172.16.10.56/32 -p tcp -m tcp --dport 8069 -j DNAT --to-destination 10.10.1.186:8069
-A PREROUTING -d 172.16.10.56/32 -p tcp -m tcp --dport 80 -j DNAT --to-destination 10.10.1.199:80
-A PREROUTING -d 172.16.10.56/32 -p tcp -m tcp --dport 3390 -j DNAT --to-destination 10.10.1.199:3389
-A PREROUTING -d 172.16.10.56/32 -p tcp -m tcp --dport 443 -j DNAT --to-destination 10.10.1.199:443
-A PREROUTING -d 172.16.10.56/32 -p tcp -m tcp --dport 3391 -j DNAT --to-destination 10.10.1.117:3389
-A PREROUTING -d 172.16.10.56/32 -p tcp -m tcp --dport 3392 -j DNAT --to-destination 10.10.1.100:3389
-A POSTROUTING -s 10.0.0.0/8 -d 10.0.0.0/8 -j ACCEPT
-A POSTROUTING -j MASQUERADE
COMMIT
# Completed on Fri Feb 13 11:33:53 2015