Enviado em 30/09/2013 - 14:42h
Boa tarde pessoal,$IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -d 200.216.216.47 -p tcp -j ACCEPT
$IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -d 200.216.216.47 -p tcp --dport 8773 -j ACCEPT
IPTABLES=/sbin/iptables IP6TABLES=/sbin/ip6tables MODPROBE=/sbin/modprobe IF_LOOPBACK="lo" IF_INT="eth1" IP_INT="10.1.1.250" IF_EXT="eth0" IP_EXT="XXX.XX.XX.XXX" #IF_DMZ="eth" #IP_DMZ="" NET_INT="10.1.1.0/24" ### flush existing rules and set chain policy setting to DROP echo "[+] Flushing iptables rules..." $IPTABLES -F $IPTABLES -F -t nat $IPTABLES -F -t mangle $IPTABLES -X $IPTABLES -X -t nat $IPTABLES -X -t mangle ### this policy does not handle IPv4 traffic except to drop it. # echo "[+] Disabling IPv4 traffic..." $IPTABLES -P INPUT DROP $IPTABLES -P OUTPUT DROP $IPTABLES -P FORWARD DROP ### this policy does not handle IPv6 traffic except to drop it. # echo "[+] Disabling IPv6 traffic..." $IP6TABLES -P INPUT DROP $IP6TABLES -P OUTPUT DROP $IP6TABLES -P FORWARD DROP ### load connection-tracking modules # echo "[+] Loading modules..." $MODPROBE ip_conntrack $MODPROBE iptable_nat $MODPROBE ip_conntrack_ftp $MODPROBE ip_nat_ftp $MODPROBE ip_tables $MODPROBE ipt_LOG $MODPROBE ipt_REJECT $MODPROBE ipt_MASQUERADE $MODPROBE ipt_state $MODPROBE ipt_multiport $MODPROBE iptable_mangle $MODPROBE ipt_limit $MODPROBE xt_limit $MODPROBE ipt_mark $MODPROBE ipt_MARK $MODPROBE ipt_string $MODPROBE ip_gre $MODPROBE ip_nat_pptp $MODPROBE tun ###### INPUT chain ###### ######################### # echo "[+] Setting up INPUT chain..." ### [++] state tracking rules $IPTABLES -A INPUT -m state --state INVALID -j DROP $IPTABLES -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT ### [++] ACCEPT rules ### [+++] ssh $IPTABLES -A INPUT -p tcp -i $IF_INT -s $NET_INT --dport 22 -j ACCEPT $IPTABLES -A INPUT -p tcp -i $IF_EXT --dport 22 -j ACCEPT $IPTABLES -A INPUT -p tcp -i $IF_EXT -s XXX.XX.XX.XXX/27 --dport 22 -j ACCEPT $IPTABLES -A INPUT -p tcp -i $IF_EXT -s XXX.XX.XX.XXX --dport 22 -j ACCEPT $IPTABLES -A INPUT -p tcp -i $IF_EXT -s XXX.XX.XX.XXX --dport 22 -j ACCEPT $IPTABLES -A INPUT -p tcp -i $IF_EXT -s XXX.XX.XX.XXX --dport 22 -j ACCEPT $IPTABLES -A INPUT -p tcp -i $IF_EXT -s XXX.XX.XX.XXX --dport 22 -j ACCEPT ### [+++] pptp $IPTABLES -A INPUT -i $IF_EXT -p tcp --dport 1723 -j ACCEPT $IPTABLES -A INPUT -i $IF_EXT -p 47 -j ACCEPT ### [+++] dns $IPTABLES -A INPUT -i $IF_INT -s $NET_INT -p udp --dport 53 -j ACCEPT ### [++] squid proxy $IPTABLES -A INPUT -i $IF_INT -p tcp --dport 3128 -s $NET_INT -j ACCEPT ### [++] icmp $IPTABLES -A INPUT -i $IF_INT -p icmp -s $NET_INT -j ACCEPT ### [++] anti-spoofing rules $IPTABLES -A INPUT -s 10.0.0.0/8 -i $IF_EXT -j DROP $IPTABLES -A INPUT -s 127.0.0.0/8 -i $IF_EXT -j DROP $IPTABLES -A INPUT -s 172.16.0.0/12 -i $IF_EXT -j DROP $IPTABLES -A INPUT -s 192.168.1.0/16 -i $IF_EXT -j DROP ### [++] state tracking rules $IPTABLES -A OUTPUT -m state --state INVALID -j DROP $IPTABLES -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT ### [++] ACCEPT rules for allowing connections out ### [+++] pptp $IPTABLES -A OUTPUT -o $IF_EXT -p tcp --dport 1723 -j ACCEPT $IPTABLES -A OUTPUT -o $IF_EXT -p 47 -j ACCEPT $IPTABLES -A OUTPUT -o $IF_EXT -p udp --dport 53 -j ACCEPT $IPTABLES -A OUTPUT -o $IF_EXT -p tcp --dport 80 -j ACCEPT $IPTABLES -A OUTPUT -o $IF_EXT -p tcp --dport 21 -j ACCEPT $IPTABLES -A OUTPUT -o $IF_EXT -p tcp --dport 20 -j ACCEPT $IPTABLES -A OUTPUT -o $IF_EXT -p udp --dport 20 -j ACCEPT $IPTABLES -A OUTPUT -o $IF_EXT -j ACCEPT ### [++] state tracking rules $IPTABLES -A FORWARD -m state --state INVALID -j DROP $IPTABLES -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
################################################################################## # acesso USUARIOS internet pela rede interna #$IPTABLES -A FORWARD -i $IF_INT -s $NET_INT -o $IF_EXT -j ACCEPT $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -j LOG # acesso cesan.com.br $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -d 200.216.216.18 -p tcp -j ACCEPT $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -d 200.216.216.47 -p tcp -j ACCEPT $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -d 200.216.216.45 -p tcp -j ACCEPT $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -d 200.216.216.43 -p tcp -j ACCEPT $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -d 201.77.202.37 -p tcp -j ACCEPT #acesso www.dataprev.gov.br $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -d 200.152.32.178 -p tcp -j ACCEPT $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -d 200.152.40.93 -p tcp -j ACCEPT # acesso www.previdencia.gov.br $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -d 200.152.40.50 -p tcp -j ACCEPT $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -d 200.152.32.144 -p tcp -j ACCEPT $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -d 200.216.216.47 -p tcp -j ACCEPT #sindec $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -d 201.62.35.202 -p tcp --dport 444 -j ACCEPT ############################################################################################
# $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -m mac --mac-source XX:XX:XX:XX:XX:XX -j ACCEPT # $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -m mac --mac-source XX:XX:XX:XX:XX:XX -j ACCEPT # $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -m mac --mac-source XX:XX:XX:XX:XX:XX -j ACCEPT # $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -m mac --mac-source XX:XX:XX:XX:XX:XX -j ACCEPT # $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -m mac --mac-source XX:XX:XX:XX:XX:XX -j ACCEPT # $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -m mac --mac-source XX:XX:XX:XX:XX:XX -j ACCEPT # $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -m mac --mac-source XX:XX:XX:XX:XX:XX -j ACCEPT # $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -m mac --mac-source XX:XX:XX:XX:XX:XX -j ACCEPT # $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -m mac --mac-source XX:XX:XX:XX:XX:XX -j ACCEPT # acesso APs internet $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -m mac --mac-source XX:XX:XX:XX:XX:XX -j ACCEPT $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -m mac --mac-source XX:XX:XX:XX:XX:XX -j ACCEPT $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -m mac --mac-source XX:XX:XX:XX:XX:XX-j ACCEPT # $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -m mac --mac-source XX:XX:XX:XX:XX:XX -j ACCEPT # $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -m mac --mac-source XX:XX:XX:XX:XX:XX -j ACCEPT # $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -m mac --mac-source XX:XX:XX:XX:XX:XX -j ACCEPT # $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -m mac --mac-source XX:XX:XX:XX:XX:XX -j ACCEPT $IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -p udp --dport 53 -j ACCEPT ### [++] MASQUERADE $IPTABLES -t nat -A POSTROUTING -s $NET_INT -o $IF_EXT -j MASQUERADE $IPTABLES -t nat -A POSTROUTING -o $IF_EXT -j MASQUERADE exit
Enviado em 30/09/2013 - 15:20h
Enviado em 30/09/2013 - 15:30h
Com a porta ou sem, não consigo acessar!Enviado em 30/09/2013 - 16:47h
Funcionar da seguinte forma.#Paginas em portugues de erro error_directory /usr/share/squid/errors/pt-br #Configuração de entrada acl manager proto cache_object acl localhost src 127.0.0.1/32 acl rede-local src 10.1.1.0/24 #Portas permitidas acl Portas_permitidas port 443 80 21 22 70 210 280 488 591 777 5938 acl CONNECT method CONNECTi # Regras pessonalizadas acl macs_liberados arp "/etc/squid/macs-liberados" http_access allow manager localhost http_access deny manager #Bloqueando todas as outras portas http_access deny !Portas_permitidas http_access deny CONNECT !Portas_permitidas #Finalizações http_access deny !macs_liberados http_access allow rede-local http_access allow localhost http_access deny all #Porta proxy #http_port 3128 transparent http_port 3128 visible_hostname XXXXXXX.com.br # Uncomment and adjust the following to add a disk cache directory. #cache_dir ufs /var/spool/squid 100 16 256 # Leave coredumps in the first cache dir coredump_dir /var/spool/squid # Add any of your own refresh_pattern entries above these. refresh_pattern ^ftp: 1440 20% 10080 refresh_pattern ^gopher: 1440 0% 1440 refresh_pattern -i (/cgi-bin/|\?) 0 0% 0 refresh_pattern . 0 20% 4320 ~ ~
Enviado em 30/09/2013 - 17:20h
perfeito.$IPTABLES -A FORWARD -i $IF_INT -o $IF_EXT -d 200.216.216.47 -p tcp -j ACCEPT
$IPTABLES -A INPUT -p tcp -i $IF_EXT -s 10.1.1.75 --dport 8443 -j ACCEPT
Como aprovar Pull Requests em seu repositório Github via linha de comando
Como gerar um podcast a partir de um livro em PDF
Automatizando digitação de códigos 2FA no browser
Resolver problemas de Internet
Como compartilhar a tela do Ubuntu com uma Smart TV (LG, Samsung, etc.)
Organizando seus PDF com o Zotero
Erro no realm join [Resolvido]
Um programa para baixar vídeos: Parabolic
Como Definir o Painel Principal em Múltiplos Monitores no Linux Mint
trocar linhas [RESOLVIDO] (11)
tentando instalar em um notebook antigo o Linux LegacyOS_2023... (7)
BlueMail não abre no Kubuntu 25.04 (1)
Driver de rede realtek 8821ce bugado (8)
Atalhos duplicados (sobras de instalações anteriores) [RESOLVIDO] (5)