lincolnbr
(usa Debian)
Enviado em 28/03/2014 - 18:37h
ricardoolonca escreveu:
Execute:
iptables -nL
iptables -t nat -nL
Poste o resultado aí.
Segue o resultado do primeiro comando:
iptables -nL
Chain INPUT (policy ACCEPT)
target prot opt source destination
monitorix_IN_8 tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:65535 dpt:143 ctstate NEW,RELATED,ESTABLISHED
monitorix_IN_7 udp -- 0.0.0.0/0 0.0.0.0/0 udp spts:1024:65535 dpt:53 ctstate NEW,RELATED,ESTABLISHED
monitorix_IN_6 tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:65535 dpt:3306 ctstate NEW,RELATED,ESTABLISHED
monitorix_IN_5 tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:65535 dpt:139 ctstate NEW,RELATED,ESTABLISHED
monitorix_IN_4 tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:65535 dpt:110 ctstate NEW,RELATED,ESTABLISHED
monitorix_IN_3 tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:65535 dpt:22 ctstate NEW,RELATED,ESTABLISHED
monitorix_IN_2 tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:65535 dpt:80 ctstate NEW,RELATED,ESTABLISHED
monitorix_IN_1 tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:65535 dpt:21 ctstate NEW,RELATED,ESTABLISHED
monitorix_IN_0 tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:65535 dpt:25 ctstate NEW,RELATED,ESTABLISHED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
Chain FORWARD (policy ACCEPT)
target prot opt source destination
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 limit: avg 1/sec burst 5
ACCEPT tcp -- 192.168.10.0/24 0.0.0.0/0 tcp dpts:5222:5223
DROP all -- 0.0.0.0/0 0.0.0.0/0 source IP range 192.168.10.10-192.168.10.254 STRING match "facebook" ALGO name kmp FROM 1 TO 65535
DROP all -- 0.0.0.0/0 0.0.0.0/0 source IP range 192.168.10.10-192.168.10.254 STRING match "youtube" ALGO name kmp FROM 1 TO 65535
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
monitorix_IN_8 tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spt:143 dpts:1024:65535 ctstate RELATED,ESTABLISHED
monitorix_IN_7 udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:53 dpts:1024:65535 ctstate RELATED,ESTABLISHED
monitorix_IN_6 tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spt:3306 dpts:1024:65535 ctstate RELATED,ESTABLISHED
monitorix_IN_5 tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spt:139 dpts:1024:65535 ctstate RELATED,ESTABLISHED
monitorix_IN_4 tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spt:110 dpts:1024:65535 ctstate RELATED,ESTABLISHED
monitorix_IN_3 tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spt:22 dpts:1024:65535 ctstate RELATED,ESTABLISHED
monitorix_IN_2 tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spt:80 dpts:1024:65535 ctstate RELATED,ESTABLISHED
monitorix_IN_1 tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spt:21 dpts:1024:65535 ctstate RELATED,ESTABLISHED
monitorix_IN_0 tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spt:25 dpts:1024:65535 ctstate RELATED,ESTABLISHED
Chain monitorix_IN_0 (2 references)
target prot opt source destination
Chain monitorix_IN_1 (2 references)
target prot opt source destination
Chain monitorix_IN_2 (2 references)
target prot opt source destination
Chain monitorix_IN_3 (2 references)
target prot opt source destination
Chain monitorix_IN_4 (2 references)
target prot opt source destination
Chain monitorix_IN_5 (2 references)
target prot opt source destination
Chain monitorix_IN_6 (2 references)
target prot opt source destination
Chain monitorix_IN_7 (2 references)
target prot opt source destination
Chain monitorix_IN_8 (2 references)
target prot opt source destination
SEGUE SEGUNDO COMANDO:
iptables -t nat -nL
Chain PREROUTING (policy ACCEPT)
target prot opt source destination
REDIRECT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 redir ports 3128
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain POSTROUTING (policy ACCEPT)
target prot opt source destination
MASQUERADE all -- 0.0.0.0/0 0.0.0.0/0