Enviado em 08/03/2018 - 17:11h
Boa Tarde !
Preciso desviar do proxy squid alguns dispositivos internos por ip para acesso externo.
Já tentei várias dicas mas nada funciona.
Vou passar meu iptables.
No caso, estou tentando desviar o ip 192.168.1.60
Estou tentando esse desvio para testar o funcionamento do Whatsapp sem problemas.
*mangle
:PREROUTING ACCEPT [409:157554]
:INPUT ACCEPT [147:14022]
:FORWARD ACCEPT [259:142791]
:OUTPUT ACCEPT [109:17358]
:POSTROUTING ACCEPT [368:160149]
COMMIT
*nat
:PREROUTING ACCEPT [9:1680]
:POSTROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [1:70]
### regras para lista de IPs para desviar do proxy
-N PROXY
-A PREROUTING -i eth0 -p tcp --dport 80 -j PROXY
# lista de externos
-A PROXY -d 200.201.174.0 -j RETURN
-A PROXY -d 200.252.60.42 -j RETURN
-A PROXY -d 200.252.60.83 -j RETURN
-A PROXY -d 104.236.14.6 -j RETURN
-A PROXY -d viacep.com.br -j RETURN
-A PROXY -d sii.inovadorasistemas.com.br -j RETURN
-A PROXY -d sii.inovadora.com.br -j RETURN
# lista de internos
-A PROXY -s 192.168.1.60 -j RETURN
#
-A PROXY -p tcp --dport 80 -j REDIRECT --to 3128
### fim das regras para lista de IPs para desviar do proxy
-A PREROUTING -p tcp --dport 5432 -i eth1 -j DNAT --to 192.168.1.2:5432
-A PREROUTING -p udp --dport 5432 -i eth1 -j DNAT --to 192.168.1.2:5432
-A PREROUTING -p tcp --dport 3000 -i eth1 -j DNAT --to 192.168.0.254:3000
-A PREROUTING -p tcp --dport 3001 -i eth1 -j DNAT --to 192.168.0.254:3001
-A PREROUTING -p tcp --dport 3002 -i eth1 -j DNAT --to 192.168.0.254:3002
-A PREROUTING -p tcp --dport 3003 -i eth1 -j DNAT --to 192.168.0.254:3003
-A PREROUTING -p tcp --dport 3004 -i eth1 -j DNAT --to 192.168.0.254:3004
-A PREROUTING -p tcp --dport 3005 -i eth1 -j DNAT --to 192.168.0.254:3005
-A PREROUTING -p tcp --dport 3006 -i eth1 -j DNAT --to 192.168.0.254:3006
-A PREROUTING -p tcp --dport 3007 -i eth1 -j DNAT --to 192.168.0.254:3007
-A PREROUTING -p tcp --dport 3008 -i eth1 -j DNAT --to 192.168.0.254:3008
-A PREROUTING -p tcp --dport 3009 -i eth1 -j DNAT --to 192.168.0.254:3009
-A PREROUTING -p tcp --dport 3010 -i eth1 -j DNAT --to 192.168.0.254:3010
-A PREROUTING -p tcp --dport 5902 -j DNAT --to 192.168.1.2:5902
-A PREROUTING -p tcp --dport 5903 -j DNAT --to 192.168.1.2:5903
-A PREROUTING -p tcp --dport 5904 -j DNAT --to 192.168.1.2:5904
-A PREROUTING -p tcp --dport 5905 -j DNAT --to 192.168.0.1:5800
-A PREROUTING -p udp --dport 5901 -j DNAT --to 192.168.0.1:5900
-A PREROUTING -p tcp --dport 9090 -j DNAT --to 192.168.1.3:80
-A PREROUTING -p tcp --dport 4550 -j DNAT --to 192.168.1.3:4550
-A POSTROUTING -p tcp -s 192.168.1.3 --dport 4550 -j MASQUERADE
-A PREROUTING -p tcp --dport 5550 -j DNAT --to 192.168.1.3:5550
-A POSTROUTING -p tcp -s 192.168.1.3 --dport 5550 -j MASQUERADE
-A PREROUTING -p tcp --dport 6550 -j DNAT --to 192.168.1.3:6550
-A POSTROUTING -p tcp -s 192.168.1.3 --dport 6550 -j MASQUERADE
-A PREROUTING -p tcp --dport 8866 -j DNAT --to 192.168.1.3:8866
-A POSTROUTING -p tcp -s 192.168.1.3 --dport 8866 -j MASQUERADE
-A PREROUTING -p tcp --dport 9091 -j DNAT --to 192.168.1.4:80
-A PREROUTING -p tcp --dport 4551 -j DNAT --to 192.168.1.4:4550
-A POSTROUTING -p tcp -s 192.168.1.4 --dport 4551 -j MASQUERADE
-A PREROUTING -p tcp --dport 5551 -j DNAT --to 192.168.1.4:5550
-A POSTROUTING -p tcp -s 192.168.1.4 --dport 5551 -j MASQUERADE
-A PREROUTING -p tcp --dport 6551 -j DNAT --to 192.168.1.4:6550
-A POSTROUTING -p tcp -s 192.168.1.4 --dport 6551 -j MASQUERADE
-A PREROUTING -p tcp --dport 5552 -j DNAT --to 192.168.1.4:5552
-A POSTROUTING -p tcp -s 192.168.1.4 --dport 5552 -j MASQUERADE
-A PREROUTING -p tcp --dport 8867 -j DNAT --to 192.168.1.4:8867
-A POSTROUTING -p tcp -s 192.168.1.4 --dport 8867 -j MASQUERADE
-A PREROUTING -p tcp --dport 15500 -j DNAT --to 192.168.1.99:15500
-A POSTROUTING -p tcp -s 192.168.1.99 --dport 15500 -j MASQUERADE
-A PREROUTING -p udp --dport 4186 -j DNAT --to 192.168.1.99:4186
-A POSTROUTING -p udp -s 192.168.1.99 --dport 4186 -j MASQUERADE
-A POSTROUTING -o eth1 -j MASQUERADE
COMMIT
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT DROP [0:0]
:allowed - [0:0]
:bad_tcp_packets - [0:0]
:icmp_packets - [0:0]
:tcp_packets - [0:0]
:udp_packets - [0:0]
-A FORWARD -i eth0 -s 192.168.1.60 -j ACCEPT
-A FORWARD -d 192.168.1.3 -p tcp --dport 80 -j ACCEPT
-A FORWARD -s 192.168.1.3 -p tcp --sport 80 -j ACCEPT
-A FORWARD -d 192.168.1.3 -p tcp --dport 4550 -j ACCEPT
-A FORWARD -s 192.168.1.3 -p tcp --sport 4550 -j ACCEPT
-A FORWARD -d 192.168.1.3 -p tcp --dport 5550 -j ACCEPT
-A FORWARD -s 192.168.1.3 -p tcp --sport 5550 -j ACCEPT
-A FORWARD -d 192.168.1.3 -p tcp --dport 6550 -j ACCEPT
-A FORWARD -s 192.168.1.3 -p tcp --sport 6550 -j ACCEPT
-A FORWARD -d 192.168.1.3 -p tcp --dport 8866 -j ACCEPT
-A FORWARD -s 192.168.1.3 -p tcp --sport 8866 -j ACCEPT
-A FORWARD -d 192.168.1.4 -p tcp --dport 80 -j ACCEPT
-A FORWARD -s 192.168.1.4 -p tcp --sport 80 -j ACCEPT
-A FORWARD -d 192.168.1.4 -p tcp --dport 4550 -j ACCEPT
-A FORWARD -s 192.168.1.4 -p tcp --sport 4550 -j ACCEPT
-A FORWARD -d 192.168.1.4 -p tcp --dport 5550 -j ACCEPT
-A FORWARD -s 192.168.1.4 -p tcp --sport 5550 -j ACCEPT
-A FORWARD -d 192.168.1.4 -p tcp --dport 6550 -j ACCEPT
-A FORWARD -s 192.168.1.4 -p tcp --sport 6550 -j ACCEPT
-A FORWARD -d 192.168.1.4 -p tcp --dport 8867 -j ACCEPT
-A FORWARD -s 192.168.1.4 -p tcp --sport 8867 -j ACCEPT
-A FORWARD -d 192.168.1.99 -p tcp --dport 15500 -j ACCEPT
-A FORWARD -s 192.168.1.99 -p tcp --sport 15500 -j ACCEPT
-A FORWARD -d 192.168.1.99 -p udp --dport 4186 -j ACCEPT
-A FORWARD -s 192.168.1.99 -p udp --sport 4186 -j ACCEPT
-A FORWARD -p tcp --dport 5902 -j ACCEPT
-A FORWARD -p tcp --dport 5903 -j ACCEPT
-A FORWARD -p tcp --dport 5904 -j ACCEPT
-A FORWARD -p tcp --dport 5905 -j ACCEPT
-A INPUT -p tcp --dport 5432 -j ACCEPT
-A INPUT -p udp --dport 5432 -j ACCEPT
-A INPUT -p tcp --sport 5432 -j ACCEPT
-A INPUT -p udp --sport 5432 -j ACCEPT
-A FORWARD -p tcp --dport 5432 -j ACCEPT
-A FORWARD -p tcp --sport 5432 -j ACCEPT
-A FORWARD -p udp --dport 5432 -j ACCEPT
-A FORWARD -p udp --sport 5432 -j ACCEPT
-A OUTPUT -p tcp --dport 5432 -j ACCEPT
-A OUTPUT -p udp --dport 5432 -j ACCEPT
-A OUTPUT -p tcp --sport 5432 -j ACCEPT
-A OUTPUT -p udp --sport 5432 -j ACCEPT
-A FORWARD -p tcp --dport 3000 -j ACCEPT
-A FORWARD -p tcp --sport 3000 -j ACCEPT
-A FORWARD -p tcp --dport 3001 -j ACCEPT
-A FORWARD -p tcp --sport 3001 -j ACCEPT
-A FORWARD -p tcp --dport 3002 -j ACCEPT
-A FORWARD -p tcp --sport 3002 -j ACCEPT
-A FORWARD -p tcp --dport 3003 -j ACCEPT
-A FORWARD -p tcp --sport 3003 -j ACCEPT
-A FORWARD -p tcp --dport 3004 -j ACCEPT
-A FORWARD -p tcp --sport 3004 -j ACCEPT
-A FORWARD -p tcp --dport 3005 -j ACCEPT
-A FORWARD -p tcp --sport 3005 -j ACCEPT
-A FORWARD -p tcp --dport 3006 -j ACCEPT
-A FORWARD -p tcp --sport 3006 -j ACCEPT
-A FORWARD -p tcp --dport 3007 -j ACCEPT
-A FORWARD -p tcp --sport 3007 -j ACCEPT
-A FORWARD -p tcp --dport 3008 -j ACCEPT
-A FORWARD -p tcp --sport 3008 -j ACCEPT
-A FORWARD -p tcp --dport 3009 -j ACCEPT
-A FORWARD -p tcp --sport 3009 -j ACCEPT
-A FORWARD -p tcp --dport 3010 -j ACCEPT
-A FORWARD -p tcp --sport 3010 -j ACCEPT
-A INPUT -p tcp --dport 3000 -j ACCEPT
-A INPUT -p tcp --sport 3000 -j ACCEPT
-A INPUT -p tcp --dport 3001 -j ACCEPT
-A INPUT -p tcp --sport 3001 -j ACCEPT
-A INPUT -p tcp --dport 3002 -j ACCEPT
-A INPUT -p tcp --sport 3002 -j ACCEPT
-A INPUT -p tcp --dport 3003 -j ACCEPT
-A INPUT -p tcp --sport 3003 -j ACCEPT
-A INPUT -p tcp --dport 3004 -j ACCEPT
-A INPUT -p tcp --sport 3004 -j ACCEPT
-A INPUT -p tcp --dport 3005 -j ACCEPT
-A INPUT -p tcp --sport 3005 -j ACCEPT
-A INPUT -p tcp --dport 3006 -j ACCEPT
-A INPUT -p tcp --sport 3006 -j ACCEPT
-A INPUT -p tcp --dport 3007 -j ACCEPT
-A INPUT -p tcp --sport 3007 -j ACCEPT
-A INPUT -p tcp --dport 3008 -j ACCEPT
-A INPUT -p tcp --sport 3008 -j ACCEPT
-A INPUT -p tcp --dport 3009 -j ACCEPT
-A INPUT -p tcp --sport 3009 -j ACCEPT
-A INPUT -p tcp --dport 3010 -j ACCEPT
-A INPUT -p tcp --sport 3010 -j ACCEPT
-A INPUT -p tcp -j bad_tcp_packets
-A INPUT -s 192.168.1.0/255.255.255.0 -i eth0 -j ACCEPT
# linha squid
-A INPUT -s 192.168.0.0/255.255.255.0 -i eth0 -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --sport 68 --dport 67 -j ACCEPT
-A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i eth1 -p tcp -j tcp_packets
-A INPUT -i eth1 -p udp -j udp_packets
-A INPUT -i eth1 -p icmp -j icmp_packets
-A INPUT -m limit --limit 3/min --limit-burst 3 -j LOG --log-prefix "IPT INPUT packet died: " --log-level 7
-A FORWARD -p tcp -j bad_tcp_packets
-A FORWARD -i eth0 -j ACCEPT
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -m limit --limit 3/min --limit-burst 3 -j LOG --log-prefix "IPT FORWARD packet died: " --log-level 7
-A OUTPUT -p tcp -j bad_tcp_packets
-A OUTPUT -s 127.0.0.1 -j ACCEPT
-A OUTPUT -s 192.168.1.1 -j ACCEPT
# linha squid
-A OUTPUT -s 192.168.0.1 -j ACCEPT
-A OUTPUT -o eth1 -j ACCEPT
-A OUTPUT -m limit --limit 3/min --limit-burst 3 -j LOG --log-prefix "IPT OUTPUT packet died: " --log-level 7
-A allowed -p tcp -m tcp --tcp-flags SYN,RST,ACK SYN -j ACCEPT
-A allowed -p tcp -m state --state RELATED,ESTABLISHED -j ACCEPT
-A allowed -p tcp -j DROP
-A bad_tcp_packets -p tcp -m tcp --tcp-flags SYN,ACK SYN,ACK -m state --state NEW -j REJECT --reject-with tcp-reset
-A bad_tcp_packets -p tcp -m tcp ! --tcp-flags SYN,RST,ACK SYN -m state --state NEW -j LOG --log-prefix "New not syn:"
-A bad_tcp_packets -p tcp -m tcp ! --tcp-flags SYN,RST,ACK SYN -m state --state NEW -j DROP
-A icmp_packets -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A icmp_packets -p icmp -m icmp --icmp-type 11 -j ACCEPT
-A tcp_packets -p tcp -m tcp --dport 21 -j allowed
-A tcp_packets -p tcp -m tcp --dport 22 -j allowed
-A tcp_packets -p tcp -m tcp --dport 80 -j allowed
-A udp_packets -p udp -m udp --sport 53 -j ACCEPT
-A udp_packets -p udp -m udp --sport 67 -j ACCEPT
-A udp_packets -p udp -m udp --sport 2074 -j ACCEPT
-A udp_packets -p udp -m udp --sport 4000 -j ACCEPT
COMMIT
Centos 5.11
Squid 2.6
Preciso desviar do proxy squid alguns dispositivos internos por ip para acesso externo.
Já tentei várias dicas mas nada funciona.
Vou passar meu iptables.
No caso, estou tentando desviar o ip 192.168.1.60
Estou tentando esse desvio para testar o funcionamento do Whatsapp sem problemas.
*mangle
:PREROUTING ACCEPT [409:157554]
:INPUT ACCEPT [147:14022]
:FORWARD ACCEPT [259:142791]
:OUTPUT ACCEPT [109:17358]
:POSTROUTING ACCEPT [368:160149]
COMMIT
*nat
:PREROUTING ACCEPT [9:1680]
:POSTROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [1:70]
### regras para lista de IPs para desviar do proxy
-N PROXY
-A PREROUTING -i eth0 -p tcp --dport 80 -j PROXY
# lista de externos
-A PROXY -d 200.201.174.0 -j RETURN
-A PROXY -d 200.252.60.42 -j RETURN
-A PROXY -d 200.252.60.83 -j RETURN
-A PROXY -d 104.236.14.6 -j RETURN
-A PROXY -d viacep.com.br -j RETURN
-A PROXY -d sii.inovadorasistemas.com.br -j RETURN
-A PROXY -d sii.inovadora.com.br -j RETURN
# lista de internos
-A PROXY -s 192.168.1.60 -j RETURN
#
-A PROXY -p tcp --dport 80 -j REDIRECT --to 3128
### fim das regras para lista de IPs para desviar do proxy
-A PREROUTING -p tcp --dport 5432 -i eth1 -j DNAT --to 192.168.1.2:5432
-A PREROUTING -p udp --dport 5432 -i eth1 -j DNAT --to 192.168.1.2:5432
-A PREROUTING -p tcp --dport 3000 -i eth1 -j DNAT --to 192.168.0.254:3000
-A PREROUTING -p tcp --dport 3001 -i eth1 -j DNAT --to 192.168.0.254:3001
-A PREROUTING -p tcp --dport 3002 -i eth1 -j DNAT --to 192.168.0.254:3002
-A PREROUTING -p tcp --dport 3003 -i eth1 -j DNAT --to 192.168.0.254:3003
-A PREROUTING -p tcp --dport 3004 -i eth1 -j DNAT --to 192.168.0.254:3004
-A PREROUTING -p tcp --dport 3005 -i eth1 -j DNAT --to 192.168.0.254:3005
-A PREROUTING -p tcp --dport 3006 -i eth1 -j DNAT --to 192.168.0.254:3006
-A PREROUTING -p tcp --dport 3007 -i eth1 -j DNAT --to 192.168.0.254:3007
-A PREROUTING -p tcp --dport 3008 -i eth1 -j DNAT --to 192.168.0.254:3008
-A PREROUTING -p tcp --dport 3009 -i eth1 -j DNAT --to 192.168.0.254:3009
-A PREROUTING -p tcp --dport 3010 -i eth1 -j DNAT --to 192.168.0.254:3010
-A PREROUTING -p tcp --dport 5902 -j DNAT --to 192.168.1.2:5902
-A PREROUTING -p tcp --dport 5903 -j DNAT --to 192.168.1.2:5903
-A PREROUTING -p tcp --dport 5904 -j DNAT --to 192.168.1.2:5904
-A PREROUTING -p tcp --dport 5905 -j DNAT --to 192.168.0.1:5800
-A PREROUTING -p udp --dport 5901 -j DNAT --to 192.168.0.1:5900
-A PREROUTING -p tcp --dport 9090 -j DNAT --to 192.168.1.3:80
-A PREROUTING -p tcp --dport 4550 -j DNAT --to 192.168.1.3:4550
-A POSTROUTING -p tcp -s 192.168.1.3 --dport 4550 -j MASQUERADE
-A PREROUTING -p tcp --dport 5550 -j DNAT --to 192.168.1.3:5550
-A POSTROUTING -p tcp -s 192.168.1.3 --dport 5550 -j MASQUERADE
-A PREROUTING -p tcp --dport 6550 -j DNAT --to 192.168.1.3:6550
-A POSTROUTING -p tcp -s 192.168.1.3 --dport 6550 -j MASQUERADE
-A PREROUTING -p tcp --dport 8866 -j DNAT --to 192.168.1.3:8866
-A POSTROUTING -p tcp -s 192.168.1.3 --dport 8866 -j MASQUERADE
-A PREROUTING -p tcp --dport 9091 -j DNAT --to 192.168.1.4:80
-A PREROUTING -p tcp --dport 4551 -j DNAT --to 192.168.1.4:4550
-A POSTROUTING -p tcp -s 192.168.1.4 --dport 4551 -j MASQUERADE
-A PREROUTING -p tcp --dport 5551 -j DNAT --to 192.168.1.4:5550
-A POSTROUTING -p tcp -s 192.168.1.4 --dport 5551 -j MASQUERADE
-A PREROUTING -p tcp --dport 6551 -j DNAT --to 192.168.1.4:6550
-A POSTROUTING -p tcp -s 192.168.1.4 --dport 6551 -j MASQUERADE
-A PREROUTING -p tcp --dport 5552 -j DNAT --to 192.168.1.4:5552
-A POSTROUTING -p tcp -s 192.168.1.4 --dport 5552 -j MASQUERADE
-A PREROUTING -p tcp --dport 8867 -j DNAT --to 192.168.1.4:8867
-A POSTROUTING -p tcp -s 192.168.1.4 --dport 8867 -j MASQUERADE
-A PREROUTING -p tcp --dport 15500 -j DNAT --to 192.168.1.99:15500
-A POSTROUTING -p tcp -s 192.168.1.99 --dport 15500 -j MASQUERADE
-A PREROUTING -p udp --dport 4186 -j DNAT --to 192.168.1.99:4186
-A POSTROUTING -p udp -s 192.168.1.99 --dport 4186 -j MASQUERADE
-A POSTROUTING -o eth1 -j MASQUERADE
COMMIT
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT DROP [0:0]
:allowed - [0:0]
:bad_tcp_packets - [0:0]
:icmp_packets - [0:0]
:tcp_packets - [0:0]
:udp_packets - [0:0]
-A FORWARD -i eth0 -s 192.168.1.60 -j ACCEPT
-A FORWARD -d 192.168.1.3 -p tcp --dport 80 -j ACCEPT
-A FORWARD -s 192.168.1.3 -p tcp --sport 80 -j ACCEPT
-A FORWARD -d 192.168.1.3 -p tcp --dport 4550 -j ACCEPT
-A FORWARD -s 192.168.1.3 -p tcp --sport 4550 -j ACCEPT
-A FORWARD -d 192.168.1.3 -p tcp --dport 5550 -j ACCEPT
-A FORWARD -s 192.168.1.3 -p tcp --sport 5550 -j ACCEPT
-A FORWARD -d 192.168.1.3 -p tcp --dport 6550 -j ACCEPT
-A FORWARD -s 192.168.1.3 -p tcp --sport 6550 -j ACCEPT
-A FORWARD -d 192.168.1.3 -p tcp --dport 8866 -j ACCEPT
-A FORWARD -s 192.168.1.3 -p tcp --sport 8866 -j ACCEPT
-A FORWARD -d 192.168.1.4 -p tcp --dport 80 -j ACCEPT
-A FORWARD -s 192.168.1.4 -p tcp --sport 80 -j ACCEPT
-A FORWARD -d 192.168.1.4 -p tcp --dport 4550 -j ACCEPT
-A FORWARD -s 192.168.1.4 -p tcp --sport 4550 -j ACCEPT
-A FORWARD -d 192.168.1.4 -p tcp --dport 5550 -j ACCEPT
-A FORWARD -s 192.168.1.4 -p tcp --sport 5550 -j ACCEPT
-A FORWARD -d 192.168.1.4 -p tcp --dport 6550 -j ACCEPT
-A FORWARD -s 192.168.1.4 -p tcp --sport 6550 -j ACCEPT
-A FORWARD -d 192.168.1.4 -p tcp --dport 8867 -j ACCEPT
-A FORWARD -s 192.168.1.4 -p tcp --sport 8867 -j ACCEPT
-A FORWARD -d 192.168.1.99 -p tcp --dport 15500 -j ACCEPT
-A FORWARD -s 192.168.1.99 -p tcp --sport 15500 -j ACCEPT
-A FORWARD -d 192.168.1.99 -p udp --dport 4186 -j ACCEPT
-A FORWARD -s 192.168.1.99 -p udp --sport 4186 -j ACCEPT
-A FORWARD -p tcp --dport 5902 -j ACCEPT
-A FORWARD -p tcp --dport 5903 -j ACCEPT
-A FORWARD -p tcp --dport 5904 -j ACCEPT
-A FORWARD -p tcp --dport 5905 -j ACCEPT
-A INPUT -p tcp --dport 5432 -j ACCEPT
-A INPUT -p udp --dport 5432 -j ACCEPT
-A INPUT -p tcp --sport 5432 -j ACCEPT
-A INPUT -p udp --sport 5432 -j ACCEPT
-A FORWARD -p tcp --dport 5432 -j ACCEPT
-A FORWARD -p tcp --sport 5432 -j ACCEPT
-A FORWARD -p udp --dport 5432 -j ACCEPT
-A FORWARD -p udp --sport 5432 -j ACCEPT
-A OUTPUT -p tcp --dport 5432 -j ACCEPT
-A OUTPUT -p udp --dport 5432 -j ACCEPT
-A OUTPUT -p tcp --sport 5432 -j ACCEPT
-A OUTPUT -p udp --sport 5432 -j ACCEPT
-A FORWARD -p tcp --dport 3000 -j ACCEPT
-A FORWARD -p tcp --sport 3000 -j ACCEPT
-A FORWARD -p tcp --dport 3001 -j ACCEPT
-A FORWARD -p tcp --sport 3001 -j ACCEPT
-A FORWARD -p tcp --dport 3002 -j ACCEPT
-A FORWARD -p tcp --sport 3002 -j ACCEPT
-A FORWARD -p tcp --dport 3003 -j ACCEPT
-A FORWARD -p tcp --sport 3003 -j ACCEPT
-A FORWARD -p tcp --dport 3004 -j ACCEPT
-A FORWARD -p tcp --sport 3004 -j ACCEPT
-A FORWARD -p tcp --dport 3005 -j ACCEPT
-A FORWARD -p tcp --sport 3005 -j ACCEPT
-A FORWARD -p tcp --dport 3006 -j ACCEPT
-A FORWARD -p tcp --sport 3006 -j ACCEPT
-A FORWARD -p tcp --dport 3007 -j ACCEPT
-A FORWARD -p tcp --sport 3007 -j ACCEPT
-A FORWARD -p tcp --dport 3008 -j ACCEPT
-A FORWARD -p tcp --sport 3008 -j ACCEPT
-A FORWARD -p tcp --dport 3009 -j ACCEPT
-A FORWARD -p tcp --sport 3009 -j ACCEPT
-A FORWARD -p tcp --dport 3010 -j ACCEPT
-A FORWARD -p tcp --sport 3010 -j ACCEPT
-A INPUT -p tcp --dport 3000 -j ACCEPT
-A INPUT -p tcp --sport 3000 -j ACCEPT
-A INPUT -p tcp --dport 3001 -j ACCEPT
-A INPUT -p tcp --sport 3001 -j ACCEPT
-A INPUT -p tcp --dport 3002 -j ACCEPT
-A INPUT -p tcp --sport 3002 -j ACCEPT
-A INPUT -p tcp --dport 3003 -j ACCEPT
-A INPUT -p tcp --sport 3003 -j ACCEPT
-A INPUT -p tcp --dport 3004 -j ACCEPT
-A INPUT -p tcp --sport 3004 -j ACCEPT
-A INPUT -p tcp --dport 3005 -j ACCEPT
-A INPUT -p tcp --sport 3005 -j ACCEPT
-A INPUT -p tcp --dport 3006 -j ACCEPT
-A INPUT -p tcp --sport 3006 -j ACCEPT
-A INPUT -p tcp --dport 3007 -j ACCEPT
-A INPUT -p tcp --sport 3007 -j ACCEPT
-A INPUT -p tcp --dport 3008 -j ACCEPT
-A INPUT -p tcp --sport 3008 -j ACCEPT
-A INPUT -p tcp --dport 3009 -j ACCEPT
-A INPUT -p tcp --sport 3009 -j ACCEPT
-A INPUT -p tcp --dport 3010 -j ACCEPT
-A INPUT -p tcp --sport 3010 -j ACCEPT
-A INPUT -p tcp -j bad_tcp_packets
-A INPUT -s 192.168.1.0/255.255.255.0 -i eth0 -j ACCEPT
# linha squid
-A INPUT -s 192.168.0.0/255.255.255.0 -i eth0 -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --sport 68 --dport 67 -j ACCEPT
-A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i eth1 -p tcp -j tcp_packets
-A INPUT -i eth1 -p udp -j udp_packets
-A INPUT -i eth1 -p icmp -j icmp_packets
-A INPUT -m limit --limit 3/min --limit-burst 3 -j LOG --log-prefix "IPT INPUT packet died: " --log-level 7
-A FORWARD -p tcp -j bad_tcp_packets
-A FORWARD -i eth0 -j ACCEPT
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -m limit --limit 3/min --limit-burst 3 -j LOG --log-prefix "IPT FORWARD packet died: " --log-level 7
-A OUTPUT -p tcp -j bad_tcp_packets
-A OUTPUT -s 127.0.0.1 -j ACCEPT
-A OUTPUT -s 192.168.1.1 -j ACCEPT
# linha squid
-A OUTPUT -s 192.168.0.1 -j ACCEPT
-A OUTPUT -o eth1 -j ACCEPT
-A OUTPUT -m limit --limit 3/min --limit-burst 3 -j LOG --log-prefix "IPT OUTPUT packet died: " --log-level 7
-A allowed -p tcp -m tcp --tcp-flags SYN,RST,ACK SYN -j ACCEPT
-A allowed -p tcp -m state --state RELATED,ESTABLISHED -j ACCEPT
-A allowed -p tcp -j DROP
-A bad_tcp_packets -p tcp -m tcp --tcp-flags SYN,ACK SYN,ACK -m state --state NEW -j REJECT --reject-with tcp-reset
-A bad_tcp_packets -p tcp -m tcp ! --tcp-flags SYN,RST,ACK SYN -m state --state NEW -j LOG --log-prefix "New not syn:"
-A bad_tcp_packets -p tcp -m tcp ! --tcp-flags SYN,RST,ACK SYN -m state --state NEW -j DROP
-A icmp_packets -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A icmp_packets -p icmp -m icmp --icmp-type 11 -j ACCEPT
-A tcp_packets -p tcp -m tcp --dport 21 -j allowed
-A tcp_packets -p tcp -m tcp --dport 22 -j allowed
-A tcp_packets -p tcp -m tcp --dport 80 -j allowed
-A udp_packets -p udp -m udp --sport 53 -j ACCEPT
-A udp_packets -p udp -m udp --sport 67 -j ACCEPT
-A udp_packets -p udp -m udp --sport 2074 -j ACCEPT
-A udp_packets -p udp -m udp --sport 4000 -j ACCEPT
COMMIT
Centos 5.11
Squid 2.6