Enviado em 13/05/2018 - 21:27h
Olá gurizada,#!/bin/bash # Interface da Internet: ifinternet="ens33" iflocal="ens32" iptables -F iptables -F -t nat #permite roteamento modprobe iptable_nat echo 1 > /proc/sys/net/ipv4/ip_forward #libera internet para as outras placas de rede iptables -t nat -A POSTROUTING -o $ifinternet -j MASQUERADE #bloqueia requisição da rede local para internet iptables -A FORWARD -i $iflocal -o $ifinternet -j DROP #libera acesso da vpn na rede local iptables -t nat -A POSTROUTING -s 10.8.0.0/8 -o $ifinternet -j MASQUERADE #libera porta vpn #iptables -I INPUT -i $ifinternet -p udp --dport 1194 -j ACCEPT #iptables -A FORWARD -p udp --dport 1194 -j ACCEPT #iptables -t nat -I PREROUTING -p udp -i ens33 -m multiport --dport 1194 -j DNAT --to 192.168.0.109 #iptables -t nat -A PREROUTING -i $ifinternet -p udp -s 0.0.0.0/0 --dport 1194 -d 192.168.0.1 -j DNAT --to 192.168.0.109:1194 #iptables -t nat -A POSTROUTING -s 192.168.0.109 -o $iflocal -p udp --sport 1194 -j SNAT --to 192.168.0.1 #iptables -A OUTPUT -p udp -i ens33 --dport 1194 -s 192.168.0.109 -j ACCEPT #iptables -A INPUT -p udp --dport 1194 -j ACCEPT #iptables -A FORWARD -i tun0 -o $ifinternet -j ACCEPT #iptables -A FORWARD -i tun0 -o $iflocal -j ACCEPT #iptables -A INPUT -p udp -i $ifinternet --dport 1194 -j ACCEPT #testes #iptables -t filter -A INPUT -p udp --dport 1194 -j ACCEPT #iptables -t filter -A FORWARD -p udp -s 192.168.2.0/24 --dport 1194 -j ACCEPT #iptables -t filter -A FORWARD -p udp -d 192.168.2.0/24 --sport 1194 -j ACCEPT #iptables -t nat -A POSTROUTING -s 192.168.2.0/24 -d 10.8.0.0/8 -j ACCEPT #iptables -t nat -A POSTROUTING -d 192.168.2.0/24 -s 10.8.0.0/8 -j ACCEPT #iptables -t nat -I POSTROUTING -s 10.8.0.0/8 -o eth1 -j MASQUERADE iptables -t nat -p udp -I PREROUTING -s 0/0 -d 192.168.0.109 --dport 1194 -j DNAT --to 192.168.2.1 iptables -I FORWARD -p udp --dport 1194 -j ACCEPT
Enviado em 13/05/2018 - 22:45h
Enviado em 13/05/2018 - 23:22h
#!/bin/bash # Interface da Internet: ifinternet="ens33" iflocal="ens32" iptables -F iptables -F -t nat #permite roteamento modprobe iptable_nat echo 1 > /proc/sys/net/ipv4/ip_forward #libera internet para as outras placas de rede iptables -t nat -A POSTROUTING -o $ifinternet -j MASQUERADE #bloqueia requisição da rede local para internet iptables -A FORWARD -i $iflocal -o $ifinternet -j DROP #libera acesso da vpn na rede local iptables -t nat -A POSTROUTING -s 10.8.0.0/8 -o $ifinternet -j MASQUERADE #libera porta vpn #iptables -I INPUT -i $ifinternet -p udp --dport 1194 -j ACCEPT #iptables -A FORWARD -p udp --dport 1194 -j ACCEPT #iptables -t nat -I PREROUTING -p udp -i ens33 -m multiport --dport 1194 -j DNAT --to 192.168.0.109 #iptables -t nat -A PREROUTING -i $ifinternet -p udp -s 0.0.0.0/0 --dport 1194 -d 192.168.0.1 -j DNAT --to 192.168.0.109:1194 #iptables -t nat -A POSTROUTING -s 192.168.0.109 -o $iflocal -p udp --sport 1194 -j SNAT --to 192.168.0.1 #iptables -A OUTPUT -p udp -i ens33 --dport 1194 -s 192.168.0.109 -j ACCEPT #iptables -A INPUT -p udp --dport 1194 -j ACCEPT #iptables -A FORWARD -i tun0 -o $ifinternet -j ACCEPT #iptables -A FORWARD -i tun0 -o $iflocal -j ACCEPT #iptables -A INPUT -p udp -i $ifinternet --dport 1194 -j ACCEPT #testes #iptables -t filter -A INPUT -p udp --dport 1194 -j ACCEPT #iptables -t filter -A FORWARD -p udp -s 192.168.2.0/24 --dport 1194 -j ACCEPT #iptables -t filter -A FORWARD -p udp -d 192.168.2.0/24 --sport 1194 -j ACCEPT #iptables -t nat -A POSTROUTING -s 192.168.2.0/24 -d 10.8.0.0/8 -j ACCEPT #iptables -t nat -A POSTROUTING -d 192.168.2.0/24 -s 10.8.0.0/8 -j ACCEPT #iptables -t nat -I POSTROUTING -s 10.8.0.0/8 -o eth1 -j MASQUERADE iptables -t nat -p udp -I PREROUTING -s 0/0 -d 192.168.0.109 --dport 1194 -j DNAT --to 192.168.2.1 iptables -I FORWARD -p udp --dport 1194 -j ACCEPT
iptables -A INPUT -i $ifinternet -p udp --dport 1194 -m state --state NEW --j ACCEPT
iptables -t nat -A PREROUTING -i $ifinternet -p udp --dport 1194 -j DNAT --to-dest 192.168.2.1
iptables -A INPUT -p udp --dport 1194 -j ACCEPT
#bloqueia requisição da rede local para internet iptables -A FORWARD -i $iflocal -o $ifinternet -j DROP
iptables -A FORWARD -i $ifinternet -p udp --dport 1194 -j ACCEPT
Enviado em 13/05/2018 - 23:37h
#!/bin/bash # Interface da Internet: ifinternet="ens33" iflocal="ens32" iptables -F iptables -F -t nat #permite roteamento modprobe iptable_nat echo 1 > /proc/sys/net/ipv4/ip_forward #libera internet para as outras placas de rede iptables -t nat -A POSTROUTING -o $ifinternet -j MASQUERADE #bloqueia requisição da rede local para internet iptables -A FORWARD -i $iflocal -o $ifinternet -j DROP #libera acesso da vpn na rede local iptables -t nat -A POSTROUTING -s 10.8.0.0/8 -o $ifinternet -j MASQUERADE #libera porta vpn #iptables -I INPUT -i $ifinternet -p udp --dport 1194 -j ACCEPT #iptables -A FORWARD -p udp --dport 1194 -j ACCEPT #iptables -t nat -I PREROUTING -p udp -i ens33 -m multiport --dport 1194 -j DNAT --to 192.168.0.109 #iptables -t nat -A PREROUTING -i $ifinternet -p udp -s 0.0.0.0/0 --dport 1194 -d 192.168.0.1 -j DNAT --to 192.168.0.109:1194 #iptables -t nat -A POSTROUTING -s 192.168.0.109 -o $iflocal -p udp --sport 1194 -j SNAT --to 192.168.0.1 #iptables -A OUTPUT -p udp -i ens33 --dport 1194 -s 192.168.0.109 -j ACCEPT #iptables -A INPUT -p udp --dport 1194 -j ACCEPT #iptables -A FORWARD -i tun0 -o $ifinternet -j ACCEPT #iptables -A FORWARD -i tun0 -o $iflocal -j ACCEPT #iptables -A INPUT -p udp -i $ifinternet --dport 1194 -j ACCEPT #testes #iptables -t filter -A INPUT -p udp --dport 1194 -j ACCEPT #iptables -t filter -A FORWARD -p udp -s 192.168.2.0/24 --dport 1194 -j ACCEPT #iptables -t filter -A FORWARD -p udp -d 192.168.2.0/24 --sport 1194 -j ACCEPT #iptables -t nat -A POSTROUTING -s 192.168.2.0/24 -d 10.8.0.0/8 -j ACCEPT #iptables -t nat -A POSTROUTING -d 192.168.2.0/24 -s 10.8.0.0/8 -j ACCEPT #iptables -t nat -I POSTROUTING -s 10.8.0.0/8 -o eth1 -j MASQUERADE iptables -t nat -p udp -I PREROUTING -s 0/0 -d 192.168.0.109 --dport 1194 -j DNAT --to 192.168.2.1 iptables -I FORWARD -p udp --dport 1194 -j ACCEPT
iptables -A INPUT -i $ifinternet -p udp --dport 1194 -m state --state NEW --j ACCEPT
iptables -t nat -A PREROUTING -i $ifinternet -p udp --dport 1194 -j DNAT --to-dest 192.168.2.1
iptables -A INPUT -p udp --dport 1194 -j ACCEPT
#bloqueia requisição da rede local para internet iptables -A FORWARD -i $iflocal -o $ifinternet -j DROP
iptables -A FORWARD -i $ifinternet -p udp --dport 1194 -j ACCEPT
iptables -t nat -p udp -I PREROUTING -s 0/0 -d 192.168.0.109 --dport 1194 -j DNAT --to 192.168.2.1
iptables -A INPUT -i $ifinternet -p udp --dport 1194 -m state --state NEW --j ACCEPT
iptables -A FORWARD -i $ifinternet -p udp --dport 1194 -j ACCEPT
#bloqueia requisição da rede local para internet iptables -A FORWARD -i $iflocal -o $ifinternet -j DROP
Enviado em 13/05/2018 - 23:47h
Se a VPN está no server onde está o firewall, deverá fazer:#!/bin/bash # Interface da Internet: ifinternet="ens33" iflocal="ens32" iptables -F iptables -F -t nat #permite roteamento modprobe iptable_nat echo 1 > /proc/sys/net/ipv4/ip_forward #libera internet para as outras placas de rede iptables -t nat -A POSTROUTING -o $ifinternet -j MASQUERADE #bloqueia requisição da rede local para internet iptables -A FORWARD -i $iflocal -o $ifinternet -j DROP #libera acesso da vpn na rede local iptables -t nat -A POSTROUTING -s 10.8.0.0/8 -o $ifinternet -j MASQUERADE #libera porta vpn iptables -I INPUT -i $ifinternet -p udp --dport 1194 -j ACCEPT
Enviado em 13/05/2018 - 23:59h
#!/bin/bash # Interface da Internet: ifinternet="ens33" iflocal="ens32" iptables -F iptables -F -t nat #permite roteamento modprobe iptable_nat echo 1 > /proc/sys/net/ipv4/ip_forward #libera internet para as outras placas de rede iptables -t nat -A POSTROUTING -o $ifinternet -j MASQUERADE #bloqueia requisição da rede local para internet iptables -A FORWARD -i $iflocal -o $ifinternet -j DROP #libera acesso da vpn na rede local iptables -t nat -A POSTROUTING -s 10.8.0.0/8 -o $ifinternet -j MASQUERADE #libera porta vpn iptables -I INPUT -i $ifinternet -p udp --dport 1194 -j ACCEPT
Enviado em 14/05/2018 - 00:05h
Nesse caso, imagino que o problema não está na liberação da porta, que aparentemente está sendo feita corretamente, porém no OpenVpn, se tentar conectar em rede local ele conecta? Faz uma coisa: loga os pacotes que chegam na porta 1194.iptables -A INPUT -i $ifinternet -p udp --dport 1194 -j LOG --log-prefix "Firewall VPN (Entrada) "
tail /var/log/messages -n 200 | grep VPN
Enviado em 14/05/2018 - 00:14h
iptables -A INPUT -i $ifinternet -p udp --dport 1194 -j LOG --log-prefix "Firewall VPN (Entrada) "
tail /var/log/messages -n 200 | grep VPN
Enviado em 14/05/2018 - 00:26h
iptables -A INPUT -i $ifinternet -p udp --dport 1194 -j LOG --log-prefix "Firewall VPN (Entrada) "
tail /var/log/messages -n 200 | grep VPN
May 14 00:23:40 server ovpn-server[1809]: OpenVPN 2.3.10 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Jun 22 2017 May 14 00:23:40 server ovpn-server[1809]: library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 May 14 00:23:40 server ovpn-server[1813]: NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x. Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet. May 14 00:23:40 server ovpn-server[1813]: Diffie-Hellman initialized with 2048 bit key May 14 00:23:40 server ovpn-server[1813]: Control Channel Authentication: using 'ta.key' as a OpenVPN static key file May 14 00:23:40 server ovpn-server[1813]: Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication May 14 00:23:40 server ovpn-server[1813]: Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication May 14 00:23:40 server ovpn-server[1813]: Socket Buffers: R=[212992->212992] S=[212992->212992] May 14 00:23:40 server ovpn-server[1813]: ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=ens33 HWADDR=7c:8b:ca:02:51:b8 May 14 00:23:40 server ovpn-server[1813]: TUN/TAP device tun0 opened May 14 00:23:40 server ovpn-server[1813]: TUN/TAP TX queue length set to 100 May 14 00:23:40 server ovpn-server[1813]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 May 14 00:23:40 server ovpn-server[1813]: /sbin/ip link set dev tun0 up mtu 1500 May 14 00:23:40 server ovpn-server[1813]: /sbin/ip addr add dev tun0 local 10.8.0.1 peer 10.8.0.2 May 14 00:23:40 server ovpn-server[1813]: /sbin/ip route add 10.8.0.0/24 via 10.8.0.2 May 14 00:23:40 server ovpn-server[1813]: GID set to nogroup May 14 00:23:40 server ovpn-server[1813]: UID set to nobody May 14 00:23:40 server ovpn-server[1813]: UDPv4 link local (bound): [undef] May 14 00:23:40 server ovpn-server[1813]: UDPv4 link remote: [undef] May 14 00:23:40 server ovpn-server[1813]: MULTI: multi_init called, r=256 v=256 May 14 00:23:40 server ovpn-server[1813]: IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0 May 14 00:23:40 server ovpn-server[1813]: IFCONFIG POOL LIST May 14 00:23:40 server ovpn-server[1813]: Initialization Sequence Completed
Enviado em 15/05/2018 - 10:26h
Automatizando digitação de códigos 2FA no browser
Resolver problemas de Internet
Como compartilhar a tela do Ubuntu com uma Smart TV (LG, Samsung, etc.)
Como converter imagens PNG/JPEG para SVG em linha de comando
Fez porcaria no teu repositório Git? Aprenda a restaurar uma versão anterior do seu código!
Restaurando Fontes de Download do Hydra no Linux
Atualizando "na marra" o YT-DLP quando começa a dar erro de downloads
Como instalar o WPS com interface e corretor ortográfico em PT-BR no Arch Linux
Mudar ícone do favorito "encerrar sessão" do Debian 12.10, c... (0)
[AJUDA] Problemas ao atualizar BIOS da Gigabyte B550M K rev. 1.1 — “RO... (6)
Comprei thin client dell wyse tx0 3010 ele tá com Login é senha nao v... (0)