Re: iptables: forwarding on internal device

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



You are going to have to add rules to both your INPUT and OUTPUT
chains to allow this traffic through. Could you send on a copy of
/etc/sysconfig/iptables, if that is how your are loading these rules?
I could then send you the exact commands to run.

Josh


On Fri, Feb 6, 2009 at 1:57 PM, Marcus Moeller <mm@xxxxxxx> wrote:
> Hi Again.
>> Iptables -nL
>>
>> Show?
>
> Here is the complete output (there are a lot of other rules active on
> that machine):
>
> Chain INPUT (policy DROP)
> target     prot opt source               destination
> ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
> my_drop    all  --  10.0.0.0/8           0.0.0.0/0
> my_drop    all  --  172.16.0.0/12        0.0.0.0/0
> my_drop    all  --  192.168.0.0/16       0.0.0.0/0
> ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           state
> RELATED,ESTABLISHED
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:22 state NEW
> my_drop    tcp  --  0.0.0.0/0            0.0.0.0/0           tcp flags:0x17/0x02
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:25 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:110 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:22 state NEW
> ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp
> spts:1024:65535 dpt:53 state NEW
> ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp
> spts:1024:65535 dpt:53 state NEW
> ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp
> spts:1024:65535 dpt:37 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:3128 state NEW
> ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 0
> ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 8
> ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 8
> my_drop    all  --  0.0.0.0/0            0.0.0.0/0
>
> Chain FORWARD (policy DROP)
> target     prot opt source               destination
> ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           state
> RELATED,ESTABLISHED
> ACCEPT     tcp  --  0.0.0.0/0            172.28.0.16         tcp dpt:1249
> ACCEPT     tcp  --  0.0.0.0/0            192.168.171.253     tcp dpt:25
> ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp
> spts:1024:65535 dpt:1194 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:1723 state NEW
> ACCEPT     47   --  0.0.0.0/0            0.0.0.0/0           state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:25 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:443 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:25 state NEW
> ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp
> spts:1024:65535 dpt:6277 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:2703 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:22 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:446 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpts:20:21 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:80 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:443 state NEW
> ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp
> spts:1024:65535 dpt:53 state NEW
> ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp
> spts:1024:65535 dpt:37 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:1494 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:8000 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpts:1000:1004 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:6667 state NEW
> ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:3000 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:866 state NEW
> ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 0
> ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 8
> my_drop    all  --  0.0.0.0/0            0.0.0.0/0
>
> Chain OUTPUT (policy DROP)
> target     prot opt source               destination
> ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
> ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           state
> RELATED,ESTABLISHED
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:25 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:25 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:25 state NEW
> ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp
> spts:1024:65535 dpt:6277 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:2703 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:110 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:22 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:22 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:22 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:446 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpts:20:21 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:80 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            192.168.100.4       tcp
> spts:1024:65535 dpt:80 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:443 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            192.168.100.4       tcp
> spts:1024:65535 dpt:443 state NEW
> ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp
> dpt:53 state NEW
> ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp
> spts:1024:65535 dpt:53 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:53 state NEW
> ACCEPT     udp  --  0.0.0.0/0            134.130.4.17        udp
> spts:1024:65535 dpt:37 state NEW
> ACCEPT     udp  --  0.0.0.0/0            130.149.17.21       udp
> spts:1024:65535 dpt:37 state NEW
> ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp
> dpt:123 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:43 state NEW
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> spts:1024:65535 dpt:113 state NEW
> ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 8
> ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 0
> ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 0
> my_drop    all  --  0.0.0.0/0            0.0.0.0/0
>
> Chain my_drop (7 references)
> target     prot opt source               destination
> REJECT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> dpts:4661:4662 reject-with icmp-port-unreachable
> REJECT     udp  --  0.0.0.0/0            0.0.0.0/0           udp
> dpt:4665 reject-with icmp-port-unreachable
> REJECT     udp  --  0.0.0.0/0            0.0.0.0/0           udp
> dpt:1214 reject-with icmp-port-unreachable
> REJECT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> dpts:137:139 reject-with icmp-port-unreachable
> REJECT     udp  --  0.0.0.0/0            0.0.0.0/0           udp
> dpts:137:139 reject-with icmp-port-unreachable
> LOG        tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> flags:0x17/0x02 limit: avg 10/min burst 5 LOG flags 0 level 6 prefix
> `DROP-TCP-SYN '
> REJECT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp
> flags:0x17/0x02 reject-with tcp-reset
> DROP       tcp  --  0.0.0.0/0            0.0.0.0/0           tcp flags:0x17/0x02
> LOG        tcp  --  0.0.0.0/0            0.0.0.0/0           limit:
> avg 10/min burst 5 LOG flags 0 level 6 prefix `DROP-TCP '
> REJECT     tcp  --  0.0.0.0/0            0.0.0.0/0
> reject-with tcp-reset
> DROP       tcp  --  0.0.0.0/0            0.0.0.0/0
> LOG        udp  --  0.0.0.0/0            0.0.0.0/0           limit:
> avg 10/min burst 5 LOG flags 0 level 6 prefix `DROP-UDP '
> REJECT     udp  --  0.0.0.0/0            0.0.0.0/0
> reject-with icmp-port-unreachable
> DROP       udp  --  0.0.0.0/0            0.0.0.0/0
> LOG        icmp --  0.0.0.0/0            0.0.0.0/0           LOG flags
> 0 level 6 prefix `DROP-ICMP '
> DROP       icmp --  0.0.0.0/0            0.0.0.0/0
> LOG        all  --  0.0.0.0/0            0.0.0.0/0           limit:
> avg 10/min burst 5 LOG flags 0 level 6 prefix `DROP-PROTO-ETC '
> REJECT     all  --  0.0.0.0/0            0.0.0.0/0
> reject-with icmp-proto-unreachable
> DROP       all  --  0.0.0.0/0            0.0.0.0/0
>
> Best Regards
> Marcus
> _______________________________________________
> CentOS mailing list
> CentOS@xxxxxxxxxx
> http://lists.centos.org/mailman/listinfo/centos
>



-- 
Thx
Joshua Gimer
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux