Re: problem reach the internal.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> > [root@cozy166 Qiang]#iptables -L -n --line-numbers
> >
> > Chain FORWARD (policy DROP)
> > num  target     prot opt source               destination
> > 1    ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0          state
> > RELATED,ESTABLISHED 2    ACCEPT     tcp  --  0.0.0.0/0           
> > 192.168.0.3        tcp dpt:80 3    ACCEPT     all  --  0.0.0.0/0           
> > 0.0.0.0/0
> > 4    LOG        all  --  0.0.0.0/0            0.0.0.0/0          LOG flags
> > 0 level 4
> >
> > the line num 3 and num 2 are swapped.
> >
> > i tried reset the counter of ruleset and make connection test to it. i
> > found something that i don't understand. when i am testing from an internal
> > machine to INET_IP:8888 the ruleset for filter table is (counter has reset
> > to zero)
> >
> > [root@cozy166 Qiang]#iptables -L -v -n --line-numbers
> >
> > Chain FORWARD (policy DROP 5 packets, 224 bytes)
> > num   pkts bytes target     prot opt in     out     source       destination 
> > 1    11806   15M ACCEPT     all  --  eth1   eth0    0.0.0.0/0  
> >          0.0.0.0/0          state RELATED,ESTABLISHED
> > 2        3   144 ACCEPT     tcp  --  *      *       0.0.0.0/0           
> > 	192.168.0.3        tcp dpt:80
> > 3     8000  341K ACCEPT     all  --  eth0   eth1    0.0.0.0/0           
> > 	0.0.0.0/0 
> > 4        5   224 LOG        all  --  *      *       0.0.0.0/0    
> >        0.0.0.0/0          LOG flags 0 level 4
> >
> > Chain OUTPUT (policy ACCEPT 13143 packets, 996K bytes)
> > num   pkts bytes target     prot opt in     out     source              
> > destination
> >
> > Chain drop-and-log-it (0 references)
> > num   pkts bytes target     prot opt in     out     source              
> > destination 
> > 1        0     0 DROP       all  --  *      *       0.0.0.0/0  
> >          0.0.0.0/0
> >
> > ####
> > noticed that the Forward chain has (policy DROP 5 packets, 224 bytes) and
> > the line num 2 has 3 counter and 144bytes hits. it's gotta be a problem
> > here.

haven't nailed the problem yet.. can i ask further help please ? 

#eth0 is internal IF, eth1 external IF.

#dmesg | tail

FWD drop IN=eth0 OUT=eth0 SRC=192.168.0.3 DST=192.168.0.12 LEN=64 TOS=0x00 PREC=0x00 TTL=127
ID=22869 DF PROTO=TCP SPT=80 DPT=1026 WINDOW=17520 RES=0x00 ACK SYN URGP=0 

so it's the FWD chain problem?

# request INET_IP:8888 from internal machine 192.168.0.12. only one type of msg greped out.
#grep 192.168.0.12 /proc/net/ip_conntrack

tcp      6 59 SYN_RECV src=192.168.0.12 dst=65.48.28.33 sport=1109 dport=8888 src=192.168.0.3
dst=192.168.0.1 sport=80 dport=1109 use=1 

this seeems to be SYN/ACK in return. but no established further on..

here is more verbose iptables dump.. 
from iptables -L -v -n

Chain FORWARD (policy DROP 130 packets, 7822 bytes)
 pkts bytes target     prot opt in     out     source               destination         
1292K 1462M ACCEPT     all  --  eth1   eth0    0.0.0.0/0            0.0.0.0/0          state
RELATED,ESTABLISHED 
   55  3204 ACCEPT     tcp  --  *      *       0.0.0.0/0            192.168.0.3        tcp dpt:80 
18402 1286K ACCEPT     all  --  eth0   eth1    0.0.0.0/0            0.0.0.0/0          
   53  3296 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0          LOG flags 0
level 4 prefix `FWD DROP ' 

from iptables -L -v -n -t nat

Chain PREROUTING (policy ACCEPT 51091 packets, 3818K bytes)
 pkts bytes target     prot opt in     out     source               destination         
    7   396 DNAT       tcp  --  *      *       0.0.0.0/0            65.48.28.33        tcp
dpt:8888 to:192.168.0.3:80 

Chain POSTROUTING (policy ACCEPT 276 packets, 46588 bytes)
 pkts bytes target     prot opt in     out     source               destination         
   10   576 SNAT       tcp  --  *      *       192.168.0.0/24       192.168.0.3        tcp dpt:80
to:192.168.0.1 
 5715  315K MASQUERADE  all  --  *      eth1    0.0.0.0/0            0.0.0.0/0      


many thanks,

=====
/James.Q.L

______________________________________________________________________ 
Post your free ad now! http://personals.yahoo.ca


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux