>> I have machines xxx.zzz.yyy.www (conected to internet, via eth0) and a >> 196.10.10.1 >Just out of interest, where did you get that IP address from ? Just some IP from my mind, it is internal, just used between those two machinesīs eth1. >iptables -A PREROUTING -t nat -i eth0 -p tcp --dport 80 -j DNAT --to >196.10.10.1 >iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT >iptables -A FORWARD -p tcp --dport 80 -d 196.10.10.1 -j ACCEPT >This will allow you to contact your internal web server using a browser on >the Internet, by contacting xxx.zzz.yyy.www Actually it didnt work, i set up info loggin and nothing were being logged in port 80. I dropped all my rules and set up ACCEPT policy on all chains, nothin happened too. >I would tell you how to do the same thing for telnet, but I think you should >be using SSH instead :-) Maybe you can work it out from the rules above >anyway though... i know ssh is safer, thats just for experimental purpose, im very new with iptables. Iīll put my lil script to set this up, it runs in xxx.zzz.yyy.wwwīs rc.local : echo "1" > /proc/sys/net/ipv4/ip_forward # This goes in 196.10.10.1 too iptables -F iptables -F -t mangle iptables -F -t nat iptables -P OUTPUT DROP iptables -P INPUT DROP iptables -P FORWARD DROP service inet stop service inet start iptables -A INPUT -j LOG --log-level info --log-prefix FIREWALL: iptables -A OUTPUT -j LOG --log-level info --log-prefix FIREWALL: iptables -t NAT -A PREROUTING -j LOG --log-level info --log-prefix FIREWALL: iptables -A INPUT -p tcp -m tcp --dport 23 -j ACCEPT iptables -A INPUT -p icmp -j ACCEPT iptables -A INPUT -p tcp -m tcp --dport 21 -j ACCEPT iptables -A INPUT -p tcp -m tcp --dport 20 -j ACCEPT iptables -A OUTPUT -p tcp -m tcp --dport 1024:65535 -j ACCEPT iptables -A OUTPUT -p icmp -j ACCEPT ifconfig eth1 down ifconfig eth1 196.10.10.2 ifconfig eth1 up iptables -A INPUT -j DROP -s 196.10.10.0/24 -i ! eth1 iptables -A INPUT -j DROP -s ! 196.10.10.0/24 -i eth1 iptables -A INPUT -j DROP -d 196.10.10.255 iptables -A INPUT -j DROP -d xxx.zzz.yyy.255 iptables -A INPUT -j DROP -d 255.255.255.255 iptables -A OUTPUT -j DROP -d 196.10.10.255 iptables -A OUTPUT -j DROP -d xxx.zzz.yyy.255 iptables -A OUTPUT -j DROP -d 255.255.255.255 iptables -A FORWARD -j ACCEPT -m state --state ESTABLISHED iptables -A FORWARD -j ACCEPT -m state --state RELATED iptables -A OUTPUT -p tcp -m tcp --dport 53 -j ACCEPT iptables -A OUTPUT -p udp -m tcp --dport 53 -j ACCEPT iptables -A PREROUTING -t nat -i eth0 -p tcp --dport 80 -j DNAT --to 196.10.10.1 iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT iptables -A FORWARD -p tcp --dport 80 -d 196.10.10.1 -j ACCEPT