Re: iptables ceases to work after night

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



what does iptables-save returns on the morning ?

is it different from what it returns when forwarding is ok ?

if you find differences... there is something to find that alters netfilter config
(a firewall script ? something like an iptables-restore script ?)


if you don't find differences :

check if the ip_forward parameter is still 1 (maybe there's something that switch it off
by night ?)


stop netfilter and check if something can go through your netcard...
if no... i'd suggest to check the driver of the netcard... and perhaps the netcard itself.
if yes forget this point


check to see if resetting netfiler and giving again the config is enough...
-> maybe there's a memory problem that drives your netfilter version to crash


check the known bugs related to your kernel version and your netfilter version...

you'd maybe have to compile a new kernel...


hope this can help, Pascal


Vladimir Potapov wrote:


Yesterday at evening my packet filter with iptables worked fine.Today at morning , I see that he don't forwarding packet from DMZ to local and back.And this thing I see every morning.After I reboot my machine it's work fine.I think that my 3com cards have some bugs.In log there no entries about this . My rules is:


#Allow from local to DMZ and back



-A FORWARD -d 192.168.1.0/255.255.255.0 -i eth1 -o eth2 -p tcp -m state --state RELATED,ESTABLISHED -j ACCEPT


-A FORWARD -d 192.168.5.0/255.255.255.0 -i eth2 -o eth1 -p tcp -m state --state RELATED,ESTABLISHED -j ACCEPT

-A FORWARD -s 192.168.1.0/255.255.255.0 -d 192.168.5.0/255.255.255.0 -i eth2 -o eth1 -p tcp -m tcp --dport 80 --tcp-flags SYN,RST,ACK SYN -m state --state NEW -j ACCEPT

-A FORWARD -s 192.168.1.0/255.255.255.0 -d 192.168.5.0/255.255.255.0 -i eth2 -o eth1 -p tcp -m tcp --dport 3128 --tcp-flags SYN,RST,ACK SYN -m state --state NEW -j ACCEPT

-A FORWARD -s 192.168.1.0/255.255.255.0 -d 192.168.5.0/255.255.255.0 -i eth2 -o eth1 -p tcp -m tcp --dport 25 --tcp-flags SYN,RST,ACK SYN -m state --state NEW -j ACCEPT

-A FORWARD -s 192.168.1.0/255.255.255.0 -d 192.168.5.0/255.255.255.0 -i eth2 -o eth1 -p tcp -m tcp --dport 110 --tcp-flags SYN,RST,ACK SYN -m state --state NEW -j ACCEPT








[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux