RE: firewall host problem

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



This is the line I added .. thank you for your suggestion anyway

iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT


On Sun, 2003-10-19 at 21:02, Josh Berry wrote:
> You are only allowing port 22 for input, you have to allow related traffic
> back.  Something like:
> 
> iptables -A FORWARD -p tcp -i <input interface> -m state --state
> ESTABLISHED,RELATED -j ACCEPT
> 
> 
> > I thought about that too.. but
> >
> > This output seems to indicate a default policy of ACCEPT on the output
> > chain.  I've not yet formulated a set of rules to handle outbound
> > traffic.
> >
> > iptables -L .. partial output ...
> >
> > Chain OUTPUT (policy ACCEPT)
> > target     prot opt source               destination
> >
> > or .. am I missing your point ?
> >
> > On Sun, 2003-10-19 at 20:44, Mark E. Donaldson wrote:
> >> David - Where are your OUTPUT chain Rules?  If you want to ping (or
> >> anything
> >> else) your ISP gateway from the firewall itself, you need rules in your
> >> OUTPUT chain to permit this.  If your OUTPUT default policy is set to
> >> DROP,
> >> then all packets generated by your firewall are being dropped.
> >>
> >> -----Original Message-----
> >> From: David H. Askew [mailto:daskew2@xxxxxxxxx]
> >> Sent: Sunday, October 19, 2003 2:44 PM
> >> To: netfilter@xxxxxxxxxxxxxxxxxxx
> >> Subject: firewall host problem
> >>
> >>
> >>
> >> ok .. so 'I'm trying to setup my first iptables firewall .. and I've got
> >> a semi functional setup so far ... but I do have one small problem .. my
> >> firewall machine .. which is performing NAT for my home network.. cannot
> >> access the Internet with any standard tools ... tracepath .. ping ..
> >> etc.  I know network connectivity is fine .. because my internal
> >> machines function properly.
> >>
> >> My router/firewall has 3 interfaces ....
> >> 	eth0: ISP
> >> 	eth1: Home Subnet 1
> >> 	eth2: Home Subnet 2
> >>
> >> eth2 can ping my ISP gateway
> >> eth1 can ping my ISP gateway
> >> eth0 can not ping my ISP gateway
> >>
> >>
> >> my firewall script is below  ...
> >>
> >> I've recently switched from an ACCEPT default policy to the DROP default
> >> policy below.  I didn't have this problem previously, so I know i'I've
> >> just forgotten to allow something .. but I'm having trouble coming to a
> >> logical conclusion ....
> >>
> >> ...any help .. critique ... advice you could provide would be helpful
> >>
> >> -dave
> >>
> >>
> >> iptables --flush
> >> iptables --table nat --flush
> >> iptables --delete-chain
> >> iptables --table nat --delete-chain
> >>
> >>
> >> # Enable packet forwarding in the kernel
> >> echo 1 > /proc/sys/net/ipv4/ip_forward
> >>
> >> # Setup IP FORWARDing and Masquerading
> >> iptables --table nat --append POSTROUTING --out-interface eth0 -j
> >> MASQUERADE
> >> iptables --append FORWARD --in-interface eth1 -j ACCEPT
> >> iptables --append FORWARD --in-interface eth2 -j ACCEPT
> >>
> >>
> >> #enable connection tracking
> >> iptables -I FORWARD -m state --state INVALID -j DROP
> >> iptables -I FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
> >>
> >> iptables -A INPUT -p tcp -i eth0 -s 0/0 -d 0/0 --dport 22 -j ACCEPT
> >> iptables -A INPUT -p udp -i eth0 -s 0/0 -d 0/0 --dport 22 -j ACCEPT
> >>
> >> iptables -A INPUT -p tcp -i eth2 -s 0/0 -d 0/0 --dport 22 -j ACCEPT
> >> iptables -A INPUT -p udp -i eth2 -s 0/0 -d 0/0 --dport 22 -j ACCEPT
> >>
> >> iptables -P INPUT DROP
> >>
> >>
> >> --
> >> How many Microsoft engineers does it take to change a light bulb ?
> >>
> >> Answer : None, they just declare darkness a new standard.
> >>
> > --
> > How many Microsoft engineers does it take to change a light bulb ?
> >
> > Answer : None, they just declare darkness a new standard.
> >
> >
> 
> 
> Thanks,
> Josh Berry, CTO
> LinkNet-Solutions
> 469-831-8543
> josh.berry@xxxxxxxxxxxxxxxxxxxxx
-- 
How many Microsoft engineers does it take to change a light bulb ?

Answer : None, they just declare darkness a new standard. 

Attachment: signature.asc
Description: This is a digitally signed message part


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux