RE: tcp packets on 25 port FORWARDING

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



My mistake, have this written with --dport and --state. But still doesn´t
work. Here are my rulesets for table nat :

Chain PREROUTING (policy ACCEPT)
target     prot opt source               destination         
DNAT       tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:25
to:192.168.200.2:25 
REDIRECT   tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:80 redir
ports 3128 
DROP       all  --  192.168.0.0/16       0.0.0.0/0          
DROP       all  --  172.16.0.0/12        0.0.0.0/0          
DROP       all  --  10.0.0.0/8           0.0.0.0/0          

Chain POSTROUTING (policy ACCEPT)
target     prot opt source               destination         
MASQUERADE  all  --  0.0.0.0/0            0.0.0.0/0          

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination          


And for filtering :


Chain INPUT (policy DROP)
target     prot opt source               destination         
tcp_segmenty  tcp  --  0.0.0.0/0            0.0.0.0/0          
udp_pakety  udp  --  0.0.0.0/0            0.0.0.0/0          
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0          icmp type 0 
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0          icmp type 3 
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0          icmp type 8 
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0          icmp type 11 
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0          
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0          
REJECT     tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:113
reject-with icmp-port-unreachable 
spoofing   all  --  0.0.0.0/0            0.0.0.0/0          
syn_flood  tcp  --  0.0.0.0/0            0.0.0.0/0          tcp
flags:0x16/0x02 
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0          icmp type 8
limit: avg 1/sec burst 5 
ACCEPT     all  --  80.95.96.7           0.0.0.0/0          
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0          
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0          
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0          

Chain FORWARD (policy DROP)
target     prot opt source               destination         
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0          
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0          
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0          state
RELATED,ESTABLISHED 
ACCEPT     tcp  --  0.0.0.0/0            192.168.200.2      tcp dpt:25 state
NEW,RELATED,ESTABLISHED 
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0          state
RELATED,ESTABLISHED 
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0          
spoofing   all  --  0.0.0.0/0            0.0.0.0/0          

Chain OUTPUT (policy DROP)
target     prot opt source               destination         
ACCEPT     all  --  127.0.0.1            0.0.0.0/0          
ACCEPT     all  --  192.168.0.1          0.0.0.0/0          
ACCEPT     all  --  192.168.200.1        0.0.0.0/0          
ACCEPT     all  --  82.142.67.253        0.0.0.0/0          

Chain spoofing (2 references)
target     prot opt source               destination         
DROP       all  --  192.168.0.0/16       0.0.0.0/0          
DROP       all  --  172.16.0.0/12        0.0.0.0/0          
DROP       all  --  10.0.0.0/8           0.0.0.0/0          

Chain syn_flood (1 references)
target     prot opt source               destination         
RETURN     all  --  0.0.0.0/0            0.0.0.0/0          limit: avg 1/sec
burst 5 
DROP       all  --  0.0.0.0/0            0.0.0.0/0          

Chain tcp_segmenty (1 references)
target     prot opt source               destination         
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:25 
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:80 

Chain udp_pakety (1 references)
target     prot opt source               destination         
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0          udp dpt:53

Will try the help from Peter Gehle also, if it will run. Thanks...
Stan

-----Original Message-----
From: netfilter-admin@xxxxxxxxxxxxxxxxxxx
[mailto:netfilter-admin@xxxxxxxxxxxxxxxxxxx] On Behalf Of Antony Stone
Sent: Friday, March 12, 2004 10:57 AM
To: netfilter@xxxxxxxxxxxxxxxxxxx
Subject: Re: tcp packets on 25 port FORWARDING

On Friday 12 March 2004 9:46 am, Stanislav Puffler DiS. wrote:

> Hi there,
>
> I need to forward all tcp packets with port 25 (SMTP) from Internet to
> machine in my network. My settings (eth0 = internet IP, eth1 =
> 192.168.200.1 - dmz IP connected to another machine with Postfix, eth2 =
> 192.168.0.1 - gateway - LAN). Have opened port 25 and setup rule :
>
> iptables -t nat -A PREROUTING -p tcp -dport 25 - i eth0 -j DNAT -to
> 192.168.200.2:85

That should be "--dport", not "-dport", and why are you changing the 
destination port number to 85?   Is Postfix listening on port 25?

> iptables -A FORWARD -i eth0 -p tcp -d 192:168.200.2 -dport 25 -m state
> -state NEW,ESTABLISHED,RELATED -j ACCEPT

That should also read "--dport", not "-dport", also "--state", not "-state".

If you have typed out your rules in this email and made some mistakes, then 
please *cut and paste* your ruleset so we really know what is running.

Regards,

Antony.

-- 
Ramdisk is not an installation procedure.

                                                     Please reply to the
list;
                                                           please don't CC
me.






[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux