Re: Shareaza and IPtables

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thanks Guys for the Help.

I added Jason's rules and i passed the ocnnection test. 

Tasha@---<----


--- Jason Opperisano <opie@xxxxxxxxxxx> wrote:

> On Sat, Nov 13, 2004 at 08:16:47PM -0800, Tasha Smith wrote:
> > Hii Everyone,
> > 
> > I am running Shareza(P2P) program on my laptop behind my Router/Firewall
> running
> > Linix 7.3 and Iptables 1.2.7a. Iam trying to open up port 6346 on my
> firewall so
> > it forwards it to my laptop where Sharaza is running. My OUTBOUND rule is
> > already sent to ACCEPT
> > # Set the default policy to drop.
> > $iptables --policy INPUT DROP
> > $iptables --policy FORWARD DROP
> > $iptables --policy OUTPUT ACCEPT
> 
> the OUTPUT chain covers packets originating from the firewall
> itself--your FORWARD policy; which covers packets routed through the
> firewall, is set to DROP.
> 
> > $iptables -t nat --policy PREROUTING ACCEPT
> > $iptables -t nat --policy OUTPUT ACCEPT
> > $iptables -t nat --policy POSTROUTING ACCEPT
> > 
> > Here is Shareza's connection test the i keep timing out on.
> > http://www.crucial-forums.com/connectiontest/
> > 
> > I have Shareza's port configured to 6346.
> > My firewall rule that i thought should work but are not are here. This is
> for
> > emule as well. Any help guys to get this going. I googled but couldnt find
> > anything really useful on this.
> 
> something useful would be to clue us into whether eth1 is internal or
> external--i'm going to *assume* it's internal and eth0 is external...
> 
> > #My rules for EMULE;
> > $iptables -A INPUT -p tcp --dport 4662 -j ACCEPT
> > $iptables -A OUTPUT -p tcp -m multiport --sport 4661,4662 -j ACCEPT
> > $iptables -t nat -A PREROUTING -p tcp --dport 4662 -j DNAT --to 192.168.0.69
> 
> how's about a NAT rule for shareaza?
> 
>   iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 6346 \
>     -j DNAT --to-destination $LAPTOP_IP
> 
> > #These are my Forwarding rules.
> > $iptables -A FORWARD -i eth1 -p tcp --dport 80 -j ACCEPT
> > $iptables -A FORWARD -i eth1 -p tcp -m multiport --dport 25,80,110,443 -j
> ACCEPT
> > $iptables -A FORWARD -i eth1 -p tcp --dport 21 -j ACCEPT
> > $iptables -A FORWARD -i eth1 -p tcp --dport 22 -j ACCEPT
> > $iptables -A FORWARD -i eth1 -p tcp -m multiport --dport
> > 1040,1043,1046,1047,1048,1050,1051,1052,1053,1054 -j ACCEPT
> > $iptables -A FORWARD -i eth1 -p udp --dport 500 -j ACCEPT
> > $iptables -A FORWARD -i eth1 -p 50 -j ACCEPT
> > $iptables -A FORWARD -i eth1 -p 51 -j ACCEPT
> > #$iptables -A FORWARD -i eth1 -p udp --dport 10000 -j ACCEPT
> > $iptables -A FORWARD -i eth1 -p udp --dport 1863 -j ACCEPT
> > $iptables -A FORWARD -i eth1 -p tcp --dport 1863 -j ACCEPT
> > $iptables -A FORWARD -i eth1 -p tcp -m multiport --dport 135,137,138,139 -j
> > ACCEPT
> > $iptables -A FORWARD -i eth1 -p udp -m multiport --dport 135,137,138,139 -j
> > ACCEPT
> > $iptables -A FORWARD -i eth1 -p tcp --dport 1214 -j ACCEPT
> > $iptables -A FORWARD -i eth1 -p udp --dport 1214 -j ACCEPT
> > $iptables -A FORWARD -i eth1 -p udp --dport 2644 -j ACCEPT
> > $iptables -A FORWARD -i eth1 -p tcp --dport 3389 -j ACCEPT
> > $iptables -A FORWARD -i eth1 -p udp --dport 3389 -j ACCEPT
> > $iptables -A FORWARD -i eth1 -p tcp -m multiport --dport 6344,6345,6346,6347
> -j
> > ACCEPT
> > $iptables -A FORWARD -i eth1 -p udp -m multiport --dport 6344,6345,6346,6347
> -j
> > ACCEPT
> > $iptables -A FORWARD -i eth1 -p tcp -m multiport --dport 4242,4661,4662 -j
> > ACCEPT
> > $iptables -A FORWARD -i eth1 -p udp -m multiport --dport 4661,4662,4772 -j
> > ACCEPT
> > $iptables -A FORWARD -p tcp --dport 4662 -i eth0 -o eth1 -j ACCEPT
> > $iptables -A FORWARD -p udp --dport 4662 -i eth0 -o eth1 -j ACCEPT
> 
> how's about a rule for shareaza?
> 
>   iptables -A FORWARD -i eth0 -o eth1 -p tcp \
>     --dport 6346 -d $LAPTOP_IP -j ACCEPT
> 
> > # Enables Packet Forwarding
> > $iptables -t nat -A POSTROUTING -o eth0  -j MASQUERADE
> > 
> > echo 1 > /proc/sys/net/ipv4/ip_forward
> 
> -j
> 
> -- 
> Jason Opperisano <opie@xxxxxxxxxxx>
> 
> 



		
__________________________________ 
Do you Yahoo!? 
Check out the new Yahoo! Front Page. 
www.yahoo.com 
 



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux