On Fri, 2004-12-17 at 16:14, Jason Williams wrote: > #Accept loopback interface > $IPTABLES -A INPUT -p ALL -i $LAN_IFACE -s $LAN_IP_RANGE -j ACCEPT you really want to allow unlimited access to your firewall from your internal network? stylistic note: the "-p ALL" is unnecessary. seems to be awfully popular amongst those that post their rules here, but it's just more stuff to read, type, and possibly mistype...no biggie, though. > $IPTABLES -A INPUT -p ALL -i $LO_IFACE -s $LO_IP -j ACCEPT > > > # Rules for incoming packets from the internet. > > $IPTABLES -A INPUT -p ALL -d $INET_IP -m state --state ESTABLISHED,RELATED > -j ACCEPT > > This rule, should only work when the host (firewall) initiate connections > first. Nothing should be accepted back unless a connection originated from > the firewall, correct? yes. another stylistic thing: a "-i $INET_IFACE" would make this rule more consistent with what i believe to be your intent. > This would allow pings to work, ftp, package > grabbing, patches etc. Am I correct? as long as your allowing the connection initiation to happen in OUTPUT (which you are below), yes. personally--i use something more along the lines of: iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT as my first rule to make it interface and IP agnostic, and handle source/destination verification in a separate chain. > # Accept the packets we actually want to forward > > $IPTABLES -A FORWARD -i $LAN_IFACE -o $INET_IFACE -s $LAN_IP -j ACCEPT i think you meant to have "$LAN_IP_RANGE" not "$LAN_IP" there. > $IPTABLES -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT 90% of you packets will match the state rule. a good performance-tuning habit to get into is to make this the first rule in the chain. > Accept traffic from my private LAN. > > # Special OUTPUT rules to decide which IP's to allow. > > $IPTABLES -A OUTPUT -p ALL -s $LO_IP -j ACCEPT > $IPTABLES -A OUTPUT -p ALL -s $LAN_IP -j ACCEPT > $IPTABLES -A OUTPUT -p ALL -s $INET_IP -j ACCEPT > > To allow outbound traffic. This correct? I had question here. errr...how about: iptables -A OUTPUT -j ACCEPT or just: iptables -P OUTPUT ACCEPT if someone can change the source IP of packets associated with locally-generated packets, you have bigger problems than a firewall rule that checks source IPs. -- "Getting out of jury duty is easy. The trick is to say you're prejudiced against all races." --The Simpsons