Re: iptables basics

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, May 07, 2005 at 11:09:02AM +0500, varun_saa@xxxxxxxx wrote:
> Hello,
>       My server is om Mandrake 10.1
> eth0 is WAN with static IP connected to 512K DSL.
> eth1 is LAN - 192.168.0.0/24 , 192.168.21.0/24
> 
> I and doing a nat on eth0 as follows :
> 
> # Generated by iptables-save v1.2.9 on Tue Apr 26 14:50:01 2005
> *nat
> :OUTPUT ACCEPT [0:0]
> :PREROUTING ACCEPT [0:0]
> :POSTROUTING ACCEPT [0:0]
> -A POSTROUTING -o eth0 -j MASQUERADE
> 
> What are the first rules that one would
> write.I mean how and where to start.
> 
> What are the first rules that one would write.
> Do you start by blocking all ? Or allow all ?
> I am asking this just from the point of view
> of understanding the basic strategy.
> 
> Basically clients will surf the net, 
> send/recieve mails and MSN/yahoo chat.
> I would be using squid proxy.

opie's 3-line guide to emulating a cisco PIX default config:

  #!/bin/sh
  INSIDE_IF="eth1"
  OUTSIDE_IF="eth0"
  OUTSIDE_IP=`ip -4 -o addr sh $OUTSIDE_IF | awk '{print $4}' | cut -d"/" -f1`

  modprobe ip_conntrack_ftp
  modprobe ip_nat_ftp

  iptables -P INPUT DROP
  iptables -P FORWARD DROP
  iptables -P OUTPUT ACCEPT

  iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
  iptables -A INPUT -i $INSIDE_IF -m state --state NEW -j ACCEPT
  iptables -A INPUT -i lo -j ACCEPT
  
  iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
  iptables -A FORWARD -i $INSIDE_IF -m state --state NEW -j ACCEPT

  iptables -t nat -A POSTROUTING -o $OUTSIDE_IF \
    -j SNAT --to-source $OUTSIDE_IP

  sysctl -w net.ipv4.ip_forward=1

that's where i'd start--it's pretty wide-open, but it's probably better
than nothing.

i also recommend reading:

  http://iptables-tutorial.frozentux.net/iptables-tutorial.html

-j

--
"Stewie: Baby needs to suck ash. Baby needs to suck ash. Not ass,
 you pervert.  Save it for the interns."
        --Family Guy


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux