On Wed, 2005-11-16 at 02:07 +0100, Przemek wrote: > Hi, > > I have little network, server is connected by ADSL to internet with > static IP. I`m shering connection to my two machines. > > My firewall.sh > IPTAB=/usr/sbin/iptables > PIP=XXX.XXX.XXX.XXX <-ADSL MODEM IP > M1=10.1.1.1 <- LOCAL IPS > M2=10.1.1.2 > M3=10.1.1.3 > echo 1 > /proc/sys/net/ipv4/ip_forward > $IPTAB -F INPUT > $IPTAB -P INPUT ACCEPT > $IPTAB -F OUTPUT > $IPTAB -P OUTPUT ACCEPT > $IPTAB -F FORWARD > $IPTAB -P FORWARD ACCEPT > $IPTAB -t nat -F > $IPTAB -A FORWARD -i ppp0 -j ACCEPT > $IPTAB -A FORWARD -i eth0 -o ppp0 -j ACCEPT > $IPTAB -t nat -A POSTROUTING -o ppp0 -j SNAT --to-source $PIP -s $M2 > $IPTAB -t nat -A POSTROUTING -o ppp0 -j SNAT --to-source $PIP -s $M3 > $IPTAB -A PREROUTING -t nat -i eth0 -p tcp --dport 80 -j REDIRECT --to-port 3128 <- for proxy > > Now I want to block packets form 10.1.1.2 to IP YYY.YYY.YYY.YYY to PORT 22 can YYY.YYY.YYY.YYY be on the same network as M2 (10.1.1.2) ? if it is out on the internet, then block it in the FORWARD chain of the filter table on M1. ps. your notation is a little confusing. perhaps use the following notation: ip:port -> ip:port (absence of port denotes any port) for example, what i think you meant above would be you want to block 10.1.1.2 -> YYY.YYY.YYY.YYY:22 is that correct? > > and > > Block all traffic on 10.1.1.3 but allow to connect IP YYY.YYY.YYY.YYY to PORT 80 again, i am confused. what i think you want is allow 10.1.1.3 -> YYY.YYY.YYY.YYY:80 block everything else from 10.1.1.3 again, this would be done in the FORWARD chain of the filter table. please verify what you want and if you need help writing the rules then we can help. -matt zagrabelny