RE: Filtered Port

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> I have another rule after preouting,   postrouting snat (for
> the firewall
> itself) for that purpose. Packets coming from outside going to inside
> machine as from firewall machine.
> 
> May be helps.

If you accept ESTABLISHED (and RELATED for simplicity and other
functionality) you don't have to ; only a PREROUTING will do the trick.
What I mean is this :

$ipt -P FORWARD DROP
$ipt -A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
$ipt -A FORWARD -m state --state NEW -i <if_inet> -o <if_lan> \
  -d <ip_rdp_host> -p tcp --dport 3389 -j ACCEPT
$ipt -t nat -A PREROUTING -i <if_inet> -p tcp --dport 3389 \
  -j DNAT --to <ip_rdp_host>

Robby Workman also has a point : does "iptables -nvL" show packetcount
for these rules. Maybe the packets never reach the iptables firewall, or
maybe there is some other rule blocking rdp traffic before it can be
accepted.


Gr,
Rob



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux