Re: port forwarding form IP range

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Rob
Sorry Rob and team I couldnot send you the Output of
IPTABLES because I was on the Vactions Now I am back
to work.

also I have attached the my rc.firewall file 
Please help me to forward request on 192.168.0.3 
here is the Output 


[root@bugtrack rc.d]# iptables -nvL
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source 
             destination
    0     0 ACCEPT     all  --  lo     *      
0.0.0.0/0            0.0.0.0/0
  604 99765 ACCEPT     all  --  eth1   *      
192.168.0.0/24       0.0.0.0/0
    0     0 drop-and-log-it  all  --  ppp0   *      
192.168.0.0/24       0.0.0.0/0
  917  830K ACCEPT     all  --  ppp0   *      
0.0.0.0/0            59.95.10.98
    0     0 ACCEPT     all  --  ppp0   *      
0.0.0.0/0            59.95.10.98         state
RELATED,ESTABLISHED
   23  1157 drop-and-log-it  all  --  *      *      
0.0.0.0/0            0.0.0.0/0
 
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source 
             destination
 2075  265K ACCEPT     all  --  ppp0   eth1   
0.0.0.0/0            0.0.0.0/0           state
RELATED,ESTABLISHED
 3366 4209K ACCEPT     all  --  eth1   ppp0   
0.0.0.0/0            0.0.0.0/0
    0     0 drop-and-log-it  all  --  *      *      
0.0.0.0/0            0.0.0.0/0
 
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source 
             destination
    0     0 ACCEPT     all  --  *      lo     
0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     all  --  *      eth1   
59.95.10.98          192.168.0.0/24
  736  717K ACCEPT     all  --  *      eth1   
192.168.0.0/24       192.168.0.0/24
    0     0 drop-and-log-it  all  --  *      ppp0   
0.0.0.0/0            192.168.0.0/24
  901  132K ACCEPT     all  --  *      ppp0   
59.95.10.98          0.0.0.0/0
    0     0 drop-and-log-it  all  --  *      *      
0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     tcp  --  *      eth0   
0.0.0.0/0            0.0.0.0/0           state NEW tcp
dpt:80
 
Chain drop-and-log-it (5 references)
 pkts bytes target     prot opt in     out     source 
             destination
   23  1157 LOG        all  --  *      *      
0.0.0.0/0            0.0.0.0/0           LOG flags 0
level 6
   23  1157 REJECT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0           reject-with
icmp-port-unreachable
[root@bugtrack rc.d]#


[root@bugtrack rc.d]# iptables -L
Chain INPUT (policy ACCEPT)
target     prot opt source               destination
ACCEPT     all  --  anywhere             anywhere
ACCEPT     all  --  192.168.0.0/24       anywhere
drop-and-log-it  all  --  192.168.0.0/24      
anywhere
ACCEPT     all  --  anywhere             59.95.10.98
ACCEPT     all  --  anywhere             59.95.10.98  
      state RELATED,ESTABLISHED
drop-and-log-it  all  --  anywhere            
anywhere
 
Chain FORWARD (policy ACCEPT)
target     prot opt source               destination
ACCEPT     all  --  anywhere             anywhere     
      state RELATED,ESTABLISHED
ACCEPT     all  --  anywhere             anywhere
drop-and-log-it  all  --  anywhere            
anywhere
 
Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination
ACCEPT     all  --  anywhere             anywhere
ACCEPT     all  --  59.95.10.98         
192.168.0.0/24
ACCEPT     all  --  192.168.0.0/24      
192.168.0.0/24
drop-and-log-it  all  --  anywhere            
192.168.0.0/24
ACCEPT     all  --  59.95.10.98          anywhere
drop-and-log-it  all  --  anywhere            
anywhere
ACCEPT     tcp  --  anywhere             anywhere     
      state NEW tcp dpt:http
 
Chain drop-and-log-it (5 references)
target     prot opt source               destination
LOG        all  --  anywhere             anywhere     
      LOG level info
REJECT     all  --  anywhere             anywhere     
      reject-with icmp-port-unreachable

--- Rob Sterenborg <rob@xxxxxxxxxxxxxxx> wrote:

> Please reply back to the list and STOP TOPPOSTING.
> 
> On Tue, March 14, 2006 11:33, Nilesh wrote:
> > Thanks Rob,
> >
> > I have tried a lot with this rules but unable to
> > forward/redirect traffic.
> > Rob, my question is very simple I want to
> forward/redirect
> > traffic coming from IP 192.168.0.10 for
> 192.168.0.1:3128
> > to 192.168.0.3:3128
> 
> Yes I know what the question is. But if it's so
> simple, then why doesn't it
> work already ?
> 
> > The detail about network.
> > We have two Internet service providers.
> > The scenario is 192.168.0.1 is on my Internet
> Service
> > Provider(ISP) 1 and now I have installed second
> proxy server
> > on other comp which is 192.168.0.3 on the ISP 2
> connection.
> > We have assigned the Ip's to our internal machines
> from range
> > 192.168.0.4 to 192.168.0.250.
> > We have some bandwidth upload/download limitations
> on
> > the ISP 1.
> > I want to use 192.168.0.3 proxy severs for the
> some
> > IP's I have taken example of 192.168.0.10 IP.
> > The browser settings of 192.168.0.10 comp is
> > 192.168.0.1:3128
> >
> > I want to setup the firewall on the 192.168.0.1 so
> the
> > request coming from 192.168.0.10 for the
> > 192.168.0.1:3128 will forwarded to IP
> 192.168.0.3:3128
> > so he/she will use invisibly the proxy
> > 192.168.0.3:3128
> >
> > could you please help me to solve the problem
> 
> The rules I wrote should do what you want to do.
> 
> > $ipt -t nat -A PREROUTING -i eth1 -s 192.168.0.10
> \
> > -p tcp --dport 3128 -j DNAT --to 192.168.0.3
> 
> This specifies that packets to 192.168.0.1:3128 are
> redirected to 192.168.0.3
> (same port).
> 
> > $ipt -A FORWARD -i eth1 -s 192.168.0.10 \
> > -d 192.168.0.3 -p tcp --dport 3128 -j ACCEPT
> 
> This allows it to happen, but policy is ACCEPT
> anyway so this rule should
> actually be of no use (unless another rule blocks
> it).
> 
> If it doesn't work, could you please show us the
> output of : "iptables -nvL".
> 
> 
> Gr,
> Rob
> 
> 
> 

__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam
protection around 
http://mail.yahoo.com 

__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 

Attachment: rc.firewall
Description: 543152633-rc.firewall


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux