Hello, Thank You Mr. Kindermann for the big help. I have included the rules I tried to implement below. I would need some more help to succeed. Problem: 1) I cannot access internet from the internal network 192.168.1.0/24, once the rules are implemented on the GW along with the MASQUERADING rule. I could access the internet only with the Masquerade rule. 2) The GW can access internet. 3) I would like to enable NEW/ESTABLISHED/RELATED connection for outgoing/incoming traffic from internal network 172.16.4.0/24 also. IPTABLE RULES --------------- # Allow loop back iptables -A INPUT -i lo -j ACCEPT iptables -A OUTPUT -o lo -j ACCEPT ------------------------------------------------- # Allow access between home network and firewall # eth0 is internal interface, 192.168.1.10 # allow ingress through eth0 $IPTABLES -A INPUT -p all -s 0/0 -i eth0 -j ACCEPT #allow egress through eth0 iptables -A OUTPUT -p all -d 0/0 -o eth0 -j ACCEPT ----------------------------------------------------- # Allow forwarding rules,eth1 is external interface #Allow gateway to access internet #OUT iptables -A OUTPUT -o eth1 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT #IN #$IPTABLES -A INPUT -i eth1 -m state --state ESTABLISHED,RELATED -j ACCEPT ---------------------------------------------------------- #Internal Network 192.168.1.0/24 #egress to internet from 192.168.1.0 network iptables -A FORWARD -o eth1 -s 192.168.1.0/24 -m state --state NEW,ESTABLISHED,RELATED #ingress from internet to 192.168.1.0 network iptables -A FORWARD -i eth1 -d 192.168.1.0/24 -m state --state ESTABLISHED,RELATED ---------------------------------------------------------- # Turn on NAT {IP Forwarding} $IPTABLES -A POSTROUTING -t nat -o eth1 -j MASQUERADE ---------------------------------------------------- ---------------------------------------------------- Additionally: If total access has to be given to 172.16.4.0 network (IN/OUT) would this rule work? iptables -A FORWARD -o eth1 -s 172.16.4.0/24 -m state --state NEW,ESTABLISHED,RELATED #ingress from internet to 192.168.1.0 network iptables -A FORWARD -i eth1 -d 172.16.4.0/24 -m state --state NEW,ESTABLISHED,RELATED Thank You For the fast response and help. Menon ---- Original message ---- >Date: Tue, 28 Sep 2004 20:01:53 +0200 >From: Volker Kindermann <ml@xxxxxxxx> >Subject: Re: Pls Help - Rule in IPTables >To: General Red Hat Linux discussion list <redhat-list@xxxxxxxxxx> >Cc: menonrr@xxxxxxx > >Hello Menon, > > >> I would like to configure the IPTables so that no new >> connection can be established from outside to the Gateway. >> >> Network set up: Internet ---- ||eth1 |134.public-IP "Gateway" >> 192.168.1.10 |eth0 ||----- inside > >I would suggest that you block all by default and then open the firewall with the rules you need. > >Something like (only fragments shown): > >$IPTABLES -P OUTPUT DROP >$IPTABLES -P INPUT DROP >$IPTABLES -P FORWARD DROP > >$IPTABLES -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT >$IPTABLES -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT >$IPTABLES -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT > >And then add the rules for allowed traffic. This way all not explicitly allowed is forbidden by default. > > -volker -- redhat-list mailing list unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe https://www.redhat.com/mailman/listinfo/redhat-list