Additional Help! - Rule in IPTables

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,

Thank You Mr. Kindermann for the big help. I have included the
rules I tried to implement below. I would need some more help
to succeed.

Problem:

1) I cannot access internet from the internal network
192.168.1.0/24, once the rules are implemented on the GW along
with the MASQUERADING rule. I could access the internet only
with the Masquerade rule.

2) The GW can access internet.

3) I would like to enable NEW/ESTABLISHED/RELATED connection
for outgoing/incoming traffic from internal network
172.16.4.0/24 also.



IPTABLE RULES
---------------

# Allow loop back

iptables -A INPUT -i lo -j ACCEPT
iptables -A OUTPUT -o lo -j ACCEPT

-------------------------------------------------
# Allow access between home network and firewall
# eth0 is internal interface, 192.168.1.10

# allow ingress through eth0
$IPTABLES -A INPUT -p all -s 0/0 -i eth0 -j ACCEPT

#allow egress through eth0
iptables -A OUTPUT -p all -d 0/0 -o eth0 -j ACCEPT

-----------------------------------------------------
# Allow forwarding rules,eth1 is external interface

#Allow gateway to access internet

#OUT
iptables -A OUTPUT -o eth1 -m state --state
NEW,ESTABLISHED,RELATED -j ACCEPT

#IN
#$IPTABLES -A INPUT -i eth1 -m state --state
ESTABLISHED,RELATED -j ACCEPT

----------------------------------------------------------
#Internal Network 192.168.1.0/24
#egress to internet from 192.168.1.0 network

iptables -A FORWARD -o eth1 -s 192.168.1.0/24 -m state --state
NEW,ESTABLISHED,RELATED

#ingress from internet to 192.168.1.0 network
iptables -A FORWARD -i eth1 -d 192.168.1.0/24 -m state --state
ESTABLISHED,RELATED

----------------------------------------------------------

# Turn on NAT {IP Forwarding}

$IPTABLES -A POSTROUTING -t nat -o eth1 -j MASQUERADE

----------------------------------------------------
----------------------------------------------------

Additionally: If total access has to be given to 172.16.4.0
network (IN/OUT) would this rule work?

iptables -A FORWARD -o eth1 -s 172.16.4.0/24 -m state --state
NEW,ESTABLISHED,RELATED

#ingress from internet to 192.168.1.0 network
iptables -A FORWARD -i eth1 -d 172.16.4.0/24 -m state --state
NEW,ESTABLISHED,RELATED


Thank You For the fast response and help.
Menon

---- Original message ----
>Date: Tue, 28 Sep 2004 20:01:53 +0200
>From: Volker Kindermann <ml@xxxxxxxx>  
>Subject: Re: Pls Help - Rule in IPTables  
>To: General Red Hat Linux discussion list
<redhat-list@xxxxxxxxxx>
>Cc: menonrr@xxxxxxx
>
>Hello Menon,
>
>
>> I would like to configure the IPTables so that no new
>> connection can be established from outside to the Gateway.  
>> 
>> Network set up: Internet ---- ||eth1 |134.public-IP "Gateway"
>> 192.168.1.10 |eth0 ||----- inside
>
>I would suggest that you block all by default and then open
the firewall with the rules you need.
>
>Something like (only fragments shown):
>
>$IPTABLES -P OUTPUT  DROP
>$IPTABLES -P INPUT   DROP
>$IPTABLES -P FORWARD DROP
>
>$IPTABLES -A INPUT   -m state --state ESTABLISHED,RELATED -j
ACCEPT
>$IPTABLES -A OUTPUT  -m state --state ESTABLISHED,RELATED -j
ACCEPT
>$IPTABLES -A FORWARD -m state --state ESTABLISHED,RELATED -j
ACCEPT
>
>And then add the rules for allowed traffic. This way all not
explicitly allowed is forbidden by default.
>
> -volker

-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux