Newest Iptables Again! with -L :(

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Jan 29, 2003 at 08:21:48AM -0800, Jack Bowling wrote:
> From: Jack Bowling <jbinpg@shaw.ca>
> Subject: Re: Newest Iptables Again! :(
> To: psyche-list@redhat.com
> X-Mailer: The Polarbar Mailer; version=1.25rc3; build=1953
> X-BeenThere: psyche-list@redhat.com
> X-Mailman-Version: 2.0.1
> Reply-To: psyche-list@redhat.com
> X-Reply-To: Jack Bowling <jbinpg@shaw.ca>
> List-Id: Discussion of Red Hat Linux 8.0 (Psyche) <psyche-list.redhat.com>
> List-Archive: <https://listman.redhat.com/pipermail/psyche-list/>
> Date: Wed, 29 Jan 2003 08:21:48 -0800
> X-MailScanner: Found to be clean
> X-Spam-Status: No, hits=-3.3 required=6.0
> 	tests=IN_REP_TO,PLING
> 	version=2.31
> X-Spam-Level: 
> 
> ** Reply to message from Pablo Allietti <pablo@lacnic.net> on Wed, 29 Jan 2003 11:38:56 +0300
> 
> 
> > I send this question again if is possible to anyone help me. or if is
> > possble.
> > 
> > 
> > > 
> > > Hi, Me AGAIN and my iptables problem.! :(
> > > 
> > > again description my net and my problem.
> <snip>
> 
> Hi, Pablo. Your best bet is to send the list the output of the following commands:
> 
> /sbin/iptables -L -v -n
> /sbin/iptables -t nat -L -v -n
> 
> Then maybe we can get a better idea of your problem.
> 
> jb

[root@omega root]# /sbin/iptables -L -v -n
Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source
destination
14469 2747K ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0          state RELATED,ESTABLISHED
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0          tcp dpt:21 flags:0x16/0x02
  130  7736 ACCEPT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0          tcp dpt:25 flags:0x16/0x02
   21  1020 ACCEPT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0          tcp dpt:80 flags:0x16/0x02
    2   120 ACCEPT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0          tcp dpt:22 flags:0x16/0x02
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
200.40.228.70      tcp dpt:23 flags:0x16/0x02
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
192.168.1.210      tcp dpt:23 flags:0x16/0x02
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0          tcp dpt:53
 1718  132K ACCEPT     udp  --  *      *       0.0.0.0/0
0.0.0.0/0          udp dpt:53
   24  1152 ACCEPT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0          tcp dpt:110 flags:0x16/0x02
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0          tcp dpt:143 flags:0x16/0x02
    2   120 ACCEPT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0          tcp dpt:443 flags:0x16/0x02
    0     0 ACCEPT     tcp  --  *      *       192.168.1.0/24
0.0.0.0/0          tcp dpt:1099 flags:0x16/0x02
    1    60 ACCEPT     tcp  --  *      *       200.40.228.64/28
0.0.0.0/0          tcp dpt:1099 flags:0x16/0x02
    0     0 ACCEPT     tcp  --  *      *       192.168.1.0/24
0.0.0.0/0          tcp dpt:4590 flags:0x16/0x02
    0     0 ACCEPT     tcp  --  *      *       200.40.228.64/28
0.0.0.0/0          tcp dpt:4590 flags:0x16/0x02
   45  3510 DROP       udp  --  *      *       0.0.0.0/0
0.0.0.0/0          udp spt:137 dpt:137
 1754  143K dropwall   all  --  *      *       0.0.0.0/0
0.0.0.0/0

Chain FORWARD (policy ACCEPT 32217 packets, 11M bytes)
 pkts bytes target     prot opt in     out     source
destination
33107 1555K ACCEPT     all  --  *      eth0    192.168.1.0/24
0.0.0.0/0
    0     0 ACCEPT     all  --  *      eth0    200.40.228.64/28
0.0.0.0/0
    0     0 DROP       all  --  eth0   *       0.0.0.0/0
0.0.0.0/0          state INVALID,NEW

Chain OUTPUT (policy ACCEPT 15124 packets, 2119K bytes)
 pkts bytes target     prot opt in     out     source
destination

Chain badflags (0 references)
 pkts bytes target     prot opt in     out     source
destination
    0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0

Chain dropwall (1 references)
 pkts bytes target     prot opt in     out     source
destination
 1754  143K DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0

Chain firewall (0 references)
 pkts bytes target     prot opt in     out     source
destination
    0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0
[root@omega root]# /sbin/iptables -t nat -L -v -n
Chain PREROUTING (policy ACCEPT 2113 packets, 165K bytes)
 pkts bytes target     prot opt in     out     source
destination
    0     0 DNAT       all  --  eth0   *       200.40.228.70
0.0.0.0/0          to:192.168.1.210

Chain POSTROUTING (policy ACCEPT 2843 packets, 216K bytes)
 pkts bytes target     prot opt in     out     source
destination
    0     0 SNAT       all  --  *      eth0    192.168.1.210
0.0.0.0/0          to:200.40.228.70
  207 12353 SNAT       all  --  *      *       192.168.1.0/24
0.0.0.0/0          to:200.40.228.66

Chain OUTPUT (policy ACCEPT 2844 packets, 217K bytes)
 pkts bytes target     prot opt in     out     source
destination
[root@omega root]#

> 
> 
> 
> -- 
> Psyche-list mailing list
> Psyche-list@redhat.com
> https://listman.redhat.com/mailman/listinfo/psyche-list
---end quoted text---

-- 

Pablo Allietti

LACNIC 

Registro de Direcciones de Internet para America Latina y el Caribe
Registro de Enderecamento de Internet para America Latina e Caribe
Latin American and Caribbean Internet Addresses Registry

Potosi 1517 Montevideo - Uruguay
Tel. +598 2 6015846 // 6062822 Fax: 6015599



-- 
Psyche-list mailing list
Psyche-list@redhat.com
https://listman.redhat.com/mailman/listinfo/psyche-list

[Index of Archives]     [Fedora General Discussion]     [Red Hat General Discussion]     [Centos]     [Kernel]     [Red Hat Install]     [Red Hat Watch]     [Red Hat Development]     [Red Hat 9]     [Gimp]     [Yosemite News]

  Powered by Linux