Search squid archive

Re: IP Address routing through IP Tables

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I am unable to connect. Would appreciate if you guide me here. Thank you in advance.

Sarfraz


----- Original Message -----
From: Eliezer Croitoru <eliezer@xxxxxxxxxxxx>
To: "squid-users@xxxxxxxxxxxxxxx" <squid-users@xxxxxxxxxxxxxxx>
Cc: ***some text missing*** <shozii1@xxxxxxxxx>
Sent: Monday, March 17, 2014 7:40 PM
Subject: Re:  IP Address routing through IP Tables

I'm at the IRC channel of the project at chat.freenode.net #squid.
I seems to me like it will be better there...
There are web clients for freenode.

Eliezer


On 17/03/2014 16:36, ***some text missing*** wrote:
> Rule # 1 require..
> My client IP address is 10.25.40.121 and want to access IP directly 115.186.92.227 on port 21 bypass squid.
>
> Rule # 2 require..
> My client IP address is 10.25.40.121 need to by pass squid for direct internet access.
>
> ************Below is my IP Tables***************
>
> -A FORWARD -j RH-Firewall-1-INPUT
> -A RH-Firewall-1-INPUT -i lo -j ACCEPT
> #-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT
> -A RH-Firewall-1-INPUT -s 10.1.12.250 -p ICMP --icmp-type
> any -j ACCEPT
> -A RH-Firewall-1-INPUT -s 10.25.23.103 -p ICMP --icmp-type
> any -j ACCEPT
> -A RH-Firewall-1-INPUT -s 10.1.40.25 -p ICMP --icmp-type any
> -j ACCEPT
> -A RH-Firewall-1-INPUT -s 10.1.40.11 -p ICMP --icmp-type any
> -j ACCEPT
> -A RH-Firewall-1-INPUT -s 10.25.40.121 -p ICMP --icmp-type
> any -j ACCEPT
> -A RH-Firewall-1-INPUT -s 10.1.42.63 -p ICMP --icmp-type any
> -j ACCEPT
> -A RH-Firewall-1-INPUT -s 10.1.82.0/24 -p ICMP --icmp-type
> any -j ACCEPT
> -A RH-Firewall-1-INPUT -s 10.25.88.0/24 -p ICMP --icmp-type
> any -j ACCEPT
> -A RH-Firewall-1-INPUT -s 10.0.101.50 -p ICMP --icmp-type
> any -j ACCEPT
> -A RH-Firewall-1-INPUT -s 10.0.101.51 -p ICMP --icmp-type any
> -j ACCEPT
> -A RH-Firewall-1-INPUT -s 10.0.101.52 -p ICMP --icmp-type
> any -j ACCEPT
> -A RH-Firewall-1-INPUT -s 10.0.101.53 -p ICMP --icmp-type
> any -j ACCEPT
> -A RH-Firewall-1-INPUT -s 10.0.101.55 -p ICMP --icmp-type
> any -j ACCEPT
> -A RH-Firewall-1-INPUT -p ICMP --icmp-type any -j DROP
> #-A RH-Firewall-1-INPUT -p 50 -j ACCEPT
> #-A RH-Firewall-1-INPUT -p 51 -j ACCEPT
> -A RH-Firewall-1-INPUT -p udp --dport 5353 -d 224.0.0.251 -j
> ACCEPT
> -A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT
> -A RH-Firewall-1-INPUT -p tcp -m tcp --dport 631 -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED
> -j ACCEPT
> #-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp
> --dport 22 -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp -s
> 10.1.12.250 --dport 22 -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp -s
> 10.1.40.25 --dport 22 -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp -s
> 10.25.40.31 --dport 22 -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp -s
> 10.1.40.11 --dport 22 -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp -s
> 10.1.42.63 --dport 22 -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp -s
> 10.1.42.55 --dport 22 -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp -s
> 10.25.40.121 --dport 22 -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp -s
> 10.25.88.0/24 --dport 22 -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp
> --dport 22 -j DROP
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp
> --dport 80 -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp
> --dport 8080 -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp
> --dport 8080 -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp
> --dport 161 -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp
> --dport 161 -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp
> --dport 162 -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp
> --dport 162 -j ACCEPT
>
> -A INPUT -p tcp --sport 21 -m state --state ESTABLISHED -j
> ACCEPT
> -A INPUT -p tcp --sport 20 -m state --state
> ESTABLISHED,RELATED -j ACCEPT
> -A INPUT -p tcp --sport 1024: --dport 1024: -m state --state
> ESTABLISHED -j ACCEPT
> -A OUTPUT -p tcp --dport 21 -m state --state NEW,ESTABLISHED
> -j ACCEPT
> -A OUTPUT -p tcp --dport 20 -m state --state ESTABLISHED -j
> ACCEPT
> -A OUTPUT -p tcp --sport 1024: --dport 1024: -m state
> --state ESTABLISHED,RELATED,NEW -j ACCEPT
>
> -A RH-Firewall-1-INPUT -j REJECT --reject-with
> icmp-host-prohibited
> COMMIT
>
>
> Regards,
> Sarfraz
>
>
>
> ----- Original Message -----
> From: Eliezer Croitoru<eliezer@xxxxxxxxxxxx>
> To:"squid-users@xxxxxxxxxxxxxxx"  <squid-users@xxxxxxxxxxxxxxx>
> Cc:shozii1@xxxxxxxxx
> Sent: Monday, March 17, 2014 7:22 PM
> Subject: Re:  IP Address routing through IP Tables
>
> You can add a rule to the iptables with "-j ACCEPT" at the begining of
> the mangle table and it will forward this IP address with no interception..
> If you have iptables rules and IP I can write to you some rule.
>
> Eliezer
>
>
> On 17/03/2014 16:17, ***some text missing*** wrote:
>> >Thank you for your reply.
>> >
>> >Please guide me with IP Tables rule. Thank you in advance.
>> >
>> >Regards,
>> >Sarfraz





[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux