我的LINUX三层防火墙
作者 佚名技术
来源 Linux系统
浏览
发布时间 2012-04-28
[root@llpwfirewall ~]# cat /etc/sysconfig/iptables # Generated by iptables-save v<?xml:namespace prefix = st1 ns = "urn:schemas-microsoft-com:office:smarttags" /> *nat :PREROUTING ACCEPT [10936:947290] :POSTROUTING ACCEPT [2049:153967] :OUTPUT ACCEPT [1577:124636] -A PREROUTING -s 172.20.1.0/255.255.255.0 -i eth0 -p tcp -m tcp --dport 80 -j REDIRECT --to-ports 3128 -A PREROUTING -s 192.168.1.0/255.255.255.0 -p tcp -m tcp --dport 80 -j REDIRECT --to-ports 3128 -A PREROUTING -s 192.168.1.0/255.255.255.0 -d 192.168.1.100 -p tcp -m tcp --dport 2022 -j DNAT --to-destination 172.20.1.225:22 -A PREROUTING -d 62.50.143.110 -p tcp -m tcp --dport 80 -j DNAT --to-destination 192.168.1.35:80 -A PREROUTING -d 66.50.143.110 -p tcp -m tcp --dport 7890 -j DNAT --to-destination 192.168.1.35:7890 -A PREROUTING -d 66.50.143.110 -p udp -m udp --dport 80 -j DNAT --to-destination 192.168.1.35:80 -A PREROUTING -d 66.50.143.110 -p udp -m udp --dport 7890 -j DNAT --to-destination 192.168.1.35:7890 -A PREROUTING -d 66.50.143.110 -p tcp -m tcp --dport 51521 -j DNAT --to-destination 192.168.1.136 -A PREROUTING -p tcp -m tcp --dport 53389 -j DNAT --to-destination 172.20.1.58:3389 -A PREROUTING -p tcp -m tcp --dport 51158 -j DNAT --to-destination 192.168.1.215:1158 -A PREROUTING -s 123.118.13.78 -d 66.50.143.110 -p tcp -m tcp --dport 1158 -j DNAT --to-destination 192.168.1.215:1158 -A POSTROUTING -s 172.20.1.0/255.255.255.0 -o eth1 -j SNAT --to-source 66.50.143.110 -A POSTROUTING -s 172.20.1.0/255.255.255.0 -o eth1 -j SNAT --to-source 192.168.1.50 -A POSTROUTING -s 192.168.1.95 -o eth1 -j SNAT --to-source 66.50.143.110 -A POSTROUTING -s 192.168.1.35 -o eth1 -j SNAT --to-source 666.50.143.110
-A POSTROUTING -s 192.168.1.0/255.255.255.0 -d 61.135.175.37 -j SNAT --to-source 666.50.143.110 -A POSTROUTING -s 192.168.1.0 -d 61.135.175.32/255.255.255.248 -o eth1 -j SNAT --to-source 666.50.143.110 -A POSTROUTING -s 192.168.1.136 -d 61.135.175.32/255.255.255.248 -o eth1 -j SNAT --to-source 666.50.143.110 -A POSTROUTING -s 192.168.1.136 -d 221.176.6.97 -o eth1 -j SNAT --to-source 666.50.143.110 -A POSTROUTING -s 192.168.1.0/255.255.255.0 -o eth1 -p udp -m udp --dport 161:162 -j SNAT --to-source 666.50.143.110 -A POSTROUTING -s 192.168.1.0/255.255.255.0 -o eth1 -p udp -m udp --dport 1194 -j SNAT --to-source 666.50.143.110 -A POSTROUTING -s 192.168.1.136 -d 221.176.6.96 -o eth1 -j SNAT --to-source 666.50.143.110 -A POSTROUTING -s 192.168.1.136 -o eth1 -p tcp -m tcp --dport 25 -j SNAT --to-source 666.50.143.110 -A POSTROUTING -s 192.168.1.215 -d 221.176.6.96 -o eth1 -j SNAT --to-source 666.50.143.110 -A POSTROUTING -s 192.168.1.216 -d 221.176.6.96 -o eth1 -j SNAT --to-source 666.50.143.110 COMMIT # Completed on Sun Nov 22 16:17:23 2009 # Generated by iptables-save v1.2.11 on Sun Nov 22 16:17:23 2009 *filter :INPUT ACCEPT [0:0] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [136518:119049641] :RH-Firewall-1-INPUT - [0:0] -A INPUT -j RH-Firewall-1-INPUT -A FORWARD -s 172.20.1.0/255.255.255.0 -o eth1 -p udp -m multiport --dports 161,162,1194,8000 -j ACCEPT -A FORWARD -s 172.20.1.0/255.255.255.0 -o eth1 -p udp -m limit --limit 60/sec --limit-burst 80 -j ACCEPT -A FORWARD -s 172.20.1.0/255.255.255.0 -o eth1 -p udp -j DROP -A FORWARD -i eth1 -p icmp -m icmp --icmp-type 8 -j DROP -A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT -A FORWARD -j RH-Firewall-1-INPUT -A RH-Firewall-1-INPUT -p tcp -m tcp --dport 9922 -j ACCEPT -A RH-Firewall-1-INPUT -i eth1 -p icmp -m icmp --icmp-type 8 -j DROP -A RH-Firewall-1-INPUT -m mac --mac-source 00:23:54:D0:E4:
-A RH-Firewall-1-INPUT -d 192.168.1.100 -p udp -m udp --dport 67 -j DROP -A RH-Firewall-1-INPUT -p udp -m udp --dport 1004 -j DROP -A RH-Firewall-1-INPUT -p udp -m udp --dport 8093 -j DROP -A RH-Firewall-1-INPUT -i lo -j ACCEPT -A RH-Firewall-1-INPUT -i eth0 -j ACCEPT -A RH-Firewall-1-INPUT -p icmp -m icmp --icmp-type any -j ACCEPT -A RH-Firewall-1-INPUT -p ipv6-crypt -j ACCEPT -A RH-Firewall-1-INPUT -p ipv6-auth -j ACCEPT -A RH-Firewall-1-INPUT -d 224.0.0.251 -p udp -m udp --dport 5353 -j ACCEPT -A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT -A RH-Firewall-1-INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 23 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 80 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 21 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 20 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 25 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 53 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 110 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 443 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 445 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 993 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 1433 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 1025 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 1194 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 1918 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 1521 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 2022 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 3306 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 3389 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 8899 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 7890 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 3000 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 3344 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 3128 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 8000 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 8080 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 9160 -j ACCEPT -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 50000:60000 -j ACCEPT -A RH-Firewall-1-INPUT -p udp -m udp --dport 53 -j ACCEPT -A RH-Firewall-1-INPUT -p udp -m udp --dport 67 -j ACCEPT -A RH-Firewall-1-INPUT -p udp -m udp --dport 80 -j ACCEPT -A RH-Firewall-1-INPUT -p udp -m udp --dport 111 -j ACCEPT -A RH-Firewall-1-INPUT -p udp -m udp --dport 123 -j ACCEPT -A RH-Firewall-1-INPUT -p udp -m udp --dport 137 -j ACCEPT -A RH-Firewall-1-INPUT -p udp -m udp --dport 139 -j ACCEPT -A RH-Firewall-1-INPUT -p udp -m udp --dport 161 -j ACCEPT -A RH-Firewall-1-INPUT -p udp -m udp --dport 162 -j ACCEPT -A RH-Firewall-1-INPUT -p udp -m udp --dport 1194 -j ACCEPT -A RH-Firewall-1-INPUT -p udp -m udp --dport 4000 -j ACCEPT -A RH-Firewall-1-INPUT -p udp -m udp --dport 7890 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 8000 -j ACCEPT -A RH-Firewall-1-INPUT -s 192.168.5.0 -j ACCEPT -A RH-Firewall-1-INPUT -d 192.168.1.0/255.255.255.0 -j ACCEPT -A RH-Firewall-1-INPUT -d 192.168.1.50 -j ACCEPT -A RH-Firewall-1-INPUT -d 192.168.1.35 -j ACCEPT -A RH-Firewall-1-INPUT -j LOG --log-prefix "llog " -A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited COMMIT # Completed on Sun Nov 22 16:17:23 2009
|
|||||
凌众科技专业提供服务器租用、服务器托管、企业邮局、虚拟主机等服务,公司网站:http://www.lingzhong.cn 为了给广大客户了解更多的技术信息,本技术文章收集来源于网络,凌众科技尊重文章作者的版权,如果有涉及你的版权有必要删除你的文章,请和我们联系。以上信息与文章正文是不可分割的一部分,如果您要转载本文章,请保留以上信息,谢谢! |
你可能对下面的文章感兴趣
上一篇: Linux 查看硬件信息下一篇: Linux下Unicode的使用
关于我的LINUX三层防火墙的所有评论