|
发表于 2005-6-27 19:54:02
|
显示全部楼层
老菜鸟的经验
我用RH9.0,为了测试linux的iptables,安装了vmware4.5,跑win2000pro。vmware使用host-only模式。
我是用有线通宽带,有线通使用DHCP协议,一段时间内(DHCP租期)IP固定。既eth0的IP为221.137.208.84。
vmware会虚拟一个网卡vmnet1,接内网
内网192.168.23.0/24 ,网关linux(vmnet1):192.168.23.1 ,客户机win2000:192.168.23.22 。
(偶太穷啦,实在没钱买一台二手的PC,只好用vmware虚拟局域网 )
以下是我的iptables脚本文件
# Turn on IP forwarding
echo "1" >/proc/sys/net/ipv4/ip_forward
# Disable response to broadcasts.
echo "1" > /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts
# Load connection-tracking modules and NAT modules
/sbin/depmod -a
/sbin/modprobe ip_conntrack
/sbin/modprobe ip_conntrack_ftp
/sbin/modprobe iptable_nat
/sbin/modprobe ip_nat_ftp
# Clean old iptables rules
iptables -F -t filter
iptables -F -t nat
#Do NAT
iptables -t nat -A PREROUTING -d 221.137.208.84 -j DNAT --to-destination 192.168.23.22
iptables -t nat -A POSTROUTING -s 192.168.23.22 -j SNAT --to-source 221.137.208.84
#Forward chain Rules
# Default forward policy to ACCEPT
iptables -t filter -P FORWARD ACCEPT
# Make sure that new TCP connections from outside are all droped
iptables -A FORWARD -s 0/0 -d 192.168.23.22 -p tcp --syn -j DROP
#state conntrack
iptables -A FORWARD -s 0/0 -d 192.168.23.22 -p tcp -m state --state INVALID,NEW -j DROP
iptables -A FORWARD -s 0/0 -d 192.168.23.22 -p udp -m state --state INVALId,NEW -j DROP
# INPUT chain Rules
iptables -A INPUT -p tcp --destination-port 6000:6010 -j DROP
iptables -A INPUT -p tcp --destination-port 139 -j DROP ! -i vmnet1
iptables -A INPUT -p tcp --destination-port 7070 -j DROP ! -i vmnet1
iptables -A INPUT -p tcp --destination-port 8080 -j DROP ! -i vmnet1
iptables -A INPUT -p tcp --destination-port 9090 -j DROP ! -i vmnet1
iptables -A INPUT -p tcp --destination-port 10903 -j DROP ! -i vmnet1
iptables -A INPUT -p icmp -j DROP -f |
|