Advertisement
Guest User

iptables

a guest
Mar 5th, 2012
210
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.29 KB | None | 0 0
  1. *nat
  2. :PREROUTING ACCEPT [190:13663]
  3. :POSTROUTING ACCEPT [195:13369]
  4. :OUTPUT ACCEPT [38:2598]
  5. -A PREROUTING -i eth2 -p tcp --dport 2222 -j DNAT --to 192.168.0.6:22
  6. -A POSTROUTING -s 192.168.0.0/24 -o eth2 -j SNAT --to-source 1.2.3.33
  7. COMMIT
  8. *filter
  9. :INPUT ACCEPT [0:0]
  10. :FORWARD ACCEPT [0:0]
  11. :OUTPUT ACCEPT [498:78797]
  12. :RH-Firewall-1-INPUT - [0:0]
  13. -A INPUT -j RH-Firewall-1-INPUT
  14. -A FORWARD -o eth0 -j ACCEPT
  15. -A FORWARD -i eth0 -j ACCEPT
  16. -A FORWARD -i eth1 -j ACCEPT
  17. -A FORWARD -o eth1 -j ACCEPT
  18. -A FORWARD -o xenbr0 -j ACCEPT
  19. -A FORWARD -i xenbr0 -j ACCEPT
  20. -A FORWARD -i xenbr1 -j ACCEPT
  21. -A RH-Firewall-1-INPUT -i lo -j ACCEPT
  22. -A RH-Firewall-1-INPUT -p icmp -m icmp --icmp-type any -j ACCEPT
  23. -A RH-Firewall-1-INPUT -p esp -j ACCEPT
  24. -A RH-Firewall-1-INPUT -p ah -j ACCEPT
  25. -A RH-Firewall-1-INPUT -d 224.0.0.251 -p udp -m udp --dport 5353 -j ACCEPT
  26. -A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT
  27. -A RH-Firewall-1-INPUT -p tcp -m tcp --dport 631 -j ACCEPT
  28. -A RH-Firewall-1-INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
  29. -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT
  30. -A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 80 -j ACCEPT
  31. -A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
  32. COMMIT
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement