Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # Generated by iptables-save v1.4.21 on Thu Jun 12 08:20:04 2014
- *nat
- :PREROUTING ACCEPT [9:1105]
- :INPUT ACCEPT [8:1065]
- :OUTPUT ACCEPT [0:0]
- :POSTROUTING ACCEPT [0:0]
- :AS0_NAT - [0:0]
- :AS0_NAT_POST_REL_EST - [0:0]
- :AS0_NAT_PRE - [0:0]
- :AS0_NAT_PRE_REL_EST - [0:0]
- :AS0_NAT_TEST - [0:0]
- -A PREROUTING -m state --state RELATED,ESTABLISHED -j AS0_NAT_PRE_REL_EST
- -A POSTROUTING -m state --state RELATED,ESTABLISHED -j AS0_NAT_POST_REL_EST
- -A POSTROUTING -m mark --mark 0x2000000/0x2000000 -j AS0_NAT_PRE
- -A POSTROUTING -j SNAT --to-source 188.226.212.189
- -A POSTROUTING -j SNAT --to-source 188.226.212.189
- -A POSTROUTING -j SNAT --to-source 188.226.212.189
- -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE
- -A POSTROUTING -o eth0 -j MASQUERADE
- -A POSTROUTING -o ppp0 -j MASQUERADE
- -A AS0_NAT -o eth0 -j SNAT --to-source 188.226.212.189
- -A AS0_NAT -o eth1 -j SNAT --to-source 10.129.189.133
- -A AS0_NAT -j ACCEPT
- -A AS0_NAT_POST_REL_EST -j ACCEPT
- -A AS0_NAT_PRE -m mark --mark 0x8000000/0x8000000 -j AS0_NAT
- -A AS0_NAT_PRE -d 192.168.0.0/16 -j AS0_NAT_TEST
- -A AS0_NAT_PRE -d 172.16.0.0/12 -j AS0_NAT_TEST
- -A AS0_NAT_PRE -d 10.0.0.0/8 -j AS0_NAT_TEST
- -A AS0_NAT_PRE -j AS0_NAT
- -A AS0_NAT_PRE_REL_EST -j ACCEPT
- -A AS0_NAT_TEST -o as0t+ -j ACCEPT
- -A AS0_NAT_TEST -m mark --mark 0x4000000/0x4000000 -j ACCEPT
- -A AS0_NAT_TEST -d 10.0.0.0/20 -j ACCEPT
- -A AS0_NAT_TEST -d 172.27.224.0/20 -j ACCEPT
- -A AS0_NAT_TEST -j AS0_NAT
- COMMIT
- # Completed on Thu Jun 12 08:20:04 2014
- # Generated by iptables-save v1.4.21 on Thu Jun 12 08:20:04 2014
- *filter
- :INPUT DROP [1:40]
- :FORWARD DROP [0:0]
- :OUTPUT ACCEPT [0:0]
- :AS0_ACCEPT - [0:0]
- :AS0_IN - [0:0]
- :AS0_IN_NAT - [0:0]
- :AS0_IN_POST - [0:0]
- :AS0_IN_PRE - [0:0]
- :AS0_IN_ROUTE - [0:0]
- :AS0_OUT - [0:0]
- :AS0_OUT_LOCAL - [0:0]
- :AS0_OUT_POST - [0:0]
- :AS0_OUT_S2C - [0:0]
- :AS0_WEBACCEPT - [0:0]
- :ufw-after-forward - [0:0]
- :ufw-after-input - [0:0]
- :ufw-after-logging-forward - [0:0]
- :ufw-after-logging-input - [0:0]
- :ufw-after-logging-output - [0:0]
- :ufw-after-output - [0:0]
- :ufw-before-forward - [0:0]
- :ufw-before-input - [0:0]
- :ufw-before-logging-forward - [0:0]
- :ufw-before-logging-input - [0:0]
- :ufw-before-logging-output - [0:0]
- :ufw-before-output - [0:0]
- :ufw-logging-allow - [0:0]
- :ufw-logging-deny - [0:0]
- :ufw-not-local - [0:0]
- :ufw-reject-forward - [0:0]
- :ufw-reject-input - [0:0]
- :ufw-reject-output - [0:0]
- :ufw-skip-to-policy-forward - [0:0]
- :ufw-skip-to-policy-input - [0:0]
- :ufw-skip-to-policy-output - [0:0]
- :ufw-track-forward - [0:0]
- :ufw-track-input - [0:0]
- :ufw-track-output - [0:0]
- :ufw-user-forward - [0:0]
- :ufw-user-input - [0:0]
- :ufw-user-limit - [0:0]
- :ufw-user-limit-accept - [0:0]
- :ufw-user-logging-forward - [0:0]
- :ufw-user-logging-input - [0:0]
- :ufw-user-logging-output - [0:0]
- :ufw-user-output - [0:0]
- -A INPUT -m state --state RELATED,ESTABLISHED -j AS0_ACCEPT
- -A INPUT -i lo -j AS0_ACCEPT
- -A INPUT -m mark --mark 0x2000000/0x2000000 -j AS0_IN_PRE
- -A INPUT -d 188.226.212.189/32 -p udp -m state --state NEW -m udp --dport 1194 -j AS0_ACCEPT
- -A INPUT -d 188.226.212.189/32 -p tcp -m state --state NEW -m tcp --dport 443 -j AS0_ACCEPT
- -A INPUT -s 10.0.0.0/8 -i ppp0 -j ACCEPT
- -A INPUT -m state --state RELATED,ESTABLISHED -j AS0_WEBACCEPT
- -A INPUT -d 188.226.212.189/32 -p tcp -m state --state NEW -m tcp --dport 943 -j AS0_WEBACCEPT
- -A INPUT -j ufw-before-logging-input
- -A INPUT -j ufw-before-input
- -A INPUT -j ufw-after-input
- -A INPUT -j ufw-after-logging-input
- -A INPUT -j ufw-reject-input
- -A INPUT -j ufw-track-input
- -A FORWARD -m state --state RELATED,ESTABLISHED -j AS0_ACCEPT
- -A FORWARD -m mark --mark 0x2000000/0x2000000 -j AS0_IN_PRE
- -A FORWARD -o as0t+ -j AS0_OUT_S2C
- -A FORWARD -s 10.8.0.0/24 -j ACCEPT
- -A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
- -A FORWARD -j ufw-before-logging-forward
- -A FORWARD -j ufw-before-forward
- -A FORWARD -j ufw-after-forward
- -A FORWARD -j ufw-after-logging-forward
- -A FORWARD -j ufw-reject-forward
- -A FORWARD -j ufw-track-forward
- -A FORWARD -i eth0 -j ACCEPT
- -A OUTPUT -o as0t+ -j AS0_OUT_LOCAL
- -A OUTPUT -j ufw-before-logging-output
- -A OUTPUT -j ufw-before-output
- -A OUTPUT -j ufw-after-output
- -A OUTPUT -j ufw-after-logging-output
- -A OUTPUT -j ufw-reject-output
- -A OUTPUT -j ufw-track-output
- -A AS0_ACCEPT -j ACCEPT
- -A AS0_IN -d 172.27.224.1/32 -j ACCEPT
- -A AS0_IN -j AS0_IN_POST
- -A AS0_IN_NAT -j MARK --set-xmark 0x8000000/0x8000000
- -A AS0_IN_NAT -j ACCEPT
- -A AS0_IN_POST -d 10.129.0.0/16 -j ACCEPT
- -A AS0_IN_POST -o as0t+ -j AS0_OUT
- -A AS0_IN_POST -j DROP
- -A AS0_IN_PRE -d 192.168.0.0/16 -j AS0_IN
- -A AS0_IN_PRE -d 172.16.0.0/12 -j AS0_IN
- -A AS0_IN_PRE -d 10.0.0.0/8 -j AS0_IN
- -A AS0_IN_PRE -j ACCEPT
- -A AS0_IN_ROUTE -j MARK --set-xmark 0x4000000/0x4000000
- -A AS0_IN_ROUTE -j ACCEPT
- -A AS0_OUT -j AS0_OUT_POST
- -A AS0_OUT_LOCAL -p icmp -m icmp --icmp-type 5 -j DROP
- -A AS0_OUT_LOCAL -j ACCEPT
- -A AS0_OUT_POST -m mark --mark 0x2000000/0x2000000 -j ACCEPT
- -A AS0_OUT_POST -j DROP
- -A AS0_OUT_S2C -j AS0_OUT
- -A AS0_WEBACCEPT -j ACCEPT
- -A ufw-after-input -p udp -m udp --dport 137 -j ufw-skip-to-policy-input
- -A ufw-after-input -p udp -m udp --dport 138 -j ufw-skip-to-policy-input
- -A ufw-after-input -p tcp -m tcp --dport 139 -j ufw-skip-to-policy-input
- -A ufw-after-input -p tcp -m tcp --dport 445 -j ufw-skip-to-policy-input
- -A ufw-after-input -p udp -m udp --dport 67 -j ufw-skip-to-policy-input
- -A ufw-after-input -p udp -m udp --dport 68 -j ufw-skip-to-policy-input
- -A ufw-after-input -m addrtype --dst-type BROADCAST -j ufw-skip-to-policy-input
- -A ufw-after-logging-forward -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
- -A ufw-after-logging-input -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
- -A ufw-before-forward -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
- -A ufw-before-forward -p icmp -m icmp --icmp-type 3 -j ACCEPT
- -A ufw-before-forward -p icmp -m icmp --icmp-type 4 -j ACCEPT
- -A ufw-before-forward -p icmp -m icmp --icmp-type 11 -j ACCEPT
- -A ufw-before-forward -p icmp -m icmp --icmp-type 12 -j ACCEPT
- -A ufw-before-forward -p icmp -m icmp --icmp-type 8 -j ACCEPT
- -A ufw-before-forward -j ufw-user-forward
- -A ufw-before-input -i lo -j ACCEPT
- -A ufw-before-input -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
- -A ufw-before-input -m conntrack --ctstate INVALID -j ufw-logging-deny
- -A ufw-before-input -m conntrack --ctstate INVALID -j DROP
- -A ufw-before-input -p icmp -m icmp --icmp-type 3 -j ACCEPT
- -A ufw-before-input -p icmp -m icmp --icmp-type 4 -j ACCEPT
- -A ufw-before-input -p icmp -m icmp --icmp-type 11 -j ACCEPT
- -A ufw-before-input -p icmp -m icmp --icmp-type 12 -j ACCEPT
- -A ufw-before-input -p icmp -m icmp --icmp-type 8 -j ACCEPT
- -A ufw-before-input -p udp -m udp --sport 67 --dport 68 -j ACCEPT
- -A ufw-before-input -j ufw-not-local
- -A ufw-before-input -d 224.0.0.251/32 -p udp -m udp --dport 5353 -j ACCEPT
- -A ufw-before-input -d 239.255.255.250/32 -p udp -m udp --dport 1900 -j ACCEPT
- -A ufw-before-input -j ufw-user-input
- -A ufw-before-output -o lo -j ACCEPT
- -A ufw-before-output -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
- -A ufw-before-output -j ufw-user-output
- -A ufw-logging-allow -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW ALLOW] "
- -A ufw-logging-deny -m conntrack --ctstate INVALID -m limit --limit 3/min --limit-burst 10 -j RETURN
- -A ufw-logging-deny -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
- -A ufw-not-local -m addrtype --dst-type LOCAL -j RETURN
- -A ufw-not-local -m addrtype --dst-type MULTICAST -j RETURN
- -A ufw-not-local -m addrtype --dst-type BROADCAST -j RETURN
- -A ufw-not-local -m limit --limit 3/min --limit-burst 10 -j ufw-logging-deny
- -A ufw-not-local -j DROP
- -A ufw-skip-to-policy-forward -j DROP
- -A ufw-skip-to-policy-input -j DROP
- -A ufw-skip-to-policy-output -j ACCEPT
- -A ufw-track-output -p tcp -m conntrack --ctstate NEW -j ACCEPT
- -A ufw-track-output -p udp -m conntrack --ctstate NEW -j ACCEPT
- -A ufw-user-input -p tcp -m tcp --dport 22 -j ACCEPT
- -A ufw-user-input -p udp -m udp --dport 22 -j ACCEPT
- -A ufw-user-input -p tcp -m tcp --dport 1194 -j ACCEPT
- -A ufw-user-input -p udp -m udp --dport 1194 -j ACCEPT
- -A ufw-user-input -p tcp -m tcp --dport 80 -j ACCEPT
- -A ufw-user-input -p udp -m udp --dport 80 -j ACCEPT
- -A ufw-user-limit -m limit --limit 3/min -j LOG --log-prefix "[UFW LIMIT BLOCK] "
- -A ufw-user-limit -j REJECT --reject-with icmp-port-unreachable
- -A ufw-user-limit-accept -j ACCEPT
- COMMIT
- # Completed on Thu Jun 12 08:20:04 2014
- # Generated by iptables-save v1.4.21 on Thu Jun 12 08:20:04 2014
- *mangle
- :PREROUTING ACCEPT [11:1209]
- :INPUT ACCEPT [139:14865]
- :FORWARD ACCEPT [0:0]
- :OUTPUT ACCEPT [115:111181]
- :POSTROUTING ACCEPT [115:111181]
- :AS0_MANGLE_PRE_REL_EST - [0:0]
- :AS0_MANGLE_TUN - [0:0]
- -A PREROUTING -m state --state RELATED,ESTABLISHED -j AS0_MANGLE_PRE_REL_EST
- -A PREROUTING -i as0t+ -j AS0_MANGLE_TUN
- -A AS0_MANGLE_PRE_REL_EST -j ACCEPT
- -A AS0_MANGLE_TUN -j MARK --set-xmark 0x2000000/0xffffffff
- -A AS0_MANGLE_TUN -j ACCEPT
- COMMIT
- # Completed on Thu Jun 12 08:20:04 2014
Advertisement
Add Comment
Please, Sign In to add comment