Advertisement
Guest User

Untitled

a guest
Mar 21st, 2018
77
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.56 KB | None | 0 0
  1. root@172275:~# cat iptables_load_v2
  2. #!/bin/bash
  3. #
  4. # declare VAR's
  5. export IPT="iptables"
  6.  
  7. #active wan interface
  8. export WAN=eth0
  9. export WAN_IP=89.223.30.17
  10.  
  11. # clean all chains iptables
  12. $IPT -F
  13. $IPT -F -t nat
  14. $IPT -F -t mangle
  15. $IPT -X
  16. $IPT -t nat -X
  17. $IPT -t mangle -X
  18.  
  19. # policy for packets not fit any of rules
  20. $IPT -P INPUT DROP
  21. $IPT -P OUTPUT DROP
  22. $IPT -P FORWARD DROP
  23.  
  24. # allow local traffic for loopback
  25. $IPT -A INPUT -i lo -j ACCEPT
  26. $IPT -A OUTPUT -o lo -j ACCEPT
  27.  
  28. # allow ICMP
  29. $IPT -A INPUT -p icmp --icmp-type echo-reply -j ACCEPT
  30. $IPT -A INPUT -p icmp --icmp-type destination-unreachable -j ACCEPT
  31. $IPT -A INPUT -p icmp --icmp-type time-exceeded -j ACCEPT
  32. $IPT -A INPUT -p icmp --icmp-type echo-request -j ACCEPT
  33.  
  34. # allow OUT connections for server itself
  35. $IPT -A OUTPUT -o $WAN -j ACCEPT
  36.  
  37. # established means the packet isn't first in connection
  38. # allow input of new and init by them
  39. $IPT -A INPUT -p all -m state --state ESTABLISHED,RELATED -j ACCEPT
  40. # allow establish new and init connections
  41. $IPT -A OUTPUT -p all -m state --state ESTABLISHED,RELATED -j ACCEPT
  42. # enable forwarding for init and daughter connections
  43. $IPT -A FORWARD -p all -m state --state ESTABLISHED,RELATED -j ACCEPT
  44.  
  45. # enable packet fragmentation | due diff MTU
  46. $IPT -I FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
  47.  
  48.  
  49. #drop all unidentified packets
  50. $IPT -A INPUT -m state --state INVALID -j DROP
  51. $IPT -A FORWARD -m state --state INVALID -j DROP
  52.  
  53.  
  54. #drops phys data flow
  55. $IPT -A INPUT -p tcp ! --syn -m state --state NEW -j DROP
  56. $IPT -A OUTPUT -p tcp ! --syn -m state --state NEW -j DROP
  57.  
  58. # ssh port
  59. $IPT -A INPUT -i $WAN -p tcp --dport 8022 -j ACCEPT
  60. # https
  61. $IPT -A INPUT -i $WAN -p tcp --dport 443 -j ACCEPT
  62. # SRCDS
  63. $IPT -A INPUT -i $WAN -p tcp --dport 27015 -j ACCEPT
  64. $IPT -A INPUT -i $WAN -p udp --dport 27015 -j ACCEPT
  65. $IPT -A INPUT -i $WAN -p udp --dport 27005 -j ACCEPT
  66. $IPT -A INPUT -i $WAN -p udp --dport 27006 -j ACCEPT
  67. $IPT -A INPUT -i $WAN -p udp --dport 27020 -j ACCEPT
  68. $IPT -A INPUT -i $WAN -p udp --dport 27021 -j ACCEPT
  69. #SRCDS revemu
  70. $IPT -A INPUT -i $WAN -p udp --dport 22015 -j ACCEPT
  71. #SRCDS PROXY
  72. $IPT -A FORWARD -m state -p udp -d 80.87.202.139 --dport 27015 --state NEW,ESTABLISHED,RELATED -j ACCEPT
  73. $IPT -t nat -A PREROUTING -p udp --dport 27015 -j DNAT --to-destination 80.87.202.139:27015
  74. #$IPT -t nat -A PREROUTING -p udp -d $WAN_IP --dport 27015 -j DNAT --to-destination 80.87.202.139:27015
  75. #$IPT -A FORWARD -i $WAN -d 80.87.202.139 -p udp --dport 27015 -j ACCEPT
  76. #$IPT -t nat -A PREROUTING -p udp -d $WAN_IP --dport 27005 -j DNAT --to-destination 80.87.202.139:27005
  77. #$IPT -A FORWARD -i $WAN -d 80.87.202.139 -p udp --dport 27005 -j ACCEPT
  78. #$IPT -t nat -A PREROUTING -p udp -d $WAN_IP --dport 27006 -j DNAT --to-destination 80.87.202.139:27006
  79. #$IPT -A FORWARD -i $WAN -d 80.87.202.139 -p udp --dport 27006 -j ACCEPT
  80. #$IPT -t nat -A PREROUTING -p udp -d $WAN_IP --dport 27020 -j DNAT --to-destination 80.87.202.139:27020
  81. #$IPT -A FORWARD -i $WAN -d 80.87.202.139 -p udp --dport 27020 -j ACCEPT
  82. #IPT -t nat -A PREROUTING -p udp -d $WAN_IP --dport 27021 -j DNAT --to-destination 80.87.202.139:27021
  83. #$IPT -A FORWARD -i $WAN -d 80.87.202.139 -p udp --dport 27021 -j ACCEPT
  84. # router test
  85. $IPT -A FORWARD -m state -p tcp -d 80.87.202.139 --dport 9022 --state NEW,ESTABLISHED,RELATED -j ACCEPT
  86. $IPT -t nat -A PREROUTING -p tcp --dport 9001 -j DNAT --to-destination 80.87.202.139:9022
  87. $IPT -t nat -A POSTROUTING -j MASQUERADE
  88. #$IPT -A INPUT -i $WAN -p tcp --dport 9090 -j ACCEPT
  89. # web
  90. $IPT -A INPUT -i $WAN -p tcp --dport 80 -j ACCEPT
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement