SHARE
TWEET
Untitled
a guest
Oct 20th, 2012
331
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
- modem (192.168.25.1)---- eth0(192.168.25.100)<-->eth1(10.1.1.1)-----router(192.168.0.1)----maquinas
- #### Ativa Modulos
- /sbin/modprobe ip_conntrack
- /sbin/modprobe ip_conntrack_ftp
- /sbin/modprobe ip_nat_ftp
- /sbin/modprobe ipt_LOG
- /sbin/modprobe ip_conntrack_irc ports=6666,6667,6668,8001
- #### Limpa tabelas e configura defaults
- iptables -F -t filter
- iptables -F -t nat
- iptables -F -t mangle
- ## Delete chains nao defaults
- iptables -X
- iptables -X -t nat
- iptables -X -t mangle
- iptables -P INPUT DROP -t filter
- iptables -P OUTPUT ACCEPT -t filter
- iptables -P FORWARD DROP -t filter
- iptables -A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
- # Libera acesso ao ICMP (Ping) nas interfaces LAN e WAN
- iptables -A INPUT -i eth0 -p icmp -j ACCEPT
- iptables -A INPUT -i eth1 -p icmp -j ACCEPT
- # Libera SSH na porta 22
- iptables -I INPUT -i eth1 -p tcp -s 0/0 --dport 22 -j ACCEPT
- iptables -I INPUT -i eth0 -p tcp -s 0/0 --dport 22 -j ACCEPT
- # Libera IRC na porta 8001 nas interfaces LAN e WAN
- iptables -I INPUT -i eth1 -p udp -s 0/0 --dport 8001 -j ACCEPT
- iptables -I INPUT -i eth0 -p udp -s 0/0 --dport 8001 -j ACCEPT
- ### Aceitar conexões IRC (porta 6667 a 6669)
- iptables -A INPUT -p tcp --destination-port 6667:6669 -j ACCEPT
- iptables -A INPUT -p tcp --destination-port 8001 -j ACCEPT
- iptables -A INPUT -i eth1 -p tcp --dport 6588 -j ACCEPT
- iptables -A INPUT -i eth1 -p tcp --dport 3130 -j ACCEPT
- # Libera HTTP e HTTPs para o firewall da rede interna
- iptables -I INPUT -i eth1 -p tcp -s 0/0 --dport 80 -j ACCEPT
- iptables -I INPUT -i eth1 -p tcp -s 0/0 --dport 443 -j ACCEPT
- # Libera DNS (rede interna para externa)
- iptables -I INPUT -i eth1 -p udp -s 0/0 --dport 53 -j ACCEPT
- # Libera acesso ao proxy (rede interna)
- iptables -I INPUT -i eth1 -p tcp -s 0/0 --dport 3128 -j ACCEPT
- # Mantem o estado das conexoes da interface de loopback
- iptables -I INPUT -s 127.0.0.1 -m state --state RELATED,ESTABLISHED -j ACCEPT
- iptables -I OUTPUT -s 127.0.0.1 -m state --state RELATED,ESTABLISHED -j ACCEPT
- # Libera acesso do proprio servidor para servicos locais
- iptables -I INPUT -p tcp -s 127.0.0.1 -d 127.0.0.1 --dport 22 -j ACCEPT
- iptables -A INPUT -p tcp -s 127.0.0.1 -d 127.0.0.1 --dport 25 -j ACCEPT
- iptables -I INPUT -p tcp -s 127.0.0.1 -d 127.0.0.1 --dport 53 -j ACCEPT
- iptables -I INPUT -p tcp -s 127.0.0.1 -d 127.0.0.1 --dport 80 -j ACCEPT
- iptables -I INPUT -p tcp -s 127.0.0.1 -d 127.0.0.1 --dport 110 -j ACCEPT
- iptables -A INPUT -p tcp -s 127.0.0.1 -d 127.0.0.1 --dport 443 -j ACCEPT
- iptables -A INPUT -p tcp -s 127.0.0.1 -d 127.0.0.1 --dport 8001 -j ACCEPT
- iptables -I INPUT -p tcp -s 127.0.0.1 -d 127.0.0.1 --dport 3128 -j ACCEPT
- iptables -I INPUT -p tcp -s 127.0.0.1 -d 127.0.0.1 -j ACCEPT
- iptables -I INPUT -p udp -s 127.0.0.1 -d 127.0.0.1 -j ACCEPT
- # Ativa mascaramento (rede interna para o IP da WAN)
- iptables -A POSTROUTING -t nat -o eth0 -s 10.1.1.0/24 -j MASQUERADE
- # para manter as conexoes existentes com o proprio servidor (entrada)
- iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
- # para manter as conexoes existentes com o proprio servidor (saida)
- iptables -A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
- # Libera a resolucao de DNS no servidor local
- iptables -I INPUT -i eth1 -p udp -s 10.1.1.0/24 -d 0/0 --dport 53 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
- # Redireciona os acessos a porta 80 para o SQUID local (proxy transparente)
- # Libera do proxy transparente esta faixa
- iptables -t nat -A PREROUTING -i eth1 -p tcp -s 0/0 -d 10.1.1.0/24 -j ACCEPT
- # Redireciona os acessos da porta 80 para a porta 3128 (SQUID)
- iptables -t nat -A PREROUTING -i eth1 -p tcp -s 10.1.1.0/24 --dport 80 -j REDIRECT --to-port 3128
- ### Liberacoes (rede interna para fora)
- # SSH
- iptables -A FORWARD -i eth1 -p tcp -s 10.1.1.0/24 -d 0/0 --dport 22 -j ACCEPT
- # ICMP
- iptables -A FORWARD -i eth1 -p icmp -s 10.1.1.0/24 -d 0/0 -j ACCEPT
- # DNS
- iptables -A FORWARD -i eth1 -p udp -s 10.1.1.0/24 -d 0/0 --dport 53 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
- # Redireciona portas
- #Terminal Service - RDP
- #iptables -A FORWARD -i eth0 -d 10.1.1.253/32 -j ACCEPT
- #iptables -A PREROUTING -t nat -p tcp -d 192.168.25.254 --dport 3389 -j DNAT --to 10.1.1.253:3389
- #VNC
- #iptables -A FORWARD -i eth0 -d 10.1.1.252/32 -j ACCEPT
- #iptables -A PREROUTING -t nat -p tcp -d 192.168.25.254 --dport 5900 -j DNAT --to 10.1.1.252:5900
- #DVR
- #iptables -A FORWARD -i eth0 -d 10.1.1.251/32 -j ACCEPT
- #iptables -A PREROUTING -t nat -p tcp -d 192.168.25.254 --dport 8880 -j DNAT --to 10.1.1.251:80
- #iptables -A PREROUTING -t nat -p tcp -d 192.168.25.254 --dport 37777 -j DNAT --to 10.1.1.251:37777
- #BD - Postgresql
- #iptables -A FORWARD -i eth0 -d 10.1.1.250/32 -j ACCEPT
- #iptables -A PREROUTING -t nat -p tcp -d 192.168.25.254 --dport 5531 -j DNAT --to 10.1.1.250:5432
- #FTP Server
- iptables -A FORWARD -i eth0 -d 10.1.1.249/32 -j ACCEPT
- iptables -A PREROUTING -t nat -p tcp -d 192.168.25.254 --dport 221 -j DNAT --to 10.1.1.249:21
- #Fim do script
RAW Paste Data

