Advertisement
flycat

Firewall/iptables

Mar 22nd, 2017 (edited)
220
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 0.80 KB | None | 0 0
  1. # close for user:
  2. iptables -A OUTPUT -d ${HOST} -p tcp -m multiport --dport ${PORTS} -m owner --uid-owner $USER -j ACCEPT
  3. iptables -A OUTPUT -m owner --uid-owner $USER -j REJECT >/dev/null
  4.  
  5. # log for user:
  6. iptables -A OUTPUT -m state --state NEW -m owner --uid-owner ${USER} -j LOG --log-prefix 'SSH_USER_${USER}: '
  7.  
  8. # NAT (for VPN etc)
  9. iptables -t nat -A POSTROUTING -o venet0 -j MASQUERADE
  10.  
  11. # Forward from 1.1.1.1 to destination 2.2.2.2
  12. net.ipv4.ip_forward=1
  13. iptables -A FORWARD -d 2.2.2.2 -i eth0 -p tcp -m tcp --dport 3389 -j ACCEPT
  14. iptables -t nat -A PREROUTING -d 1.1.1.1 -p tcp -m tcp --dport 3389 -j DNAT --to-destination 2.2.2.2
  15. iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
  16.  
  17. # list table with line numbers:
  18. iptables -nvL INPUT  --line-numbers
  19. # delete rule #5:
  20. iptables -D INPUT 5
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement