Хотите сделать посильный вклад в развитие Ubuntu и русскоязычного сообщества? Помогите нам с документацией!
0 Пользователей и 1 Гость просматривают эту тему.
# Generated by iptables-save v1.4.2 on Wed Oct 6 13:57:18 2010*raw:PREROUTING ACCEPT [0:0]:OUTPUT ACCEPT [0:0]COMMIT# Completed on Wed Oct 6 13:57:18 2010# Generated by iptables-save v1.4.2 on Wed Oct 6 13:57:18 2010*mangle:PREROUTING ACCEPT [0:0]:INPUT ACCEPT [0:0]:FORWARD ACCEPT [0:0]:OUTPUT ACCEPT [0:0]:POSTROUTING ACCEPT [0:0]-A FORWARD -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtuCOMMIT# Completed on Wed Oct 6 13:57:18 2010# Generated by iptables-save v1.4.2 on Wed Oct 6 13:57:18 2010*nat:PREROUTING ACCEPT [0:0]:POSTROUTING ACCEPT [0:0]:OUTPUT ACCEPT [0:0]-A PREROUTING -i eth1 -p tcp -m tcp --dport 3389 -j DNAT --to-destination 192.168.1.1#-A POSTROUTING -s 192.168.1.0/24 -o eth1 -j MASQUERADE-A POSTROUTING -s 192.168.1.0/24 -o eth1 -j SNAT --to-source 95.143.210.198COMMIT# Completed on Wed Oct 6 13:57:18 2010# Generated by iptables-save v1.4.2 on Wed Oct 6 13:57:18 2010*filter:INPUT ACCEPT [0:0]:FORWARD ACCEPT [0:0]:OUTPUT ACCEPT [0:0]-A INPUT -m state --state INVALID -j DROP-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT-A FORWARD -i eth0 -m conntrack --ctstate NEW -j ACCEPT-A FORWARD -m conntrack --ctstate DNAT -j ACCEPTCOMMIT# Completed on Wed Oct 6 13:57:18 2010
Всё правильно было. Пакеты должны уходить на 192.168.1.1А на самом узле 192.168.1.1 шлюз по умолчанию прописан 192.168.1.2?
ТС, чтобы сузить поле поиска, можно посмотреть, уходят ли пакеты на 192.168.1.1:3389 с помощью sudo tcpdump -ni eth0 host 192.168.1.1 and tcp port 3389
tcpdump: verbose output suppressed, use -v or -vv for full protocol decodelistening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes14:15:16.958766 IP 95.143.210.197.63658 > 192.168.1.1.3389: Flags [S], seq 3702256057, win 65535, options [mss 1456,nop,nop,sackOK], length 014:15:19.945815 IP 95.143.210.197.63658 > 192.168.1.1.3389: Flags [S], seq 3702256057, win 65535, options [mss 1456,nop,nop,sackOK], length 014:15:25.980243 IP 95.143.210.197.63658 > 192.168.1.1.3389: Flags [S], seq 3702256057, win 65535, options [mss 1456,nop,nop,sackOK], length 0
Только скажите по каким тут параметрам вы понимаете прошли пакеты или нет
# Generated by iptables-save v1.4.2 on Wed Oct 6 13:57:18 2010*raw:PREROUTING ACCEPT [0:0]:OUTPUT ACCEPT [0:0]COMMIT# Completed on Wed Oct 6 13:57:18 2010# Generated by iptables-save v1.4.2 on Wed Oct 6 13:57:18 2010*mangle:PREROUTING ACCEPT [0:0]:INPUT ACCEPT [0:0]:FORWARD ACCEPT [0:0]:OUTPUT ACCEPT [0:0]:POSTROUTING ACCEPT [0:0]-A FORWARD -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtuCOMMIT# Completed on Wed Oct 6 13:57:18 2010# Generated by iptables-save v1.4.2 on Wed Oct 6 13:57:18 2010*nat:PREROUTING ACCEPT [0:0]:POSTROUTING ACCEPT [0:0]:OUTPUT ACCEPT [0:0]-A PREROUTING -i eth1 -p tcp -m tcp --dport 3389 -j DNAT --to-destination 192.168.1.1#-A POSTROUTING -s 192.168.1.0/24 -o eth1 -j MASQUERADE-A POSTROUTING -s 192.168.1.0/24 -o eth1 -j SNAT --to-source 95.143.210.198COMMIT# Completed on Wed Oct 6 13:57:18 2010# Generated by iptables-save v1.4.2 on Wed Oct 6 13:57:18 2010*filter:INPUT ACCEPT [0:0]:FORWARD DROP [0:0]:OUTPUT ACCEPT [0:0]-A INPUT -m state --state INVALID -j DROP-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT-A FORWARD -i eth0 -m conntrack --ctstate NEW -j ACCEPT-A FORWARD -m conntrack --ctstate DNAT -j ACCEPTCOMMIT# Completed on Wed Oct 6 13:57:18 2010
на 192.168.1.1>route add 95.143.210.197 mask 255.255.255.255 192.168.1.2??
route add 95.143.210.197 mask 255.255.255.255 192.168.1.2 -p
Страница сгенерирована за 0.031 секунд. Запросов: 25.