Уважаемые гуру прошу помощи. Есть Шлюз 2 сетевые Webmin, squid, shorewall.Есть сеть Windows 192.168.128.XX все работает хорошо инет раздается все в порядке. Но есть еще 2 подсети в которые мне надо ходить 192.168.129.ХХ (Шлюз 192.168.128.3) и 192.168.12.ХХ (шлюз 192.168.128.1). Вопрос с амого шлюза я в эти сети иду без проблем а вот с компьютера с Windows не выходит. Я уже понял что глюк гдето на shorewall т.к. при его отключении и установке всех правил в allow All все работает хорошо. но вот что и где не так понять не могу. Все iptables генерировались Shoreqwall-ом т.к. с iptables я так и не подружился нормально.
Некоторые IP заменены намерено
eth0, Net - инет
eth1, loc - Локалка
ppp0 - pptpd
fw - Сам шлюз
Interfaces
auto lo
iface lo inet loopback
auto eth0
iface eth0 inet static
address1.1.238.174
netmask 255.255.255.252
gateway 1.1.238.173
auto eth1
iface eth1 inet static
address 192.168.128.6
netmask 255.255.255.0
up ip route add 192.168.12.0/22 via 192.168.128.1
up ip route add 192.168.129.0/24 via 192.168.128.3
Iptables из iptables-save
# Generated by iptables-save v1.4.0 on Mon Jun 22 14:03:24 2009
*raw
:PREROUTING ACCEPT [51574138:20129061346]
:OUTPUT ACCEPT [16062716:6395596004]
COMMIT
# Completed on Mon Jun 22 14:03:24 2009
# Generated by iptables-save v1.4.0 on Mon Jun 22 14:03:24 2009
*nat
:PREROUTING ACCEPT [1197788:83896740]
:POSTROUTING ACCEPT [771576:47690716]
:OUTPUT ACCEPT [771355:47681252]
:eth0_masq - [0:0]
:net_dnat - [0:0]
-A PREROUTING -i eth0 -j net_dnat
-A POSTROUTING -o eth0 -j eth0_masq
-A eth0_masq -s 192.168.129.0/24 -j SNAT --to-source 1.1.238.174
-A eth0_masq -s 192.168.128.0/24 -j SNAT --to-source 1.1.238.174
-A eth0_masq -s 192.168.12.0/22 -j SNAT --to-source 1.1.238.174
-A net_dnat -s 2.1.93.162/32 -p tcp -m tcp --dport 3389 -j DNAT --to-destination 192.168.128.4:3389
COMMIT
# Completed on Mon Jun 22 14:03:24 2009
# Generated by iptables-save v1.4.0 on Mon Jun 22 14:03:24 2009
*mangle
:PREROUTING ACCEPT [51574140:20129061426]
:INPUT ACCEPT [15185772:6058473163]
:FORWARD ACCEPT [36238477:14045800479]
:OUTPUT ACCEPT [22901622:9324913112]
:POSTROUTING ACCEPT [52160323:20428034902]
:tcfor - [0:0]
:tcout - [0:0]
:tcpost - [0:0]
:tcpre - [0:0]
-A PREROUTING -j tcpre
-A FORWARD -j tcfor
-A OUTPUT -j tcout
-A POSTROUTING -j tcpost
COMMIT
# Completed on Mon Jun 22 14:03:24 2009
# Generated by iptables-save v1.4.0 on Mon Jun 22 14:03:24 2009
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT DROP [0:0]
:Drop - [0:0]
:Reject - [0:0]
:all2all - [0:0]
:dropBcast - [0:0]
:dropInvalid - [0:0]
:dropNotSyn - [0:0]
:dynamic - [0:0]
:eth0_fwd - [0:0]
:eth0_in - [0:0]
:eth0_out - [0:0]
:eth1_fwd - [0:0]
:eth1_in - [0:0]
:eth1_out - [0:0]
:fw2all - [0:0]
:fw2loc - [0:0]
:fw2net - [0:0]
:fw2rem - [0:0]
:loc2all - [0:0]
:loc2fw - [0:0]
:loc2net - [0:0]
:loc2rem - [0:0]
:logdrop - [0:0]
:logreject - [0:0]
:net2all - [0:0]
:net2fw - [0:0]
:net2loc - [0:0]
:ppp0_fwd - [0:0]
:ppp0_in - [0:0]
:ppp0_out - [0:0]
:reject - [0:0]
:rem2fw - [0:0]
:rem2loc - [0:0]
:shorewall - [0:0]
:smurfs - [0:0]
-A INPUT -i lo -j ACCEPT
-A INPUT -i eth0 -j eth0_in
-A INPUT -i eth1 -j eth1_in
-A INPUT -i ppp0 -j ppp0_in
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -j Reject
-A INPUT -j LOG --log-prefix "Shorewall:INPUT:REJECT:" --log-level 6
-A INPUT -j reject
-A FORWARD -i eth0 -j eth0_fwd
-A FORWARD -i eth1 -j eth1_fwd
-A FORWARD -i ppp0 -j ppp0_fwd
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -j Reject
-A FORWARD -j LOG --log-prefix "Shorewall:FORWARD:REJECT:" --log-level 6
-A FORWARD -j reject
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -o eth0 -j eth0_out
-A OUTPUT -o eth1 -j eth1_out
-A OUTPUT -o ppp0 -j ppp0_out
-A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -j Reject
-A OUTPUT -j LOG --log-prefix "Shorewall:OUTPUT:REJECT:" --log-level 6
-A OUTPUT -j reject
-A Drop -p tcp -m tcp --dport 113 -j reject
-A Drop -j dropBcast
-A Drop -p icmp -m icmp --icmp-type 3/4 -j ACCEPT
-A Drop -p icmp -m icmp --icmp-type 11 -j ACCEPT
-A Drop -j dropInvalid
-A Drop -p udp -m multiport --dports 135,445 -j DROP
-A Drop -p udp -m udp --dport 137:139 -j DROP
-A Drop -p udp -m udp --sport 137 --dport 1024:65535 -j DROP
-A Drop -p tcp -m multiport --dports 135,139,445 -j DROP
-A Drop -p udp -m udp --dport 1900 -j DROP
-A Drop -p tcp -j dropNotSyn
-A Drop -p udp -m udp --sport 53 -j DROP
-A Reject -p tcp -m tcp --dport 113 -j reject
-A Reject -j dropBcast
-A Reject -p icmp -m icmp --icmp-type 3/4 -j ACCEPT
-A Reject -p icmp -m icmp --icmp-type 11 -j ACCEPT
-A Reject -j dropInvalid
-A Reject -p udp -m multiport --dports 135,445 -j reject
-A Reject -p udp -m udp --dport 137:139 -j reject
-A Reject -p udp -m udp --sport 137 --dport 1024:65535 -j reject
-A Reject -p tcp -m multiport --dports 135,139,445 -j reject
-A Reject -p udp -m udp --dport 1900 -j DROP
-A Reject -p tcp -j dropNotSyn
-A Reject -p udp -m udp --sport 53 -j DROP
-A all2all -m state --state RELATED,ESTABLISHED -j ACCEPT
-A all2all -j Reject
-A all2all -j LOG --log-prefix "Shorewall:all2all:REJECT:" --log-level 6
-A all2all -j reject
-A dropBcast -m pkttype --pkt-type broadcast -j DROP
-A dropBcast -m pkttype --pkt-type multicast -j DROP
-A dropInvalid -m state --state INVALID -j DROP
-A dropNotSyn -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -j DROP
-A eth0_fwd -m state --state INVALID,NEW -j dynamic
-A eth0_fwd -o eth1 -j net2loc
-A eth0_fwd -o ppp0 -j net2all
-A eth0_in -m state --state INVALID,NEW -j dynamic
-A eth0_in -j net2fw
-A eth0_out -j fw2net
-A eth1_fwd -m state --state INVALID,NEW -j dynamic
-A eth1_fwd -o eth0 -j loc2net
-A eth1_fwd -o ppp0 -j loc2rem
-A eth1_in -m state --state INVALID,NEW -j dynamic
-A eth1_in -j loc2fw
-A eth1_out -j fw2loc
-A fw2all -m state --state RELATED,ESTABLISHED -j ACCEPT
-A fw2all -j Reject
-A fw2all -j LOG --log-prefix "Shorewall:fw2all:REJECT:" --log-level 6
-A fw2all -j reject
-A fw2loc -m state --state RELATED,ESTABLISHED -j ACCEPT
-A fw2loc -p udp -m udp --dport 53 -j ACCEPT
-A fw2loc -p tcp -m tcp --dport 53 -j ACCEPT
-A fw2loc -p icmp -j ACCEPT
-A fw2loc -j LOG --log-prefix "Shorewall:fw2loc:ACCEPT:" --log-level 6
-A fw2loc -j ACCEPT
-A fw2net -m state --state RELATED,ESTABLISHED -j ACCEPT
-A fw2net -p udp -m udp --dport 53 -j ACCEPT
-A fw2net -p tcp -m tcp --dport 53 -j ACCEPT
-A fw2net -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A fw2net -p icmp -j ACCEPT
-A fw2net -p gre -j ACCEPT
-A fw2net -p tcp -m multiport --dports 80,443 -j ACCEPT
-A fw2net -p gre -j ACCEPT
-A fw2net -j ACCEPT
-A fw2rem -m state --state RELATED,ESTABLISHED -j ACCEPT
-A fw2rem -j ACCEPT
-A loc2all -m state --state RELATED,ESTABLISHED -j ACCEPT
-A loc2all -j Reject
-A loc2all -j LOG --log-prefix "Shorewall:loc2all:REJECT:" --log-level 6
-A loc2all -j reject
-A loc2fw -m state --state RELATED,ESTABLISHED -j ACCEPT
-A loc2fw -p udp -m udp --dport 53 -j ACCEPT
-A loc2fw -p tcp -m tcp --dport 53 -j ACCEPT
-A loc2fw -p tcp -m tcp --dport 22 -j ACCEPT
-A loc2fw -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A loc2fw -p tcp -m tcp --dport 10000 -j ACCEPT
-A loc2fw -p tcp -m tcp --dport 3128 -j ACCEPT
-A loc2fw -j LOG --log-prefix "Shorewall:loc2fw:ACCEPT:" --log-level 6
-A loc2fw -j ACCEPT
-A loc2net -m state --state RELATED,ESTABLISHED -j ACCEPT
-A loc2net -p tcp -m tcp --dport 21 -j ACCEPT
-A loc2net -p udp -m udp --dport 123 -j ACCEPT
-A loc2net -p tcp -m tcp --dport 5222 -j ACCEPT
-A loc2net -p tcp -m tcp --dport 25 -j ACCEPT
-A loc2net -p tcp -m tcp --dport 143 -j ACCEPT
-A loc2net -p tcp -m tcp --dport 110 -j ACCEPT
-A loc2net -p tcp -m tcp --dport 3389 -j ACCEPT
-A loc2net -p tcp -m tcp --dport 5190 -j ACCEPT
-A loc2net -j ACCEPT
-A loc2rem -m state --state RELATED,ESTABLISHED -j ACCEPT
-A loc2rem -j ACCEPT
-A logdrop -j LOG --log-prefix "Shorewall:logdrop:DROP:" --log-level 6
-A logdrop -j DROP
-A logreject -j LOG --log-prefix "Shorewall:logreject:REJECT:" --log-level 6
-A logreject -j reject
-A net2all -m state --state RELATED,ESTABLISHED -j ACCEPT
-A net2all -j Drop
-A net2all -j LOG --log-prefix "Shorewall:net2all:DROP:" --log-level 6
-A net2all -j DROP
-A net2fw -m state --state RELATED,ESTABLISHED -j ACCEPT
-A net2fw -p icmp -m icmp --icmp-type 8 -j DROP
-A net2fw -p gre -j ACCEPT
-A net2fw -p gre -j ACCEPT
-A net2fw -p tcp -m tcp --dport 1723 -j ACCEPT
-A net2fw -j Drop
-A net2fw -j LOG --log-prefix "Shorewall:net2fw:DROP:" --log-level 6
-A net2fw -j DROP
-A net2loc -m state --state RELATED,ESTABLISHED -j ACCEPT
-A net2loc -s 2.1.93.162/32 -d 192.168.128.4/32 -p tcp -m tcp --dport 3389 -j ACCEPT
-A net2loc -j Drop
-A net2loc -j LOG --log-prefix "Shorewall:net2loc:DROP:" --log-level 6
-A net2loc -j DROP
-A ppp0_fwd -m state --state INVALID,NEW -j dynamic
-A ppp0_fwd -o eth0 -j all2all
-A ppp0_fwd -o eth1 -j rem2loc
-A ppp0_in -m state --state INVALID,NEW -j dynamic
-A ppp0_in -j rem2fw
-A ppp0_out -j fw2rem
-A reject -m pkttype --pkt-type broadcast -j DROP
-A reject -m pkttype --pkt-type multicast -j DROP
-A reject -s 255.255.255.255/32 -j DROP
-A reject -s 224.0.0.0/4 -j DROP
-A reject -p igmp -j DROP
-A reject -p tcp -j REJECT --reject-with tcp-reset
-A reject -p udp -j REJECT --reject-with icmp-port-unreachable
-A reject -p icmp -j REJECT --reject-with icmp-host-unreachable
-A reject -j REJECT --reject-with icmp-host-prohibited
-A rem2fw -m state --state RELATED,ESTABLISHED -j ACCEPT
-A rem2fw -j ACCEPT
-A rem2loc -m state --state RELATED,ESTABLISHED -j ACCEPT
-A rem2loc -j ACCEPT
-A smurfs -s 255.255.255.255/32 -j LOG --log-prefix "Shorewall:smurfs:DROP:" --log-level 6
-A smurfs -s 255.255.255.255/32 -j DROP
-A smurfs -s 224.0.0.0/4 -j LOG --log-prefix "Shorewall:smurfs:DROP:" --log-level 6
-A smurfs -s 224.0.0.0/4 -j DROP
COMMIT
# Completed on Mon Jun 22 14:03:24 2009
Подскажите где и что может быть не так. почему может не пускать из windows сети