На шлюзе squid. При выставлении *filter INPUT в DROP. Нет соединения на локальных машинах. Без сквида работало ...
Вот так работает.
# Generated by iptables-save v1.4.4 on Sat Sep 17 00:16:35 2011
*filter
:INPUT ACCEPT [4:235]
:FORWARD DROP [24:16198]
:OUTPUT ACCEPT [4:347]
-A INPUT -i lo -j ACCEPT
-A INPUT -d 192.168.1.0/24 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -m state --state INVALID -j LOG --log-prefix "iptInvalidI: "
-A INPUT -m state --state INVALID -j DROP
-A INPUT -p tcp -m state --state NEW -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -j LOG --log-prefix "iptNeNew: "
-A INPUT -p tcp -m state --state NEW -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -j DROP
-A INPUT -p icmp -m icmp --icmp-type 13 -j LOG --log-prefix "iptTime: "
-A INPUT -p icmp -m icmp --icmp-type 13 -j DROP
-A INPUT -p icmp -f -j LOG --log-prefix "iptICMPI: "
-A INPUT -p icmp -f -j DROP
-A INPUT -p icmp -m limit --limit 250/sec --limit-burst 500 -j LOG --log-prefix "iptFludLimI: "
-A INPUT -p icmp -m limit --limit 250/sec --limit-burst 500 -j QUEUE
-A INPUT -p icmp -j DROP
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK RST -m limit --limit 10/min -j LOG --log-prefix "iptSkanPortI: "
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK RST -m limit --limit 10/min -j QUEUE
-A INPUT -i ppp+ -p tcp -m tcp --tcp-flags SYN,ACK SYN,ACK -m conntrack --ctstate INVALID,NEW -j LOG --log-prefix "iptIzVne: "
-A INPUT -i ppp+ -p tcp -m tcp --tcp-flags SYN,ACK SYN,ACK -m conntrack --ctstate INVALID,NEW -j REJECT --reject-with tcp-reset
-A INPUT -i ppp+ -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -m conntrack --ctstate NEW -j LOG --log-prefix "iptNewIzVne: "
-A INPUT -i ppp+ -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -m conntrack --ctstate NEW -j DROP
-A INPUT -s 192.168.1.0/24 -i eth0 -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m connlimit --connlimit-above 80 --connlimit-mask 32 -j LOG --log-prefix "iptLimFrTCP0: "
-A INPUT -s 192.168.1.0/24 -i eth0 -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m connlimit --connlimit-above 80 --connlimit-mask 32 -j REJECT --reject-with tcp-reset
-A FORWARD -m state --state INVALID -j LOG --log-prefix "iptInvalid: "
-A FORWARD -m state --state INVALID -j DROP
-A FORWARD -p icmp -f -j LOG --log-prefix "iptICMP: "
-A FORWARD -p icmp -f -j DROP
-A FORWARD -p icmp -m limit --limit 250/sec --limit-burst 500 -j LOG --log-prefix "iptFludLim: "
-A FORWARD -p icmp -m limit --limit 250/sec --limit-burst 500 -j QUEUE
-A FORWARD -p icmp -j DROP
-A FORWARD -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK RST -m limit --limit 10/min -j LOG --log-prefix "iptSkanPort: "
-A FORWARD -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK RST -m limit --limit 10/min -j QUEUE
-A FORWARD -i ppp0 -o ppp0 -j DROP
-A FORWARD -i ppp1 -o ppp1 -j DROP
-A FORWARD -p tcp -m tcp --tcp-flags SYN,ACK SYN,ACK -m conntrack --ctstate INVALID -j LOG --log-prefix "iptIzVneF: "
-A FORWARD -p tcp -m tcp --tcp-flags SYN,ACK SYN,ACK -m conntrack --ctstate INVALID -j REJECT --reject-with tcp-reset
-A FORWARD -i ppp+ -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -i eth2 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -i eth1 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -m conntrack --ctstate DNAT -j ACCEPT
COMMIT
# Completed on Sat Sep 17 00:16:35 2011
# Generated by iptables-save v1.4.4 on Sat Sep 17 00:16:35 2011
*nat
:PREROUTING ACCEPT [4:235]
:POSTROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
-A PREROUTING ! -d 192.168.1.0/24 -p tcp -m multiport --dports 80,8080 -j REDIRECT --to-ports 3128
-A POSTROUTING -s 192.168.1.0/24 ! -d 192.168.1.0/24 -j MASQUERADE
COMMIT
# Completed on Sat Sep 17 00:16:35 2011
# Generated by iptables-save v1.4.4 on Sat Sep 17 00:16:35 2011
*mangle
:PREROUTING ACCEPT [37:26460]
:INPUT ACCEPT [5:275]
:FORWARD ACCEPT [32:26185]
:OUTPUT ACCEPT [4:347]
:POSTROUTING ACCEPT [11:8934]
-A FORWARD -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
COMMIT
# Completed on Sat Sep 17 00:16:35 2011