Считаете, что Ubuntu недостаточно дружелюбна к новичкам? Помогите создать новое Руководство для новичков!
0 Пользователей и 1 Гость просматривают эту тему.
Не надо видеть сеть. Надо видеть модем.Если модем не отвечает, смотрите tcpdump, что вообще происходит.Либо занатьте уже интерфейс и не мучайтесь.
-A POSTROUTING -o eth0 -j MASQUERADE
я сделал вот так (см.рисунок) https://yadi.sk/i/9mWpLmFiZqW5PИ все равно не вижу сеть 192.168.1.0 из сети 192.168.0.0. Или я как-то не так завернул в модеме?
Подождите, а не Вы ли убрать маскарад на первой странице топика советовали? И если маскарад всё-таки есть, тогда почему не работает? Вообще не очень понятно назначение Ubuntu-server, когда D'Link DSL-2650u — ADSL-маршрутизатор с 4-х портовым коммутатором и радиомодулем Wi-Fi.
Подождите, а не Вы ли убрать маскарад на первой странице топика советовали?
Сейчас, притараню хрустальный шарик...
#!/bin/sh## rc.firewall - Initial SIMPLE IP Firewall script for Linux 2.4.x and iptables## Copyright (C) 2001 Oskar Andreasson <bluefluxATkoffeinDOTnet>## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License as published by# the Free Software Foundation; version 2 of the License.## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program or from the site that you downloaded it# from; if not, write to the Free Software Foundation, Inc., 59 Temple# Place, Suite 330, Boston, MA 02111-1307 USA############################################################################## 1. Configuration options.### 1.1 Internet Configuration.#INET_IP="192.168.1.2"INET_IFACE="eth0"INET_BROADCAST="192.168.1.3"## 1.1.1 DHCP### 1.1.2 PPPoE### 1.2 Local Area Network configuration.## your LAN's IP range and localhost IP. /24 means to only use the first 24# bits of the 32 bit IP address. the same as netmask 255.255.255.0#LAN_IP="192.168.0.1"LAN_IP_RANGE="192.168.0.0/24"LAN_IFACE="eth1"## 1.3 DMZ Configuration.### 1.4 Localhost Configuration.#LO_IFACE="lo"LO_IP="127.0.0.1"# 1.5 IPTables Configuration.#IPTABLES="/sbin/iptables"## 1.6 Other Configuration.############################################################################## 2. Module loading.### Needed to initially load modules#/sbin/depmod -a/sbin/modprobe ip_queue## 2.1 Required modules#/sbin/modprobe ip_tables/sbin/modprobe ip_conntrack/sbin/modprobe iptable_filter/sbin/modprobe iptable_mangle/sbin/modprobe iptable_nat/sbin/modprobe ipt_LOG/sbin/modprobe ipt_limit/sbin/modprobe ipt_state## 2.2 Non-Required modules##/sbin/modprobe ipt_owner#/sbin/modprobe ipt_REJECT#/sbin/modprobe ipt_MASQUERADE/sbin/modprobe ip_conntrack_ftp#/sbin/modprobe ip_conntrack_irc/sbin/modprobe ip_nat_ftp#/sbin/modprobe ip_nat_irc############################################################################# 3. /proc set up.### 3.1 Required proc configuration#echo "1" > /proc/sys/net/ipv4/ip_forward## 3.2 Non-Required proc configuration##echo "1" > /proc/sys/net/ipv4/conf/all/rp_filter#echo "1" > /proc/sys/net/ipv4/conf/all/proxy_arp#echo "1" > /proc/sys/net/ipv4/ip_dynaddr############################################################################# 4. rules set up.######## 4.1 Filter table### 4.1.1 Set policies#$IPTABLES -P INPUT ACCEPT$IPTABLES -P OUTPUT DROP$IPTABLES -P FORWARD DROP## 4.1.2 Create userspecified chains### Create chain for bad tcp packets#$IPTABLES -N bad_tcp_packets## Create separate chains for ICMP, TCP and UDP to traverse#$IPTABLES -N allowed$IPTABLES -N tcp_packets$IPTABLES -N udp_packets$IPTABLES -N icmp_packets## 4.1.3 Create content in userspecified chains### bad_tcp_packets chain#$IPTABLES -A bad_tcp_packets -p tcp --tcp-flags SYN,ACK SYN,ACK \-m state --state NEW -j REJECT --reject-with tcp-reset$IPTABLES -A bad_tcp_packets -p tcp ! --syn -m state --state NEW -j LOG \--log-prefix "New not syn:"$IPTABLES -A bad_tcp_packets -p tcp ! --syn -m state --state NEW -j DROP## allowed chain#$IPTABLES -A allowed -p TCP --syn -j ACCEPT$IPTABLES -A allowed -p TCP -m state --state ESTABLISHED,RELATED -j ACCEPT$IPTABLES -A allowed -p TCP -j DROP## TCP rules##$IPTABLES -A tcp_packets -p TCP -s 0/0 --dport 20 -j allowed$IPTABLES -A tcp_packets -p TCP -s 0/0 --dport 21 -j allowed$IPTABLES -A tcp_packets -p TCP -s 0/0 --dport 22 -j allowed#$IPTABLES -A tcp_packets -p TCP -d 0/0 --sport 25 -j allowed$IPTABLES -A tcp_packets -p TCP -s 0/0 --dport 80 -j allowed#$IPTABLES -A tcp_packets -p TCP -s 0/0 --dport 110 -j allowed$IPTABLES -A tcp_packets -p TCP -s 0/0 --dport 113 -j allowed#$IPTABLES -A tcp_packets -p TCP -s 0/0 --dport 123 -j allowed#$IPTABLES -A tcp_packets -p TCP -s 0/0 --dport 53 -j allowed$IPTABLES -A tcp_packets -p TCP -s 0/0 --dport 443 -j allowed#$IPTABLES -A tcp_packets -p TCP -s 0/0 --dport 3128 -j allowed#$IPTABLES -A tcp_packets -p TCP -s 0/0 --dport 5190 -j allowed#$IPTABLES -A tcp_packets -p TCP -s 0/0 --dport 5222 -j allowed#$IPTABLES -A tcp_packets -p TCP -s 0/0 --dport 6669 -j allowed#$IPTABLES -A tcp_packets -p TCP -s 0/0 --dport 3306 -j allowed$IPTABLES -A tcp_packets -p TCP -s 0/0 --dport 23 -j REJECT$IPTABLES -A tcp_packets -p TCP -s 0/0 --dport 3389 -j allowed$IPTABLES -A tcp_packets -p TCP -s 0/0 --dport 1988 -j allowed## UDP ports#$IPTABLES -A udp_packets -p UDP -s 0/0 --dport 53 -j ACCEPT$IPTABLES -A udp_packets -p UDP -s 0/0 --destination-port 123 -j ACCEPT#$IPTABLES -A udp_packets -p UDP -s 0/0 --destination-port 2074 -j ACCEPT#$IPTABLES -A udp_packets -p UDP -s 0/0 --destination-port 4000 -j ACCEPT## In Microsoft Networks you will be swamped by broadcasts. These lines # will prevent them from showing up in the logs.#$IPTABLES -A udp_packets -p UDP -i $INET_IFACE -d $INET_BROADCAST \--destination-port 135:139 -j DROP## If we get DHCP requests from the Outside of our network, our logs will # be swamped as well. This rule will block them from getting logged.#$IPTABLES -A udp_packets -p UDP -i $INET_IFACE -d 255.255.255.255 \--destination-port 67:68 -j DROP## ICMP rules##$IPTABLES -A icmp_packets -p ICMP -s 0/0 --icmp-type 8 -j ACCEPT#$IPTABLES -A icmp_packets -p ICMP -s 0/0 --icmp-type 11 -j ACCEPT## 4.1.4 INPUT chain### Bad TCP packets we don't want.#$IPTABLES -A INPUT -p tcp -j bad_tcp_packets## Rules for special networks not part of the Internet#$IPTABLES -A INPUT -p TCP -i $LAN_IFACE -s $LAN_IP_RANGE -j ACCEPT$IPTABLES -A INPUT -p TCP -i $LO_IFACE -s $LO_IP -j ACCEPT$IPTABLES -A INPUT -p TCP -i $LO_IFACE -s $LAN_IP -j ACCEPT$IPTABLES -A INPUT -p TCP -i $LO_IFACE -s $INET_IP -j ACCEPT## Special rule for DHCP requests from LAN, which are not caught properly# otherwise.#$IPTABLES -A INPUT -p UDP -i $LAN_IFACE --dport 67 --sport 68 -j ACCEPT## Rules for incoming packets from the internet.#$IPTABLES -A INPUT -p ALL -d $INET_IP -m state --state ESTABLISHED,RELATED \-j ACCEPT$IPTABLES -A INPUT -p TCP -i $INET_IFACE -j tcp_packets$IPTABLES -A INPUT -p UDP -i $INET_IFACE -j udp_packets$IPTABLES -A INPUT -p ICMP -i $INET_IFACE -j icmp_packets#$IPTABLES -A INPUT -p ICMP -j DROP## If you have a Microsoft Network on the outside of your firewall, you may # also get flooded by Multicasts. We drop them so we do not get flooded by # logs#$IPTABLES -A INPUT -i $INET_IFACE -d 224.0.0.0/8 -j DROP## Log weird packets that don't match the above.#$IPTABLES -A INPUT -m limit --limit 3/minute --limit-burst 3 -j LOG \--log-level DEBUG --log-prefix "IPT INPUT packet died: "## 4.1.5 FORWARD chain### Bad TCP packets we don't want#$IPTABLES -A FORWARD -p tcp -j bad_tcp_packets## Accept the packets we actually want to forward#$IPTABLES -A FORWARD -i $LAN_IFACE -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.3 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.111 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.5 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.11 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.21 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.42 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.46 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.52 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.61 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.62 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.63 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.64 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.65 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.32 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.82 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.99 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.106 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.109 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.112 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.124 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.221 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.222 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.233 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.121 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.224 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.231 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.244 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.245 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.246 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.247 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.249 -j ACCEPT$IPTABLES -A FORWARD -s 192.168.0.189 -j ACCEPT$IPTABLES -A FORWARD -p tcp --dport 3389 -d 192.168.0.235 -j ACCEPT$IPTABLES -A FORWARD -p tcp --sport 3389 -s 192.168.0.235 -j ACCEPT$IPTABLES -A FORWARD -p tcp --dport 80 -d 192.168.0.235 -j ACCEPT$IPTABLES -A FORWARD -p tcp --sport 80 -s 192.168.0.235 -j ACCEPT$IPTABLES -A FORWARD -p tcp --dport 9099 -d 192.168.0.235 -j ACCEPT$IPTABLES -A FORWARD -p tcp --sport 9099 -s 192.168.0.235 -j ACCEPT$IPTABLES -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT## Log weird packets that don't match the above.#$IPTABLES -A FORWARD -m limit --limit 3/minute --limit-burst 3 -j LOG \--log-level DEBUG --log-prefix "IPT FORWARD packet died: "## 4.1.6 OUTPUT chain### Bad TCP packets we don't want.#$IPTABLES -A OUTPUT -p tcp -j bad_tcp_packets## Special OUTPUT rules to decide which IP's to allow.#$IPTABLES -A OUTPUT -p ALL -s $LO_IP -j ACCEPT$IPTABLES -A OUTPUT -p ALL -s $LAN_IP -j ACCEPT$IPTABLES -A OUTPUT -p ALL -s $INET_IP -j ACCEPT#$IPTABLES -A OUTPUT -p ICMP -s $INET_IP -j ACCEPT#$IPTABLES -A OUTPUT -p UDP -s $INET_IP -j ACCEPT#$IPTABLES -A OUTPUT -p TCP -s $INET_IP -j ACCEPT## Log weird packets that don't match the above.#$IPTABLES -A OUTPUT -m limit --limit 3/minute --limit-burst 3 -j LOG \--log-level DEBUG --log-prefix "IPT OUTPUT packet died: "####### 4.2 nat table### 4.2.1 Set policies### 4.2.2 Create user specified chains### 4.2.3 Create content in user specified chains### 4.2.4 PREROUTING chain### 4.2.5 POSTROUTING chain### Enable simple IP Forwarding and Network Address Translation#######оБУФТПКЛЙ ДМС уЛЧЙДБ#ъБРТЕЭБЕН ДПУФХР АЪЕТБН Л РПУФПТПООЙН IP УЕТЧБЛБН$IPTABLES -A FORWARD -s 192.168.0.1/24 -d ! 192.168.0.1 -p tcp --dport 3128 -j DROP$IPTABLES -A FORWARD -s 192.168.0.1/24 -d ! 192.168.0.1 -p tcp --dport 8080 -j DROP#рЕТЕОБРТБЧМСЕН ТБВПФХ iptables ОБ squid$IPTABLES -t nat -A PREROUTING -i eth1 -p tcp --dport 80 -j REDIRECT --to-port 3128$IPTABLES -t nat -A PREROUTING -i eth1 -p tcp --dport 8080 -j REDIRECT --to-port 3128$IPTABLES -t nat -A PREROUTING -i eth0 -p tcp --dport 80 -j DNAT --to-destination 192.168.0.1:3128$IPTABLES -t nat -A POSTROUTING -o $INET_IFACE -j SNAT --to-source $INET_IP
eth0 Link encap:Ethernet HWaddr 00:0D:88:43:BF:AD inet addr:192.168.1.2 Bcast:192.168.1.255 Mask:255.255.255.252 inet6 addr: fe80::20d:88ff:fe43:bfad/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:59409836 errors:0 dropped:0 overruns:0 frame:0 TX packets:62012208 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:1050556547 (1001.8 MiB) TX bytes:719451985 (686.1 MiB) Interrupt:5 Base address:0xc000eth1 Link encap:Ethernet HWaddr 00:0D:88:45:B0:2D inet addr:192.168.0.1 Bcast:192.168.0.255 Mask:255.255.255.0 inet6 addr: fe80::20d:88ff:fe45:b02d/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:62369893 errors:0 dropped:0 overruns:0 frame:0 TX packets:59482819 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:725428826 (691.8 MiB) TX bytes:1178645770 (1.0 GiB) Interrupt:12 Base address:0xc400lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:31633 errors:0 dropped:0 overruns:0 frame:0 TX packets:31633 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:9458273 (9.0 MiB) TX bytes:9458273 (9.0 MiB)
Kernel IP routing tableDestination Gateway Genmask Flags MSS Window irtt Iface192.168.1.0 0.0.0.0 255.255.255.252 U 0 0 0 eth0192.168.0.0 0.0.0.0 255.255.255.0 U 0 0 0 eth10.0.0.0 192.168.1.1 0.0.0.0 UG 0 0 0 eth0
inet addr:192.168.1.2 Bcast:192.168.1.255 Mask:255.255.255.252
inet addr:192.168.0.1 Bcast:192.168.0.255 Mask:255.255.255.0
Цитировать inet addr:192.168.1.2 Bcast:192.168.1.255 Mask:255.255.255.252Цитировать inet addr:192.168.0.1 Bcast:192.168.0.255 Mask:255.255.255.0
ZL~# ZL~# netstat -nrТаблица маршутизации ядра протокола IPDestination Gateway Genmask Flags MSS Window irtt Iface0.0.0.0 192.168.100.2 0.0.0.0 UG 0 0 0 wlan010.0.3.0 0.0.0.0 255.255.255.252 U 0 0 0 lxcbr0192.168.100.0 0.0.0.0 255.255.255.0 U 0 0 0 wlan0ZL~#
ssh: connect to host v1 port 22: Connection timed out
Страница сгенерирована за 0.021 секунд. Запросов: 21.