Увидели сообщение с непонятной ссылкой, спам, непристойность или оскорбление?Воспользуйтесь ссылкой «Сообщить модератору» рядом с сообщением!
0 Пользователей и 1 Гость просматривают эту тему.
#!/bin/bashiptables -F INPUTiptables -F OUTPUTiptables -F FORWARDiptables -P INPUT ACCEPTiptables -P OUTPUT ACCEPTiptables -P FORWARD ACCEPTecho "1" > /proc/sys/net/ipv4/ip_forwardiptables -t nat -F#eth1#iptables -t nat -A POSTROUTING -s 192.168.0.104/29 -o ppp0 -j MASQUERADEiptables -t nat -A POSTROUTING -s 192.168.0.104/28 -o eth0 -j MASQUERADE#303 - 305#iptables -t nat -A POSTROUTING -s 192.168.34.0/29 -o ppp0 -j MASQUERADEiptables -t nat -A POSTROUTING -s 192.168.34.0/29 -o eth0 -j MASQUERADE#307#iptables -t nat -A POSTROUTING -s 192.168.37.0/27 -o ppp0 -j MASQUERADEiptables -t nat -A POSTROUTING -s 192.168.37.0/27 -o eth0 -j MASQUERADE#308#iptables -t nat -A POSTROUTING -s 192.168.38.0/27 -o ppp0 -j MASQUERADEiptables -t nat -A POSTROUTING -s 192.168.38.0/27 -o eth0 -j MASQUERADE#401#iptables -t nat -A POSTROUTING -s 192.168.41.0/29 -o ppp0 -j MASQUERADEiptables -t nat -A POSTROUTING -s 192.168.41.0/29 -o eth0 -j MASQUERADE#403 - 404#iptables -t nat -A POSTROUTING -s 192.168.43.0/29 -o ppp0 -j MASQUERADEiptables -t nat -A POSTROUTING -s 192.168.43.0/29 -o eth0 -j MASQUERADE#408#iptables -t nat -A POSTROUTING -s 192.168.48.0/27 -o ppp0 -j MASQUERADEiptables -t nat -A POSTROUTING -s 192.168.48.0/27 -o eth0 -j MASQUERADE#409#iptables -t nat -A POSTROUTING -s 192.168.49.0/27 -o ppp0 -j MASQUERADEiptables -t nat -A POSTROUTING -s 192.168.49.0/27 -o eth0 -j MASQUERADE#410#iptables -t nat -A POSTROUTING -s 192.168.50.0/29 -o ppp0 -j MASQUERADEiptables -t nat -A POSTROUTING -s 192.168.50.0/29 -o eth0 -j MASQUERADE##### eth3 #########405#iptables -t nat -A POSTROUTING -s 192.168.2.0/29 -o ppp0 -j MASQUERADEiptables -t nat -A POSTROUTING -s 192.168.2.0/29 -o eth0 -j MASQUERADE############### port na FTP-WEB ##################iptables -t nat -A PREROUTING -d 213.1.2.3 -i eth0 -p tcp -m --dport 23 -j DNAT --to-destination 192.168.2.2iptables -A FORWARD -s 192.168.2.2 -p tcp --dport 23 -j ACCEPT############### Block #############################Блочим всем ############iptables -A FORWARD -d 192.168.49.13 -s vk.com -j ACCEPT##iptables -A FORWARD -s vk.com -j DROP#iptables -A FORWARD -s m.vk.com -j DROP#iptables -A FORWARD -s fb.com -j DROP#iptables -A FORWARD -s 173.252.110.27 -j DROP##iptables -A FORWARD -d 192.168.49.12 -s vk.com -j ACCEPT
############### port na FTP-WEB ##################iptables -t nat -A PREROUTING -d 213.169.83.16 -i eth0 -p tcp -m --dport 23 -j DNAT --to-destination 192.168.2.2
# Generated by iptables-save v1.4.14 on Sun Feb 8 17:29:32 2015*nat:PREROUTING ACCEPT [7:634]:INPUT ACCEPT [7:634]:OUTPUT ACCEPT [144:13350]:POSTROUTING ACCEPT [145:13410]-A PREROUTING -d 213.1.2.3/32 -i eth0 -p tcp -m tcp --dport 23 -j DNAT --to-destination 192.168.2.2-A POSTROUTING -s 192.168.0.96/28 -o eth0 -j MASQUERADE-A POSTROUTING -s 192.168.34.0/29 -o eth0 -j MASQUERADE-A POSTROUTING -s 192.168.37.0/27 -o eth0 -j MASQUERADE-A POSTROUTING -s 192.168.38.0/27 -o eth0 -j MASQUERADE-A POSTROUTING -s 192.168.41.0/29 -o eth0 -j MASQUERADE-A POSTROUTING -s 192.168.43.0/29 -o eth0 -j MASQUERADE-A POSTROUTING -s 192.168.48.0/27 -o eth0 -j MASQUERADE-A POSTROUTING -s 192.168.49.0/27 -o eth0 -j MASQUERADE-A POSTROUTING -s 192.168.50.0/29 -o eth0 -j MASQUERADE-A POSTROUTING -s 192.168.2.0/29 -o eth0 -j MASQUERADECOMMIT# Completed on Sun Feb 8 17:29:32 2015# Generated by iptables-save v1.4.14 on Sun Feb 8 17:29:32 2015*filter:INPUT ACCEPT [967:178764]:FORWARD ACCEPT [2:100]:OUTPUT ACCEPT [925:113893]-A FORWARD -s 192.168.2.2/32 -p tcp -m tcp --dport 23 -j ACCEPTCOMMIT# Completed on Sun Feb 8 17:29:32 2015
ssh: connect to host 213.1.2.3 port 23: Connection refusedx
-A FORWARD -s 192.168.2.2/32 -p tcp -m tcp --dport 23 -j ACCEPT
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!Someone could be eavesdropping on you right now (man-in-the-middle attack)!It is also possible that a host key has just been changed.The fingerprint for the ECDSA key sent by the remote host is36:97:5d:b1:72:b7:9c:b6:44:9c:cf:4a:30:8f:80:c2.Please contact your system administrator.Add correct host key in /home/boxer/.ssh/known_hosts to get rid of this message.Offending ECDSA key in /home/boxer/.ssh/known_hosts:3 remove with: ssh-keygen -f "/home/boxer/.ssh/known_hosts" -R 213.1.2.3ECDSA host key for 213.1.2.36 has changed and you have requested strict checking.Host key verification failed.
sudo rm /root/.ssh/known_hosts
Страница сгенерирована за 0.029 секунд. Запросов: 25.