Нужно пробросить игровые порты 6112-6119
iptables -t nat -A PREROUTING -i INET_IP -p tcp --dport 6112 -j DNAT --to-destination 192.168.100.248:6112-6119
iptables -t nat -A POSTROUTING -p tcp --dst $INET_IP --dport 6112-6119 -j SNAT --to-source 192.168.100.248
К игре не кто не подключается, проверяю открытые порты через whatsmyip:
Port 6112-6119 Closed а не Timed-out или open
Вот iptables-save
eth0(192.168.100.254) - сеть
eth1(192.168.1.2) -инет (pppo)
192.168.100.248 - пункт назначения
*nat
:PREROUTING ACCEPT [598303:58045777]
:POSTROUTING ACCEPT [93639:5996512]
:OUTPUT ACCEPT [377009:29209608]
-A PREROUTING ! -d 192.168.0.0/16 -i eth0 -p tcp -m multiport --dports 80,8080,10000 -j REDIRECT --to-ports 3128
-A PREROUTING -i INET_IP -p tcp -m tcp --dport 6112:6119 -j DNAT --to-destination 192.168.100.248:6112-6119
-A POSTROUTING ! -s INET_IP/32 -o ppp0 -j SNAT --to-source INET_IP
-A POSTROUTING -o eth1 -j MASQUERADE
-A POSTROUTING -d INET_IP/32 -p tcp -m tcp --dport 6112:6119 -j SNAT --to-source 192.168.100.248
COMMIT
# Completed on Fri May 28 13:23:05 2010
# Generated by iptables-save v1.4.4 on Fri May 28 13:23:05 2010
*filter
:INPUT DROP [1:60]
:FORWARD DROP [0:0]
:OUTPUT DROP [9:4226]
:bad_tcp_packets - [0:0]
:inet_in - [0:0]
:inet_out - [0:0]
:local_in - [0:0]
:local_out - [0:0]
-A INPUT -p udp -m udp --sport 53 -j ACCEPT
-A INPUT -p udp -m udp --dport 53 -j ACCEPT
-A INPUT -s 192.168.0.0/16 -p tcp -m tcp --sport 53 -j ACCEPT
-A INPUT -s 127.0.0.1/32 -p tcp -m tcp --dport 80 -j ACCEPT
-A INPUT -s 127.0.0.1/32 -p tcp -m tcp --dport 2222 -j ACCEPT
-A INPUT -s 127.0.0.1/32 -p tcp -m tcp --dport 6112:6119 -j ACCEPT
-A INPUT -s 192.168.0.0/16 -p tcp -m tcp --dport 2222 -j ACCEPT
-A INPUT -s 192.168.0.0/16 -p tcp -m tcp --dport 21 -j ACCEPT
-A INPUT -s 192.168.0.0/16 -p tcp -m tcp --dport 20 -j ACCEPT
-A INPUT -s 192.168.0.0/16 -p tcp -m tcp --dport 2021 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 35691 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 5900 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 10000 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 0 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 3 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 5 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 11 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 12 -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -p tcp -j bad_tcp_packets
-A INPUT -i ppp0 -j inet_in
-A INPUT -i eth0 -j local_in
-A INPUT -m limit --limit 3/min --limit-burst 3 -j LOG --log-prefix "IN DROP: " --log-level 6
-A FORWARD -p tcp -j bad_tcp_packets
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p icmp -m icmp --icmp-type 0 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p icmp -m icmp --icmp-type 3 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p icmp -m icmp --icmp-type 5 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p icmp -m icmp --icmp-type 11 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p icmp -m icmp --icmp-type 12 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 2222 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 21 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 20 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 2021 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 80 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 8080 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 3128 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 21 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 20 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 2021 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 9102 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 5050 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 10000 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 2082 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 2078 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 5900 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 53 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p udp -m udp --sport 53 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 5190 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 110 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 995 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 25 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 465 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 443 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p udp -m udp --sport 1025:65535 -j ACCEPT
-A FORWARD -i ppp0 -p tcp -m tcp --dport 5900 -j ACCEPT
-A FORWARD -s 192.168.100.248/32 -p tcp -m tcp -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 12975 -j ACCEPT
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 3389 -j ACCEPT
-A FORWARD -m limit --limit 3/min --limit-burst 3 -j LOG --log-prefix "FWD DROP: " --log-level 6
-A FORWARD -s 192.168.0.0/16 -p tcp -m tcp --dport 7012 -j ACCEPT
-A FORWARD -s 192.168.100.4/32 -p tcp -m tcp --dport 6036 -j ACCEPT
-A FORWARD -s 192.168.100.4/32 -p tcp -m tcp --dport 6326 -j ACCEPT
-A FORWARD -s 192.168.100.4/32 -p tcp -m tcp --dport 8112 -j ACCEPT
-A FORWARD -s 192.168.100.4/32 -p tcp -m tcp --dport 6384 -j ACCEPT
-A FORWARD -s 192.168.100.4/32 -p tcp -m tcp --dport 6304 -j ACCEPT
-A FORWARD -s 192.168.100.203/32 -p tcp -m tcp --dport 6000:6500 -j ACCEPT
-A FORWARD -j DROP
-A OUTPUT -p tcp -m tcp --dport 5900 -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -p tcp -j bad_tcp_packets
-A OUTPUT -d 192.168.0.0/16 -p tcp -m tcp --sport 3128 -j ACCEPT
-A OUTPUT -o eth0 -j local_out
-A OUTPUT -o ppp0 -j inet_out
-A OUTPUT -o ppp0 -p tcp -m tcp --sport 2222 -j ACCEPT
-A OUTPUT -o ppp0 -p tcp -m tcp --sport 6112:6119 -j ACCEPT
-A OUTPUT -m limit --limit 3/min --limit-burst 3 -j LOG --log-prefix "OUT DROP: " --log-level 6
-A bad_tcp_packets -p tcp -m tcp --tcp-flags SYN,ACK SYN,ACK -m state --state NEW -j REJECT --reject-with tcp-reset
-A bad_tcp_packets -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -j LOG --log-prefix "New not syn:"
-A bad_tcp_packets -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -j DROP
-A inet_in -p tcp -m state --state RELATED,ESTABLISHED -j ACCEPT
-A inet_in -p tcp -m tcp --dport 2222 -j ACCEPT
-A inet_in -p tcp -m tcp --dport 80 -j ACCEPT
-A inet_in -p udp -m udp --sport 123 -j ACCEPT
-A inet_in -p tcp -m tcp --dport 6112:6119 -j ACCEPT
-A inet_in -m limit --limit 3/min --limit-burst 3 -j LOG --log-prefix "inet_in DROP: " --log-level 6
-A inet_in -j DROP
-A inet_out -j ACCEPT
-A local_in -p tcp -m tcp --dport 139 -j ACCEPT
-A local_in -p udp -m udp --dport 136:138 -j ACCEPT
-A local_in -p tcp -m tcp --sport 5900 -j ACCEPT
-A local_in -s 192.168.0.0/16 -d 192.168.100.254/32 -p tcp -m tcp --dport 3128 -j ACCEPT
-A local_in -p tcp -m tcp --dport 2222 -j ACCEPT
-A local_in -p tcp -m tcp --dport 80 -j ACCEPT
-A local_in -p tcp -m tcp --dport 6112:6119 -j ACCEPT
-A local_in -s 192.168.0.0/16 -p udp -m udp --dport 123 -j ACCEPT
-A local_in -s 192.168.0.0/16 -p tcp -m tcp --dport 445 -j ACCEPT
-A local_in -m limit --limit 3/min --limit-burst 3 -j LOG --log-prefix "local_in DROP: " --log-level 6
-A local_in -j DROP
-A local_out -j ACCEPT
COMMIT
# Completed on Fri May 28 13:23:05 2010
# Generated by iptables-save v1.4.4 on Fri May 28 13:23:05 2010
*mangle
:PREROUTING ACCEPT [27774615:17804650027]
:INPUT ACCEPT [14724246:9882638519]
:FORWARD ACCEPT [13024683:7919432502]
:OUTPUT ACCEPT [15992972:10414453062]
:POSTROUTING ACCEPT [29004773:18325646695]
-A FORWARD -o ppp0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m tcpmss --mss 1400:65495 -j TCPMSS --clamp-mss-to-pmtu
COMMIT