Nie jesteś zalogowany.
Jeśli nie posiadasz konta, zarejestruj je już teraz! Pozwoli Ci ono w pełni korzystać z naszego serwisu. Spamerom dziękujemy!

Ogłoszenie

Prosimy o pomoc dla małej Julki — przekaż 1% podatku na Fundacji Dzieciom zdazyć z Pomocą.
Więcej informacji na dug.net.pl/pomagamy/.

#1  2007-12-04 09:30:31

  marcusdavidus - Członek DUG

marcusdavidus
Członek DUG
Skąd: z nienacka
Zarejestrowany: 2006-09-08
Serwis

iptables czy dobry skrypt

mam taki mianowicie skrypt iptables ( wygenerowany firestarterem)  czy jest bezpieczny co mozna dodac co odjac 

Kod:

#-----------( Firestarter 1.0.3, Netfilter kernel subsystem in use )----------#
#                                                                             #
# This firewall was generated by Firestarter on 2007-12-04 09:22              #
# http://www.fs-security.com                                                  #
#                                                                             #
#-----------------------------------------------------------------------------#


# --------( Initial Setup - Firewall Modules Autoloader )--------

# Remove ipchains module if found
$LSM | grep ipchains -q -s && $RMM ipchains

# Try to load every module we need
$MPB ip_tables 2> /dev/null
$MPB iptable_filter 2> /dev/null
$MPB ipt_state 2> /dev/null
$MPB ip_conntrack 2> /dev/null
$MPB ip_conntrack_ftp 2> /dev/null
$MPB ip_conntrack_irc 2> /dev/null
$MPB ipt_REJECT 2> /dev/null
$MPB ipt_TOS 2> /dev/null
$MPB ipt_MASQUERADE 2> /dev/null
$MPB ipt_LOG 2> /dev/null
$MPB iptable_mangle 2> /dev/null
$MPB ipt_ipv4optsstrip 2> /dev/null
if [ "$NAT" = "on" ]; then
    $MPB iptable_nat 2> /dev/null
    $MPB ip_nat_ftp 2> /dev/null
    $MPB ip_nat_irc 2> /dev/null
fi
if [ "EXT_PPP" = "on" ]; then
    $MPB bsd_comp 2> /dev/null
    $MPB ppp_deflate 2> /dev/null
fi


# --------( Initial Setup - Firewall Capabilities Check )--------

# Make sure the test chains does not exist
$IPT -F test 2> /dev/null
$IPT -X test 2> /dev/null
if [ "$NAT" = "on" ]; then
    $IPT -t nat -F test 2> /dev/null
    $IPT -t nat -X test 2> /dev/null
fi

# Iptables support check, mandatory feature
if [ "`$IPT -N test 2>&1`" ]; then
    echo Fatal error: Your kernel does not support iptables.
    return 100
fi

# Logging support check
log_supported=1
if [ "`$IPT -A test -j LOG 2>&1`" ]; then
    echo Warning: Logging not supported by kernel, you will recieve no firewall event updates.
    log_supported=""
fi

if [ "$NAT" = "on" ]; then
    # NAT support check
    nat_supported=1
    if [ "`$IPT -t nat -N test 2>&1`" ]; then
        echo Warning: Network address translation not supported by kernel, feature disabled.
        nat_supported=""
    fi
fi

# Mangle support check
mangle_supported=1
if [ "`$IPT -t mangle -F 2>&1`" ]; then
    echo Warning: Packet mangling not supported by kernel, feature disabled.
    mangle_supported=""
fi

# IP options stripping support check
stripoptions_supported=1
if [ "`$IPT -t mangle -A test -j IPV4OPTSSTRIP 2>&1`" ]; then
  stripoptions_supported=""
fi


# --------( Chain Configuration - Flush Existing Chains )--------

# Purge standard chains (INPUT, OUTPUT, FORWARD).

$IPT -F
$IPT -X
$IPT -Z

# Purge extended chains (MANGLE & NAT) if they exist.

if [ "$mangle_supported" ]; then
  $IPT -t mangle -F
  $IPT -t mangle -X
  $IPT -t mangle -Z
fi
if [ "$nat_supported" ]; then
  $IPT -t nat -F
  $IPT -t nat -X
  $IPT -t nat -Z
fi


# --------( Chain Configuration - Configure Default Policy )--------

# Configure standard chains (INPUT, OUTPUT, FORWARD).

$IPT -P INPUT DROP
$IPT -P OUTPUT DROP
$IPT -P FORWARD DROP

# Configure extended chains (MANGLE & NAT) if required.

if [ "$mangle_supported" ]; then
  $IPT -t mangle -P INPUT ACCEPT
  $IPT -t mangle -P OUTPUT ACCEPT
  $IPT -t mangle -P PREROUTING ACCEPT
  $IPT -t mangle -P POSTROUTING ACCEPT
fi
if [ "$nat_supported" ]; then
  $IPT -t nat -P OUTPUT ACCEPT
  $IPT -t nat -P PREROUTING ACCEPT
  $IPT -t nat -P POSTROUTING ACCEPT
fi


# --------( Chain Configuration - Create Default Result Chains )--------

# Create a new chain for filtering the input before logging is performed
$IPT -N LOG_FILTER 2> /dev/null
$IPT -F LOG_FILTER

# Hosts for which logging is disabled
while read host garbage
    do
        $IPT -A LOG_FILTER -s $host -j $STOP_TARGET
    done < /etc/firestarter/events-filter-hosts

# Ports for which logging is disabled
while read port garbage
    do
        $IPT -A LOG_FILTER -p tcp --dport $port -j $STOP_TARGET
        $IPT -A LOG_FILTER -p udp --dport $port -j $STOP_TARGET
    done < /etc/firestarter/events-filter-ports

# Create a new log and stop input (LSI) chain.
$IPT -N LSI 2> /dev/null
$IPT -F LSI
$IPT -A LSI -j LOG_FILTER
if [ "$log_supported" ]; then
    # Syn-flood protection
    $IPT -A LSI -p tcp --syn -m limit --limit 1/s -j LOG --log-level=$LOG_LEVEL --log-prefix "Inbound "
    $IPT -A LSI -p tcp --syn -j $STOP_TARGET
    # Rapid portscan protection
    $IPT -A LSI -p tcp --tcp-flags SYN,ACK,FIN,RST RST -m limit --limit 1/s -j LOG --log-level=$LOG_LEVEL --log-prefix "Inbound "
    $IPT -A LSI -p tcp --tcp-flags SYN,ACK,FIN,RST RST -j $STOP_TARGET
    # Ping of death protection
    $IPT -A LSI -p icmp --icmp-type echo-request -m limit --limit 1/s -j LOG --log-level=$LOG_LEVEL --log-prefix "Inbound "
    $IPT -A LSI -p icmp --icmp-type echo-request -j $STOP_TARGET
    # Log everything
    $IPT -A LSI -m limit --limit 5/s -j LOG --log-level=$LOG_LEVEL --log-prefix "Inbound "
fi
$IPT -A LSI -j $STOP_TARGET # Terminate evaluation

# Create a new log and stop output (LSO) chain.
$IPT -N LSO 2> /dev/null
$IPT -F LSO
$IPT -A LSO -j LOG_FILTER
if [ "$log_supported" ]; then
    # Log everything
    $IPT -A LSO -m limit --limit 5/s -j LOG --log-level=$LOG_LEVEL --log-prefix "Outbound "
fi
$IPT -A LSO -j REJECT # Terminate evaluation


# --------( Initial Setup - Nameservers )--------

# Allow regular DNS traffic
while read keyword server garbage
    do
        if [ "$keyword" = "nameserver" ]; then
            $IPT -A INPUT -p tcp ! --syn -s $server -d 0/0 -j ACCEPT
            $IPT -A INPUT -p udp -s $server -d 0/0 -j ACCEPT
            $IPT -A OUTPUT -p tcp -s $IP -d $server --dport 53 -j ACCEPT
            $IPT -A OUTPUT -p udp -s $IP -d $server --dport 53 -j ACCEPT
        fi
    done < /etc/resolv.conf


# --------( Initial Setup - Configure Kernel Parameters )--------

source /etc/firestarter/sysctl-tuning


# --------( Intial Setup - User Defined Pre Script )--------

source /etc/firestarter/user-pre


# --------( Rules Configuration - Specific Rule - Loopback Interfaces )--------

# Allow all traffic on the loopback interface
$IPT -A INPUT -i lo -s 0/0 -d 0/0 -j ACCEPT
$IPT -A OUTPUT -o lo -s 0/0 -d 0/0 -j ACCEPT


# --------( Rules Configuration - Type of Service (ToS) - Ruleset Filtered by GUI )--------

if [ "$FILTER_TOS" = "on" ]; then
    if [ "$TOS_CLIENT" = "on" -a $mangle_supported ]; then
        # ToS: Client Applications
        $IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 20:21 --set-tos $TOSOPT
        $IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 22 --set-tos $TOSOPT
        $IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 68 --set-tos $TOSOPT
        $IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 80 --set-tos $TOSOPT
        $IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 443 --set-tos $TOSOPT
    fi
    if [ "$TOS_SERVER" = "on" -a $mangle_supported ]; then
        # ToS: Server Applications
        $IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 20:21 --set-tos $TOSOPT
        $IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 22 --set-tos $TOSOPT
        $IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 25 --set-tos $TOSOPT
        $IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 53 --set-tos $TOSOPT
        $IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 67 --set-tos $TOSOPT
        $IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 80 --set-tos $TOSOPT
        $IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 110 --set-tos $TOSOPT
        $IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 143 --set-tos $TOSOPT
        $IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 443 --set-tos $TOSOPT
        $IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 1812 --set-tos $TOSOPT
        $IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 1813 --set-tos $TOSOPT
        $IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 2401 --set-tos $TOSOPT
        $IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 8080 --set-tos $TOSOPT
    fi
    if [ "$TOS_SERVER" = "on" -a $mangle_supported ]; then
        # ToS: The X Window System
        $IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 22 --set-tos 0x10
        $IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 6000:6015 --set-tos 0x08
    fi
fi


# --------( Rules Configuration - ICMP )--------

if [ "$FILTER_ICMP" = "on" ]; then
    if [ "$ICMP_ECHO_REQUEST" = "on" ]; then
        # ICMP: Ping Requests
        $IPT -A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s -j ACCEPT
        $IPT -A FORWARD -p icmp --icmp-type echo-request -m limit --limit 1/s -j ACCEPT
    fi
    if [ "$ICMP_ECHO_REPLY" = "on" ]; then
        # ICMP: Ping Replies
        $IPT -A INPUT -p icmp --icmp-type echo-reply -m limit --limit 1/s -j ACCEPT
        $IPT -A FORWARD -p icmp --icmp-type echo-reply -m limit --limit 1/s -j ACCEPT
    fi
    if [ "$ICMP_TRACEROUTE" = "on" ]; then
        # ICMP: Traceroute Requests
        $IPT -A INPUT -p udp --dport 33434 -j ACCEPT
        $IPT -A FORWARD -p udp --dport 33434 -j ACCEPT
    else
        $IPT -A INPUT -p udp --dport 33434 -j LSI
        $IPT -A FORWARD -p udp --dport 33434 -j LSI
    fi
    if [ "$ICMP_MSTRACEROUTE" = "on" ]; then
        # ICMP: MS Traceroute Requests
        $IPT -A INPUT -p icmp --icmp-type destination-unreachable -j ACCEPT
        $IPT -A FORWARD -p icmp --icmp-type destination-unreachable -j ACCEPT
    fi
    if [ "$ICMP_UNREACHABLE" = "on" ]; then
        # ICMP: Unreachable Requests
        $IPT -A INPUT -p icmp --icmp-type host-unreachable -j ACCEPT
        $IPT -A FORWARD -p icmp --icmp-type host-unreachable -j ACCEPT
    fi
    if [ "$ICMP_TIMESTAMPING" = "on" ]; then
        # ICMP: Timestamping Requests
        $IPT -A INPUT -p icmp --icmp-type timestamp-request -j ACCEPT
        $IPT -A INPUT -p icmp --icmp-type timestamp-reply -j ACCEPT
    fi
    if [ "$ICMP_MASKING" = "on" ]; then
        # ICMP: Address Masking
        $IPT -A INPUT -p icmp --icmp-type address-mask-request -j ACCEPT
        $IPT -A INPUT -p icmp --icmp-type address-mask-reply -j ACCEPT
        $IPT -A FORWARD -p icmp --icmp-type address-mask-request -j ACCEPT
        $IPT -A FORWARD -p icmp --icmp-type address-mask-reply -j ACCEPT
    fi
    if [ "$ICMP_REDIRECTION" = "on" ]; then
        # ICMP: Redirection Requests
        $IPT -A INPUT -p icmp --icmp-type redirect -m limit --limit 2/s -j ACCEPT
        $IPT -A FORWARD -p icmp --icmp-type redirect -m limit --limit 2/s -j ACCEPT
    fi
    if [ "$ICMP_SOURCE_QUENCHES" = "on" ]; then
        # ICMP: Source Quench Requests
        $IPT -A INPUT -p icmp --icmp-type source-quench -m limit --limit 2/s -j ACCEPT
        $IPT -A FORWARD -p icmp --icmp-type source-quench -m limit --limit 2/s -j ACCEPT
    fi

    # Catch ICMP traffic not allowed above
    $IPT -A INPUT -p icmp -j LSI
    $IPT -A FORWARD -p icmp -j LSI
else
    # Allow all ICMP traffic when filtering disabled
    $IPT -A INPUT -p icmp -m limit --limit 10/s -j ACCEPT
    $IPT -A FORWARD -p icmp -m limit --limit 10/s -j ACCEPT
fi

if [ "$NAT" = "on" ]; then
    # --------( Rules Configuration - Masquerading - Sysctl Modifications )--------

    #Turn on IP forwarding
    if [ -e /proc/sys/net/ipv4/ip_forward ]; then
        echo 1 > /proc/sys/net/ipv4/ip_forward
    fi

    # --------( Rules Configuration - Masquerading - Default Ruleset )--------

    #TCPMSS Fix - Needed for *many* broken PPPO{A/E} clients
    $IPT -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu

    if [ "$stripoptions_supported" -a "$mangle_supported" ]; then
        #IPv4OPTIONS Fix - Strip IP options from a forwarded packet
        $IPT -t mangle -A PREROUTING -j IPV4OPTSSTRIP
    fi

    # --------( Rules Configuration - Forwarded Traffic )--------

    if [ "$nat_supported" ]; then
        #Masquerade outgoing traffic
        $IPT -t nat -A POSTROUTING -o $IF -j MASQUERADE
    fi

    # Temoporarily set the field separator for CSV format
    OLDIFS=$IFS
    IFS=','

    # Services forward from the firewall to the internal network
    while read service ext_port host int_port garbage
        do
            scrub_parameters
            $IPT -A FORWARD -i $IF -p tcp -d $host --dport $int_port -j ACCEPT
            $IPT -A FORWARD -i $IF -p udp -d $host --dport $int_port -j ACCEPT
            $IPT -A PREROUTING -t nat -i $IF -p tcp --dport $ext_port -j DNAT --to-destination $host:$int_port_dashed
            $IPT -A PREROUTING -t nat -i $IF -p udp --dport $ext_port -j DNAT --to-destination $host:$int_port_dashed
        done < /etc/firestarter/inbound/forward

    IFS=$OLDIFS

fi


# --------( Rules Configuration - Inbound Traffic )--------

if [ "$BLOCK_NON_ROUTABLES" = "on" ]; then
    # Block traffic from non-routable address space on the public interfaces
    $IPT -N NR 2> /dev/null
    $IPT -F NR
    while read block garbage
        do
            $IPT -A NR -s $block -d $NET -i $IF -j LSI
        done < /etc/firestarter/non-routables
    $IPT -A INPUT -s ! $NET -i $IF -j NR
fi

# Block Broadcast Traffic
if [ "$BLOCK_EXTERNAL_BROADCAST" = "on" ]; then
    $IPT -A INPUT -i $IF -d 255.255.255.255 -j DROP
    if [ "$BCAST" != "" ]; then
        $IPT -A INPUT -d $BCAST -j DROP
    fi
fi

if [ "$NAT" = "on" -a "$BLOCK_INTERNAL_BROADCAST" = "on" ]; then
    $IPT -A INPUT -i $INIF -d 255.255.255.255 -j DROP
    if [ "$INBCAST" != "" ]; then
        $IPT -A INPUT -i $INIF -d $INBCAST -j DROP
    fi
fi

# Block Multicast Traffic
#  Some cable/DSL providers require their clients to accept multicast transmissions
#  you should remove the following four rules if you are affected by multicasting
$IPT -A INPUT -s 224.0.0.0/8 -d 0/0 -j DROP
$IPT -A INPUT -s 0/0 -d 224.0.0.0/8 -j DROP
$IPT -A OUTPUT -s 224.0.0.0/8 -d 0/0 -j DROP
$IPT -A OUTPUT -s 0/0 -d 224.0.0.0/8 -j DROP

# Block Traffic with Stuffed Routing
#  Early versions of PUMP - (the DHCP client application included in RH / Mandrake) require
#  inbound packets to be accepted from a source address of 255.255.255.255.  If you have issues
#  with DHCP clients on your local LAN - either update PUMP, or remove the first rule below)
$IPT -A INPUT -s 255.255.255.255 -j DROP
$IPT -A INPUT -d 0.0.0.0 -j DROP
$IPT -A OUTPUT -s 255.255.255.255 -j DROP
$IPT -A OUTPUT -d 0.0.0.0 -j DROP

$IPT -A INPUT -m state --state INVALID -j DROP # Block Traffic with Invalid Flags
$IPT -A INPUT -f -m limit --limit 10/minute -j LSI # Block Traffic w/ Excessive Fragmented Packets

# --------( Rules Configuration - Outbound Traffic )--------

$IPT -A OUTPUT -m state --state INVALID -j DROP # Block Traffic w/ Invalid Flags


# --------( Traffic Policy )--------

# Load the inbound traffic policy
source /etc/firestarter/inbound/setup
$IPT -A INPUT -i $IF -j INBOUND # Check Internet to firewall traffic
if [ "$NAT" = "on" ]; then
    $IPT -A INPUT -i $INIF -d $INIP -j INBOUND # Check LAN to firewall (private ip) traffic
    $IPT -A INPUT -i $INIF -d $IP -j INBOUND   # Check LAN to firewall (public ip) traffic
    if [ "$INBCAST" != "" ]; then
        $IPT -A INPUT -i $INIF -d $INBCAST -j INBOUND # Check LAN to firewall broadcast traffic
    fi
fi

# Load the outbound traffic policy
source /etc/firestarter/outbound/setup
$IPT -A OUTPUT -o $IF -j OUTBOUND # Check firewall to Internet traffic
if [ "$NAT" = "on" ]; then
    $IPT -A OUTPUT -o $INIF -j OUTBOUND  # Check firewall to LAN traffic
    $IPT -A FORWARD -i $INIF -j OUTBOUND # Check LAN to Internet traffic

    # Allow Internet to LAN response traffic
    $IPT -A FORWARD -p tcp -d $INNET -m state --state ESTABLISHED,RELATED -j ACCEPT
    $IPT -A FORWARD -p udp -d $INNET -m state --state ESTABLISHED,RELATED -j ACCEPT
fi

# --------( User Defined Post Script )--------

source /etc/firestarter/user-post


# --------( Unsupported Traffic Catch-All )--------

$IPT -A INPUT -j LOG_FILTER
$IPT -A INPUT -j LOG --log-level=$LOG_LEVEL --log-prefix "Unknown Input"
$IPT -A OUTPUT -j LOG_FILTER
$IPT -A OUTPUT -j LOG --log-level=$LOG_LEVEL --log-prefix "Unknown Output"
$IPT -A FORWARD -j LOG_FILTER
$IPT -A FORWARD -j LOG --log-level=$LOG_LEVEL --log-prefix "Unknown Forward"

return 0

http://i32.photobucket.com/albums/d33/marcusdavidus/marcussyg.png
C2D E8400, Asus P5N7A-VM, 2x 1gb DDR2 OCZ Reaper 1066, Baracuda 500GB S12 SataII,PSU OCZ stealthXstream 500W, Cooler Asus Triton 77, Buda Cooler Master Elite ,Keys  A4T X7 , Mysz A4T X7 , creative HD1900, Zotac GTX260 AMP2 core 216,Oczka Dell P1130 FD Trinitron

Offline

 

#2  2007-12-04 16:43:29

  marcusdavidus - Członek DUG

marcusdavidus
Członek DUG
Skąd: z nienacka
Zarejestrowany: 2006-09-08
Serwis

Re: iptables czy dobry skrypt

masz tgier

Kod:

Chain INPUT (policy DROP)
target     prot opt source               destination         
ACCEPT     tcp  --  localhost.localdomain  anywhere            tcp flags:!FIN,SYN,RST,ACK/SYN 
ACCEPT     udp  --  localhost.localdomain  anywhere            
ACCEPT     tcp  --  ks36523.kimsufi.com  anywhere            tcp flags:!FIN,SYN,RST,ACK/SYN 
ACCEPT     udp  --  ks36523.kimsufi.com  anywhere            
ACCEPT     tcp  --  cdns.ovh.net         anywhere            tcp flags:!FIN,SYN,RST,ACK/SYN 
ACCEPT     udp  --  cdns.ovh.net         anywhere            
ACCEPT     0    --  anywhere             anywhere            
LSI        udp  --  anywhere             anywhere            udp dpt:33434 
LSI        icmp --  anywhere             anywhere            
DROP       0    --  anywhere             255.255.255.255     
DROP       0    --  anywhere             87.98.218.255       
DROP       0    --  BASE-ADDRESS.MCAST.NET/8  anywhere            
DROP       0    --  anywhere             BASE-ADDRESS.MCAST.NET/8 
DROP       0    --  255.255.255.255      anywhere            
DROP       0    --  anywhere             default             
DROP       0    --  anywhere             anywhere            state INVALID 
LSI        0    -f  anywhere             anywhere            limit: avg 10/min burst 5 
INBOUND    0    --  anywhere             anywhere            
LOG_FILTER  0    --  anywhere             anywhere            
LOG        0    --  anywhere             anywhere            LOG level info prefix `Unknown Input' 

Chain FORWARD (policy DROP)
target     prot opt source               destination         
LSI        udp  --  anywhere             anywhere            udp dpt:33434 
LSI        icmp --  anywhere             anywhere            
LOG_FILTER  0    --  anywhere             anywhere            
LOG        0    --  anywhere             anywhere            LOG level info prefix `Unknown Forward' 

Chain OUTPUT (policy DROP)
target     prot opt source               destination         
ACCEPT     tcp  --  ks36523.kimsufi.com  localhost.localdomain tcp dpt:domain 
ACCEPT     udp  --  ks36523.kimsufi.com  localhost.localdomain udp dpt:domain 
ACCEPT     tcp  --  ks36523.kimsufi.com  ks36523.kimsufi.com tcp dpt:domain 
ACCEPT     udp  --  ks36523.kimsufi.com  ks36523.kimsufi.com udp dpt:domain 
ACCEPT     tcp  --  ks36523.kimsufi.com  cdns.ovh.net        tcp dpt:domain 
ACCEPT     udp  --  ks36523.kimsufi.com  cdns.ovh.net        udp dpt:domain 
ACCEPT     0    --  anywhere             anywhere            
DROP       0    --  BASE-ADDRESS.MCAST.NET/8  anywhere            
DROP       0    --  anywhere             BASE-ADDRESS.MCAST.NET/8 
DROP       0    --  255.255.255.255      anywhere            
DROP       0    --  anywhere             default             
DROP       0    --  anywhere             anywhere            state INVALID 
OUTBOUND   0    --  anywhere             anywhere            
LOG_FILTER  0    --  anywhere             anywhere            
LOG        0    --  anywhere             anywhere            LOG level info prefix `Unknown Output' 

Chain INBOUND (1 references)
target     prot opt source               destination         
ACCEPT     tcp  --  anywhere             anywhere            state RELATED,ESTABLISHED 
ACCEPT     udp  --  anywhere             anywhere            state RELATED,ESTABLISHED 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpts:ftp-data:ftp 
ACCEPT     udp  --  anywhere             anywhere            udp dpts:20:fsp 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:ssh 
ACCEPT     udp  --  anywhere             anywhere            udp dpt:ssh 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:5902 
ACCEPT     udp  --  anywhere             anywhere            udp dpt:5902 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:webcache 
ACCEPT     udp  --  anywhere             anywhere            udp dpt:8080 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:5901 
ACCEPT     udp  --  anywhere             anywhere            udp dpt:5901 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:www 
ACCEPT     udp  --  anywhere             anywhere            udp dpt:www 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:81 
ACCEPT     udp  --  anywhere             anywhere            udp dpt:81 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:https 
ACCEPT     udp  --  anywhere             anywhere            udp dpt:https 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpts:8000:8100 
ACCEPT     udp  --  anywhere             anywhere            udp dpts:8000:8100 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:tproxy 
ACCEPT     udp  --  anywhere             anywhere            udp dpt:8081 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpts:6881:6889 
ACCEPT     udp  --  anywhere             anywhere            udp dpts:6881:6889 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:52904 
ACCEPT     udp  --  anywhere             anywhere            udp dpt:52904 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:30720 
ACCEPT     udp  --  anywhere             anywhere            udp dpt:30720 
LSI        0    --  anywhere             anywhere            

Chain LOG_FILTER (5 references)
target     prot opt source               destination         

Chain LSI (6 references)
target     prot opt source               destination         
LOG_FILTER  0    --  anywhere             anywhere            
LOG        tcp  --  anywhere             anywhere            tcp flags:FIN,SYN,RST,ACK/SYN limit: avg 1/sec burst 5 LOG level info prefix `Inbound ' 
DROP       tcp  --  anywhere             anywhere            tcp flags:FIN,SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            tcp flags:FIN,SYN,RST,ACK/RST limit: avg 1/sec burst 5 LOG level info prefix `Inbound ' 
DROP       tcp  --  anywhere             anywhere            tcp flags:FIN,SYN,RST,ACK/RST 
LOG        icmp --  anywhere             anywhere            icmp echo-request limit: avg 1/sec burst 5 LOG level info prefix `Inbound ' 
DROP       icmp --  anywhere             anywhere            icmp echo-request 
LOG        0    --  anywhere             anywhere            limit: avg 5/sec burst 5 LOG level info prefix `Inbound ' 
DROP       0    --  anywhere             anywhere            

Chain LSO (2 references)
target     prot opt source               destination         
LOG_FILTER  0    --  anywhere             anywhere            
LOG        0    --  anywhere             anywhere            limit: avg 5/sec burst 5 LOG level info prefix `Outbound ' 
REJECT     0    --  anywhere             anywhere            reject-with icmp-port-unreachable 

Chain OUTBOUND (1 references)
target     prot opt source               destination         
ACCEPT     icmp --  anywhere             anywhere            
ACCEPT     tcp  --  anywhere             anywhere            state RELATED,ESTABLISHED 
ACCEPT     udp  --  anywhere             anywhere            state RELATED,ESTABLISHED 
LSO        0    --  anywhere             usa01.rsvmedia.com  
LSO        0    --  anywhere             pu-biologia.evrocom.net 
ACCEPT     0    --  anywhere             anywhere

http://i32.photobucket.com/albums/d33/marcusdavidus/marcussyg.png
C2D E8400, Asus P5N7A-VM, 2x 1gb DDR2 OCZ Reaper 1066, Baracuda 500GB S12 SataII,PSU OCZ stealthXstream 500W, Cooler Asus Triton 77, Buda Cooler Master Elite ,Keys  A4T X7 , Mysz A4T X7 , creative HD1900, Zotac GTX260 AMP2 core 216,Oczka Dell P1130 FD Trinitron

Offline

 

Stopka forum

Powered by PunBB
© Copyright 2002–2005 Rickard Andersson
Nas ludzie lubią po prostu, a nie klikając w przyciski ;-)