Re: [Linux-ag] iptables forward dns cozumleme hakkında

---------

New Message Reply About this list Date view Thread view Subject view Author view Attachment view

From: mesut guler (mesut@egemenyazilim.com)
Date: Sat 06 Nov 2004 - 14:46:23 EET


serkansoker wrote:

> Merhaba ;
>
> Basit bir iptables kodu yazdım. Lokaldaki pclerde dns
> cözümlitemiyorum. ( ip bazlı sitele gidebiliyorum )
> ne yapmam gerekir ?
>
> tesekkurler
> Serkan
>
>
> **************************************************************************************
> # Tum gelen ve yonlendirilen paketler ontanimli olarak reddediliyor.
> /sbin/iptables -P INPUT DROP
> /sbin/iptables -P OUTPUT DROP
> /sbin/iptables -P FORWARD DROP
> # Loopback aygiti icin kurallari ontanimli kabul olarak ayarlanmasi.
> /sbin/iptables -A INPUT -i lo -j ACCEPT
> /sbin/iptables -A OUTPUT -o lo -j ACCEPT
>
> # Belirli portlara yonlendirme
> /sbin/iptables -t nat -A POSTROUTING -p tcp --dport 25 -j MASQUERADE
> /sbin/iptables -t nat -A POSTROUTING -p tcp --dport 53 -j MASQUERADE
> /sbin/iptables -t nat -A POSTROUTING -p udp --dport 53 -j MASQUERADE
> /sbin/iptables -t nat -A POSTROUTING -p tcp --dport 80 -j MASQUERADE
> /sbin/iptables -t nat -A POSTROUTING -p tcp --dport 110 -j MASQUERADE
> /sbin/iptables -t nat -A POSTROUTING -p tcp --dport 443 -j MASQUERADE
> /sbin/iptables -A FORWARD -p tcp -m state --state NEW,ESTABLISHED -j
> ACCEPT
> *************************************************************************************************
>
>------------------------------------------------------------------------
>
>_______________________________________________
>Linux-ag mailing list
>Linux-ag@liste.linux.org.tr
>http://liste.linux.org.tr/mailman/listinfo/linux-ag
>
>

yasaklama amaciyla, port bazinda MASQUERADE uygulamak bence pek mantikli
degil. onun yerine yerel agdan gelen ve internete giden isteklerein
hepsine MASQUERADE uygulayin. FORWARD den ise sadece gecisini
istediginiz dns,smtp,pop3,http gibi portlara izin verin. boylece sadece
bu istekler haricindekiler forward zincirinde postrouting e erisemeden
bloklanacaktir.

sorununuzu ise clientlara domain adi cozumlemesi icin dns olarak ISP nin
dns serverlarinin ipsini verin.

ornek olarak su kurallari kullanabilirsiniz:

*nat
:PREROUTING ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
[0:0] -A POSTROUTING -s 192.168.0.0/255.255.255.0 -j MASQUERADE
COMMIT
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
[0:0] -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
[0:0] -A INPUT -i lo -j ACCEPT
[0:0] -A INPUT -i eth0 -s 192.168.0.0/255.255.255.0 -j ACCEPT
[0:0] -A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
[0:0] -A FORWARD -i eth0 -s 192.168.0.0/255.255.255.0 -p tcp -m
multiport --dports smtp,domain,http,https,pop3 -j ACCEPT
[0:0] -A FORWARD -i eth0 -s 192.168.0.0/255.255.255.0 -p tcp -m udp
--dport domain -j ACCEPT
COMMIT

burda:
yerel ag: 192.168.0.0/24
yerel aga bagli ethernet: eth0

kolay gelsin.

-- 
Mesut Guler
Egemen Yazilim

_______________________________________________
Linux-ag mailing list
Linux-ag@liste.linux.org.tr
http://liste.linux.org.tr/mailman/listinfo/linux-ag


New Message Reply About this list Date view Thread view Subject view Author view Attachment view

---------

Bu arsiv hypermail 2.1.2 tarafindan uretilmistir.