Hello all. Over the weekend, one of our servers pooped out (still looking into WHY...) and we were forced to have Visi reboot the thing. After a reboot, everything seemed to be working a-ok with one exception. Some websites were completely unaccessible. After briefly looking at logs, it seems that the IPTables firewall on the machine was dropping incoming packets for port 80. I ran my script to remove all the FW rules and completely open it up, and the site was accessible again. I then ran the fw script and added all the rules back again and it still worked. The fw should be set up to allow incoming "NEW" connections from anyone on ports 80 and 443. Another rule allows established connections as well. This leads me to believe that the connection tracking somehow got messed up (although I'm not sure). What I am wondering is: 1) what causes this? 2) how can i prevent this? 3) is there anything wrong with my script? I use fwbuilder locally to manage the fw script. This tends to create a somewhat complex iptables script, but I am familiar with it and it should be working just fine. It's not too bad once you understand how it decides to do things. If anyone wants a brief overview of the script to help a little bit with my issue I'll gladly provide it. Does anyone have any insight or tips to deal with this strange issue? Here is my script: =============================================================================== #!/bin/sh # # This is automatically generated file. DO NOT MODIFY ! # # Firewall Builder fwb_ipt v2.0.12-1 # # Generated Mon Sep 18 16:52:34 2006 Central Daylight Time by mbditt # # files: * silverback.fw # # # # # # PATH="/sbin:/usr/sbin:/bin:/usr/bin:${PATH}" export PATH # # Prolog script # # # End of prolog script # log() { echo "$1" test -x "$LOGGER" && $LOGGER -p info "$1" } va_num=1 add_addr() { addr=$1 nm=$2 dev=$3 type="" aadd="" L=`$IP -4 link ls $dev | head -n1` if test -n "$L"; then OIFS=$IFS IFS=" /:,<" set $L type=$4 IFS=$OIFS L=`$IP -4 addr ls $dev to $addr | grep inet | grep -v :` if test -n "$L"; then OIFS=$IFS IFS=" /" set $L aadd=$2 IFS=$OIFS fi fi if test -z "$aadd"; then if test "$type" = "POINTOPOINT"; then $IP -4 addr add $addr dev $dev scope global label $dev:FWB${va_num} va_num=`expr $va_num + 1` fi if test "$type" = "BROADCAST"; then $IP -4 addr add $addr/$nm dev $dev brd + scope global label $dev:FWB${va_num} va_num=`expr $va_num + 1` fi fi } getInterfaceVarName() { echo $1 | sed 's/\./_/' } getaddr() { dev=$1 name=$2 L=`$IP -4 addr show dev $dev | grep inet | grep -v :` test -z "$L" && { eval "$name=''" return } OIFS=$IFS IFS=" /" set $L eval "$name=$2" IFS=$OIFS } getinterfaces() { NAME=$1 $IP link show | grep ": $NAME" | while read L; do OIFS=$IFS IFS=" :" set $L IFS=$OIFS echo $2 done } LSMOD="/bin/lsmod" MODPROBE="/sbin/modprobe" IPTABLES="/sbin/iptables" IPTABLES_RESTORE="iptables-restore" IP="/sbin/ip" LOGGER="logger" if $IP link ls >/dev/null 2>&1; then echo; else echo "iproute not found" exit 1 fi INTERFACES="eth1 lo eth0 " for i in $INTERFACES ; do $IP link show "$i" > /dev/null 2>&1 || { log "Interface $i does not exist" exit 1 } done $IP -4 neigh flush dev eth1 >/dev/null 2>&1 $IP -4 addr flush dev eth1 secondary label "eth1:FWB*" >/dev/null 2>&1 $IP -4 neigh flush dev eth0 >/dev/null 2>&1 $IP -4 addr flush dev eth0 secondary label "eth0:FWB*" >/dev/null 2>&1 MODULE_DIR="/lib/modules/`uname -r`/kernel/net/ipv4/netfilter/" MODULES=`(cd $MODULE_DIR; ls *_conntrack* | sed -n -e 's/\.ko$//p' -e 's/\.o$//p' -e 's/\.ko\.gz$//p' -e 's/\.o\.gz$//p')` for module in $MODULES; do if $LSMOD | grep ${module} >/dev/null; then continue; fi $MODPROBE ${module} || exit 1 done log 'Activating firewall script generated Mon Sep 18 16:52:34 2006 by mbditt' $IPTABLES -P OUTPUT DROP $IPTABLES -P INPUT DROP $IPTABLES -P FORWARD DROP ip6tables -L -n > /dev/null 2>&1 && { ip6tables -P OUTPUT DROP ip6tables -P INPUT DROP ip6tables -P FORWARD DROP } cat /proc/net/ip_tables_names | while read table; do test "X$table" = "Xmangle" && continue $IPTABLES -t $table -L -n | while read c chain rest; do if test "X$c" = "XChain" ; then $IPTABLES -t $table -F $chain fi done $IPTABLES -t $table -X done $IPTABLES -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT $IPTABLES -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT $IPTABLES -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT # # Rule 0 (eth1) # echo "Rule 0 (eth1)" # # # $IPTABLES -A INPUT -i eth1 -s 63.87.118.237 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i eth1 -s 63.87.118.237 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -o eth1 -s 63.87.118.237 -m state --state NEW -j ACCEPT # # Rule 1 (eth1) # echo "Rule 1 (eth1)" # # # $IPTABLES -A INPUT -i eth1 -s 208.42.166.161 -m state --state NEW -j ACCEPT $IPTABLES -A INPUT -i eth1 -s 208.42.166.162 -m state --state NEW -j ACCEPT $IPTABLES -A INPUT -i eth1 -s 208.42.166.163 -m state --state NEW -j ACCEPT $IPTABLES -A INPUT -i eth1 -s 208.42.166.164 -m state --state NEW -j ACCEPT $IPTABLES -A INPUT -i eth1 -s 208.42.166.165 -m state --state NEW -j ACCEPT $IPTABLES -A INPUT -i eth1 -s 10.60.100.18 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i eth1 -s 208.42.166.161 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i eth1 -s 208.42.166.162 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i eth1 -s 208.42.166.163 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i eth1 -s 208.42.166.164 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i eth1 -s 208.42.166.165 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i eth1 -s 10.60.100.18 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o eth1 -s 208.42.166.161 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o eth1 -s 208.42.166.162 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o eth1 -s 208.42.166.163 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o eth1 -s 208.42.166.164 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o eth1 -s 208.42.166.165 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o eth1 -s 10.60.100.18 -m state --state NEW -j ACCEPT # # Rule 2 (eth1) # echo "Rule 2 (eth1)" # # # $IPTABLES -N eth1_In_RULE_2 $IPTABLES -A INPUT -i eth1 -s 218.25.62.92 -j eth1_In_RULE_2 $IPTABLES -A INPUT -i eth1 -s 69.226.3.135 -j eth1_In_RULE_2 $IPTABLES -A INPUT -i eth1 -s 207.54.140.114 -j eth1_In_RULE_2 $IPTABLES -A INPUT -i eth1 -s 202.131.224.36 -j eth1_In_RULE_2 $IPTABLES -A INPUT -i eth1 -s 203.131.100.37 -j eth1_In_RULE_2 $IPTABLES -A INPUT -i eth1 -s 219.154.95.4 -j eth1_In_RULE_2 $IPTABLES -A INPUT -i eth1 -s 213.80.123.21 -j eth1_In_RULE_2 $IPTABLES -A INPUT -i eth1 -s 207.176.226.30 -j eth1_In_RULE_2 $IPTABLES -A INPUT -i eth1 -s 210.244.225.13 -j eth1_In_RULE_2 $IPTABLES -A INPUT -i eth1 -s 12.110.109.8 -j eth1_In_RULE_2 $IPTABLES -A INPUT -i eth1 -s 193.255.156.236 -j eth1_In_RULE_2 $IPTABLES -A INPUT -i eth1 -s 211.233.15.187 -j eth1_In_RULE_2 $IPTABLES -A INPUT -i eth1 -s 210.9.92.124 -j eth1_In_RULE_2 $IPTABLES -A INPUT -i eth1 -s 61.131.98.198 -j eth1_In_RULE_2 $IPTABLES -A INPUT -i eth1 -s 69.64.50.175 -j eth1_In_RULE_2 $IPTABLES -A INPUT -i eth1 -s 212.50.21.10 -j eth1_In_RULE_2 $IPTABLES -A INPUT -i eth1 -s 211.234.125.141 -j eth1_In_RULE_2 $IPTABLES -A INPUT -i eth1 -s 210.13.41.1 -j eth1_In_RULE_2 $IPTABLES -A INPUT -i eth1 -s 163.16.187.253 -j eth1_In_RULE_2 $IPTABLES -A INPUT -i eth1 -s 125.251.116.2 -j eth1_In_RULE_2 $IPTABLES -A INPUT -i eth1 -s 200.245.0.170 -j eth1_In_RULE_2 $IPTABLES -A FORWARD -i eth1 -s 218.25.62.92 -j eth1_In_RULE_2 $IPTABLES -A FORWARD -i eth1 -s 69.226.3.135 -j eth1_In_RULE_2 $IPTABLES -A FORWARD -i eth1 -s 207.54.140.114 -j eth1_In_RULE_2 $IPTABLES -A FORWARD -i eth1 -s 202.131.224.36 -j eth1_In_RULE_2 $IPTABLES -A FORWARD -i eth1 -s 203.131.100.37 -j eth1_In_RULE_2 $IPTABLES -A FORWARD -i eth1 -s 219.154.95.4 -j eth1_In_RULE_2 $IPTABLES -A FORWARD -i eth1 -s 213.80.123.21 -j eth1_In_RULE_2 $IPTABLES -A FORWARD -i eth1 -s 207.176.226.30 -j eth1_In_RULE_2 $IPTABLES -A FORWARD -i eth1 -s 210.244.225.13 -j eth1_In_RULE_2 $IPTABLES -A FORWARD -i eth1 -s 12.110.109.8 -j eth1_In_RULE_2 $IPTABLES -A FORWARD -i eth1 -s 193.255.156.236 -j eth1_In_RULE_2 $IPTABLES -A FORWARD -i eth1 -s 211.233.15.187 -j eth1_In_RULE_2 $IPTABLES -A FORWARD -i eth1 -s 210.9.92.124 -j eth1_In_RULE_2 $IPTABLES -A FORWARD -i eth1 -s 61.131.98.198 -j eth1_In_RULE_2 $IPTABLES -A FORWARD -i eth1 -s 69.64.50.175 -j eth1_In_RULE_2 $IPTABLES -A FORWARD -i eth1 -s 212.50.21.10 -j eth1_In_RULE_2 $IPTABLES -A FORWARD -i eth1 -s 211.234.125.141 -j eth1_In_RULE_2 $IPTABLES -A FORWARD -i eth1 -s 210.13.41.1 -j eth1_In_RULE_2 $IPTABLES -A FORWARD -i eth1 -s 163.16.187.253 -j eth1_In_RULE_2 $IPTABLES -A FORWARD -i eth1 -s 125.251.116.2 -j eth1_In_RULE_2 $IPTABLES -A FORWARD -i eth1 -s 200.245.0.170 -j eth1_In_RULE_2 $IPTABLES -A eth1_In_RULE_2 -j LOG --log-level info --log-prefix "RULE 2 -- DENY " $IPTABLES -A eth1_In_RULE_2 -j DROP $IPTABLES -N eth1_Out_RULE_2 $IPTABLES -A FORWARD -o eth1 -s 218.25.62.92 -j eth1_Out_RULE_2 $IPTABLES -A FORWARD -o eth1 -s 69.226.3.135 -j eth1_Out_RULE_2 $IPTABLES -A FORWARD -o eth1 -s 207.54.140.114 -j eth1_Out_RULE_2 $IPTABLES -A FORWARD -o eth1 -s 202.131.224.36 -j eth1_Out_RULE_2 $IPTABLES -A FORWARD -o eth1 -s 203.131.100.37 -j eth1_Out_RULE_2 $IPTABLES -A FORWARD -o eth1 -s 219.154.95.4 -j eth1_Out_RULE_2 $IPTABLES -A FORWARD -o eth1 -s 213.80.123.21 -j eth1_Out_RULE_2 $IPTABLES -A FORWARD -o eth1 -s 207.176.226.30 -j eth1_Out_RULE_2 $IPTABLES -A FORWARD -o eth1 -s 210.244.225.13 -j eth1_Out_RULE_2 $IPTABLES -A FORWARD -o eth1 -s 12.110.109.8 -j eth1_Out_RULE_2 $IPTABLES -A FORWARD -o eth1 -s 193.255.156.236 -j eth1_Out_RULE_2 $IPTABLES -A FORWARD -o eth1 -s 211.233.15.187 -j eth1_Out_RULE_2 $IPTABLES -A FORWARD -o eth1 -s 210.9.92.124 -j eth1_Out_RULE_2 $IPTABLES -A FORWARD -o eth1 -s 61.131.98.198 -j eth1_Out_RULE_2 $IPTABLES -A FORWARD -o eth1 -s 69.64.50.175 -j eth1_Out_RULE_2 $IPTABLES -A FORWARD -o eth1 -s 212.50.21.10 -j eth1_Out_RULE_2 $IPTABLES -A FORWARD -o eth1 -s 211.234.125.141 -j eth1_Out_RULE_2 $IPTABLES -A FORWARD -o eth1 -s 210.13.41.1 -j eth1_Out_RULE_2 $IPTABLES -A FORWARD -o eth1 -s 163.16.187.253 -j eth1_Out_RULE_2 $IPTABLES -A FORWARD -o eth1 -s 125.251.116.2 -j eth1_Out_RULE_2 $IPTABLES -A FORWARD -o eth1 -s 200.245.0.170 -j eth1_Out_RULE_2 $IPTABLES -A eth1_Out_RULE_2 -j LOG --log-level info --log-prefix "RULE 2 -- DENY " $IPTABLES -A eth1_Out_RULE_2 -j DROP # # Rule 3 (eth1) # echo "Rule 3 (eth1)" # # Allow web service. # $IPTABLES -N Cid4411F136.0 $IPTABLES -A INPUT -i eth1 -p tcp -m tcp -m multiport --dports 80,443 -m state --state NEW -j Cid4411F136.0 $IPTABLES -A Cid4411F136.0 -d 208.42.166.161 -j ACCEPT $IPTABLES -A Cid4411F136.0 -d 208.42.166.162 -j ACCEPT $IPTABLES -A Cid4411F136.0 -d 208.42.166.163 -j ACCEPT $IPTABLES -A Cid4411F136.0 -d 208.42.166.164 -j ACCEPT $IPTABLES -A Cid4411F136.0 -d 208.42.166.165 -j ACCEPT $IPTABLES -A Cid4411F136.0 -d 10.60.100.18 -j ACCEPT # # Rule 4 (eth1) # echo "Rule 4 (eth1)" # # # $IPTABLES -N Cid4411DDEC.0 $IPTABLES -A INPUT -i eth1 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid4411DDEC.0 $IPTABLES -A Cid4411DDEC.0 -d 208.42.166.161 -j ACCEPT $IPTABLES -A Cid4411DDEC.0 -d 208.42.166.162 -j ACCEPT $IPTABLES -A Cid4411DDEC.0 -d 208.42.166.163 -j ACCEPT $IPTABLES -A Cid4411DDEC.0 -d 208.42.166.164 -j ACCEPT $IPTABLES -A Cid4411DDEC.0 -d 208.42.166.165 -j ACCEPT $IPTABLES -A Cid4411DDEC.0 -d 10.60.100.18 -j ACCEPT # # Rule 5 (eth1) # echo "Rule 5 (eth1)" # # Allow DNS queries. # $IPTABLES -N Cid441AFEAF.0 $IPTABLES -A INPUT -i eth1 -p tcp -m tcp --dport 53 -m state --state NEW -j Cid441AFEAF.0 $IPTABLES -A INPUT -i eth1 -p udp -m udp --dport 53 -m state --state NEW -j Cid441AFEAF.0 $IPTABLES -A Cid441AFEAF.0 -d 208.42.166.161 -j ACCEPT $IPTABLES -A Cid441AFEAF.0 -d 208.42.166.162 -j ACCEPT $IPTABLES -A Cid441AFEAF.0 -d 208.42.166.163 -j ACCEPT $IPTABLES -A Cid441AFEAF.0 -d 208.42.166.164 -j ACCEPT $IPTABLES -A Cid441AFEAF.0 -d 208.42.166.165 -j ACCEPT $IPTABLES -A Cid441AFEAF.0 -d 10.60.100.18 -j ACCEPT # # Rule 6 (eth1) # echo "Rule 6 (eth1)" # # Allow Email # $IPTABLES -N Cid441B04DF.0 $IPTABLES -A INPUT -i eth1 -p tcp -m tcp -m multiport --dports 143,25 -m state --state NEW -j Cid441B04DF.0 $IPTABLES -A Cid441B04DF.0 -d 208.42.166.161 -j ACCEPT $IPTABLES -A Cid441B04DF.0 -d 208.42.166.162 -j ACCEPT $IPTABLES -A Cid441B04DF.0 -d 208.42.166.163 -j ACCEPT $IPTABLES -A Cid441B04DF.0 -d 208.42.166.164 -j ACCEPT $IPTABLES -A Cid441B04DF.0 -d 208.42.166.165 -j ACCEPT $IPTABLES -A Cid441B04DF.0 -d 10.60.100.18 -j ACCEPT $IPTABLES -N Cid441B04DF.1 $IPTABLES -A OUTPUT -o eth1 -p tcp -m tcp -m multiport --dports 143,25 -m state --state NEW -j Cid441B04DF.1 $IPTABLES -A Cid441B04DF.1 -d 208.42.166.161 -j ACCEPT $IPTABLES -A Cid441B04DF.1 -d 208.42.166.162 -j ACCEPT $IPTABLES -A Cid441B04DF.1 -d 208.42.166.163 -j ACCEPT $IPTABLES -A Cid441B04DF.1 -d 208.42.166.164 -j ACCEPT $IPTABLES -A Cid441B04DF.1 -d 208.42.166.165 -j ACCEPT $IPTABLES -A Cid441B04DF.1 -d 10.60.100.18 -j ACCEPT $IPTABLES -N Cid441B04DF.2 $IPTABLES -A FORWARD -o eth1 -p tcp -m tcp -m multiport --dports 143,25 -m state --state NEW -j Cid441B04DF.2 $IPTABLES -A Cid441B04DF.2 -d 208.42.166.161 -j ACCEPT $IPTABLES -A Cid441B04DF.2 -d 208.42.166.162 -j ACCEPT $IPTABLES -A Cid441B04DF.2 -d 208.42.166.163 -j ACCEPT $IPTABLES -A Cid441B04DF.2 -d 208.42.166.164 -j ACCEPT $IPTABLES -A Cid441B04DF.2 -d 208.42.166.165 -j ACCEPT $IPTABLES -A Cid441B04DF.2 -d 10.60.100.18 -j ACCEPT # # Rule 7 (eth1) # echo "Rule 7 (eth1)" # # Allow Pings # $IPTABLES -N Cid4509C13E.0 $IPTABLES -A INPUT -i eth1 -p icmp -m icmp --icmp-type 8/0 -m state --state NEW -j Cid4509C13E.0 $IPTABLES -A Cid4509C13E.0 -d 208.42.166.161 -j ACCEPT $IPTABLES -A Cid4509C13E.0 -d 208.42.166.162 -j ACCEPT $IPTABLES -A Cid4509C13E.0 -d 208.42.166.163 -j ACCEPT $IPTABLES -A Cid4509C13E.0 -d 208.42.166.164 -j ACCEPT $IPTABLES -A Cid4509C13E.0 -d 208.42.166.165 -j ACCEPT $IPTABLES -A Cid4509C13E.0 -d 10.60.100.18 -j ACCEPT # # Rule 0 (lo) # echo "Rule 0 (lo)" # # # $IPTABLES -A INPUT -i lo -s 208.42.166.161 -m state --state NEW -j ACCEPT $IPTABLES -A INPUT -i lo -s 208.42.166.162 -m state --state NEW -j ACCEPT $IPTABLES -A INPUT -i lo -s 208.42.166.163 -m state --state NEW -j ACCEPT $IPTABLES -A INPUT -i lo -s 208.42.166.164 -m state --state NEW -j ACCEPT $IPTABLES -A INPUT -i lo -s 208.42.166.165 -m state --state NEW -j ACCEPT $IPTABLES -A INPUT -i lo -s 127.0.0.1 -m state --state NEW -j ACCEPT $IPTABLES -A INPUT -i lo -s 10.60.100.18 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i lo -s 208.42.166.161 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i lo -s 208.42.166.162 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i lo -s 208.42.166.163 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i lo -s 208.42.166.164 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i lo -s 208.42.166.165 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i lo -s 127.0.0.1 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i lo -s 10.60.100.18 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o lo -s 208.42.166.161 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o lo -s 208.42.166.162 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o lo -s 208.42.166.163 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o lo -s 208.42.166.164 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o lo -s 208.42.166.165 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o lo -s 127.0.0.1 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o lo -s 10.60.100.18 -m state --state NEW -j ACCEPT # # Rule 1 (eth0) # echo "Rule 1 (eth0)" # # # $IPTABLES -N Cid448ED21F.0 $IPTABLES -A INPUT -i eth0 -d 10.60.100.18 -m state --state NEW -j Cid448ED21F.0 $IPTABLES -A Cid448ED21F.0 -p icmp -m icmp --icmp-type any -j ACCEPT $IPTABLES -A Cid448ED21F.0 -p tcp -m tcp --dport 873 -j ACCEPT # # Rule 2 (eth0) # echo "Rule 2 (eth0)" # # # $IPTABLES -A INPUT -i eth0 -s 208.42.166.161 -m state --state NEW -j ACCEPT $IPTABLES -A INPUT -i eth0 -s 208.42.166.162 -m state --state NEW -j ACCEPT $IPTABLES -A INPUT -i eth0 -s 208.42.166.163 -m state --state NEW -j ACCEPT $IPTABLES -A INPUT -i eth0 -s 208.42.166.164 -m state --state NEW -j ACCEPT $IPTABLES -A INPUT -i eth0 -s 208.42.166.165 -m state --state NEW -j ACCEPT $IPTABLES -A INPUT -i eth0 -s 10.60.100.18 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i eth0 -s 208.42.166.161 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i eth0 -s 208.42.166.162 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i eth0 -s 208.42.166.163 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i eth0 -s 208.42.166.164 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i eth0 -s 208.42.166.165 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i eth0 -s 10.60.100.18 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o eth0 -s 208.42.166.161 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o eth0 -s 208.42.166.162 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o eth0 -s 208.42.166.163 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o eth0 -s 208.42.166.164 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o eth0 -s 208.42.166.165 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o eth0 -s 10.60.100.18 -m state --state NEW -j ACCEPT # # Rule 0 (global) # echo "Rule 0 (global)" # # # $IPTABLES -A OUTPUT -p tcp -m tcp --dport 139 -j DROP $IPTABLES -A OUTPUT -p udp -m udp -m multiport --dports 138,137,68,67 -j DROP $IPTABLES -A INPUT -p tcp -m tcp --dport 139 -j DROP $IPTABLES -A INPUT -p udp -m udp -m multiport --dports 138,137,68,67 -j DROP $IPTABLES -A FORWARD -p tcp -m tcp --dport 139 -j DROP $IPTABLES -A FORWARD -p udp -m udp -m multiport --dports 138,137,68,67 -j DROP # # Rule 1 (global) # echo "Rule 1 (global)" # # # $IPTABLES -N RULE_1 $IPTABLES -A OUTPUT -j RULE_1 $IPTABLES -A INPUT -j RULE_1 $IPTABLES -A FORWARD -j RULE_1 $IPTABLES -A RULE_1 -j LOG --log-level info --log-prefix "RULE 1 -- DENY " $IPTABLES -A RULE_1 -j DROP # # echo 1 > /proc/sys/net/ipv4/ip_forward # # Epilog script # # End of epilog script # =============================================================================== Matt Dittbenner