- 论坛徽章:
- 0
|
现手头一台IPtables防火墙经过固定IP公网并作端口映射,配置内容如下:
问题是:内网一台Sendmail邮件服务器(IP:10.2.5.50)用公网IP不可以收信?但可以发信,用内网IP收发是没有问题的,故邮件服务器应该没有问题,请高手大师指教??感谢感谢
备注:DNS服务器是10.2.5.81
echo " - FWD: Allow all connections OUT and only existing/related IN"
$IPTABLES -A FORWARD -i $EXTIF -o $INTIF -m state --state ESTABLISHED,RELATED -j ACCEPT
$IPTABLES -A FORWARD -i $DMZIF -o $INTIF -m state --state ESTABLISHED,RELATED -j ACCEPT
$IPTABLES -A FORWARD -i $DMZIF -o $INTIF -j ACCEPT
$IPTABLES -A FORWARD -i $INTIF -o $EXTIF -j ACCEPT
$IPTABLES -A FORWARD -i $INTIF -o $INTIF -j ACCEPT
$IPTABLES -A FORWARD -i $INTIF -o $DMZIF -j ACCEPT
#$IPTABLES -A FORWARD -i $EXTIF -o $INTIF -p tcp --dport 82 -j ACCEPT
# Any source going to DMZ for http, https, ssh is valid
$IPTABLES -A FORWARD -i $EXTIF -o $DMZIF -p tcp --dport 80 -j ACCEPT
$IPTABLES -A FORWARD -i $EXTIF -o $DMZIF -p tcp --dport 443 -j ACCEPT
$IPTABLES -A FORWARD -i $EXTIF -o $DMZIF -p tcp --dport 25 -j ACCEPT
$IPTABLES -A FORWARD -i $EXTIF -o $DMZIF -p tcp --dport 110 -j ACCEPT
$IPTABLES -A FORWARD -i $EXTIF -o $DMZIF -p tcp --dport 143 -j ACCEPT
$IPTABLES -A FORWARD -i $EXTIF -o $DMZIF -p udp --dport 53 -j ACCEPT
$IPTABLES -A FORWARD -i $EXTIF -o $DMZIF -p tcp --dport 53 -j ACCEPT
$IPTABLES -A FORWARD -i $EXTIF -o $DMZIF -p tcp --dport 21 -j ACCEPT
$IPTABLES -A FORWARD -i $EXTIF -o $DMZIF -p tcp --dport 3128 -j ACCEPT
$IPTABLES -A FORWARD -i $EXTIF -o $DMZIF -p tcp --dport 8080 -j ACCEPT
$IPTABLES -A FORWARD -i $EXTIF -o $DMZIF -p tcp --dport 2222 -j ACCEPT
#$IPTABLES -A FORWARD -i $EXTIF -o $DMZIF -p udp --dport 4672 -j ACCEPT
$IPTABLES -A FORWARD -i $EXTIF -o $DMZIF -p tcp --dport 5900 -j ACCEPT
$IPTABLES -A FORWARD -o $EXTIF -i $DMZIF -m state --state ESTABLISHED,RELATED -j ACCEPT
# Mail server deliverying email is ok
$IPTABLES -A FORWARD -i $DMZIF -o $EXTIF -p tcp --dport 25 -j ACCEPT
$IPTABLES -A FORWARD -o $DMZIF -i $EXTIF -p tcp --sport 25 -j ACCEPT
$IPTABLES -A FORWARD -i $EXTIF -o $DMZIF -p tcp --dport 6000 -j ACCEPT
$IPTABLES -A FORWARD -i $EXTIF -o $DMZIF -p tcp --dport 6001 -j ACCEPT
$IPTABLES -A FORWARD -i $DMZIF -o $INTIF -p tcp --dport 9100 -j ACCEPT
$IPTABLES -A FORWARD -i $EXTIF -o $DMZIF -p tcp --dport 2016 -j ACCEPT
$IPTABLES -A FORWARD -i $EXTIF -o $DMZIF -p tcp --dport 2016 -j ACCEPT
#Webmin login valid
$IPTABLES -A INPUT -p tcp --dport 10000 -j ACCEPT
$IPTABLES -A FORWARD -p tcp --dport 10000 -j ACCEPT
# Any source coming in the FTP server is valid
$IPTABLES -A FORWARD -i $EXTIF -o $DMZIF -p tcp -d 10.2.5.10 --dport 21 -j ACCEPT
$IPTABLES -A FORWARD -o $EXTIF -i $DMZIF -m state --state ESTABLISHED,RELATED -j ACCEPT
# DMZ going out for DNS is valid
$IPTABLES -A FORWARD -i $DMZIF -o $EXTIF -p udp --dport 53 -j ACCEPT
$IPTABLES -A FORWARD -i $DMZIF -o $EXTIF -p tcp --dport 53 -j ACCEPT
$IPTABLES -A FORWARD -i $DMZIF -o $EXTIF -p tcp --dport 21 -j ACCEPT
$IPTABLES -A FORWARD -i $EXTIF -o $DMZIF -m state --state ESTABLISHED,RELATED -j ACCEPT
#$IPTABLES -A FORWARD -i $EXTIF -o $DMZIF -p tcp --dport 22 -j ACCEPT
echo " - IPsec: Allow all IPsec connections"
# IPsec rule, allow forwarding of IPsec traffic
#
$IPTABLES -A FORWARD -i ipsec+ -j ACCEPT
$IPTABLES -A FORWARD -o ipsec+ -j ACCEPT
# Catch all rule, all other forwarding is denied and logged.
#
$IPTABLES -A FORWARD -j drop-and-log-it
echo " - NAT: Enabling SNAT (MASQUERADE) functionality on $EXTIF"
#
#More liberal form
#$IPTABLES -t nat -A POSTROUTING -o $EXTIF -j MASQUERADE
#
#Stricter form
$IPTABLES -t nat -A POSTROUTING -o $EXTIF -j SNAT --to $EXTIP
echo " - NAT: Enabling DNAT for DMZ machines"
#
# Web Server
$IPTABLES -t nat -A PREROUTING -p tcp -d $VEXTIP --dport 80 -j DNAT --to 10.2.5.12:80
$IPTABLES -t nat -A PREROUTING -p tcp -d $VEXTIP --dport 443 -j DNAT --to 10.2.5.12:443
$IPTABLES -t nat -A PREROUTING -p udp -d $VEXTIP --dport 53 -j DNAT --to 10.2.5.81:53
$IPTABLES -t nat -A PREROUTING -p tcp -d $VEXTIP --dport 53 -j DNAT --to 10.2.5.81:53
$IPTABLES -t nat -A PREROUTING -p tcp -d $VEXTIP --dport 25 -j DNAT --to 10.2.5.15:25
$IPTABLES -t nat -A PREROUTING -p tcp -d $VEXTIP --dport 110 -j DNAT --to 10.2.5.15:110
$IPTABLES -t nat -A PREROUTING -p tcp -d $VEXTIP --dport 110 -j DNAT --to 10.2.5.50:110
$IPTABLES -t nat -A PREROUTING -p tcp -d $VEXTIP --dport 110 -j DNAT --to 10.2.5.55:110
$IPTABLES -t nat -A PREROUTING -p tcp -d $vextip --dport 25 -j DNAT --to 10.2.5.50:25
$IPTABLES -t nat -A PREROUTING -p tcp -d $VEXTIP --dport 143 -j DNAT --to 10.2.5.15:143
# VNC Server
$IPTABLES -t nat -A PREROUTING -p tcp -d 10.2.6.254 --dport 5900 -j DNAT --to 10.2.6.60:5900
# Mail Server
$IPTABLES -t nat -A PREROUTING -p tcp -d $VEXTIP --dport 6000 -j DNAT --to 10.2.5.50:80 |
|