[quote=“helid”]Peu-tu nous faire voir ce que tu obtiens dans le fichier parefeu:
C’est juste pour être sûr que tu n’aurais pas un problème résidant à tes chaines, j’ai eu il y a quelques jours des idioties avec iptables.[/quote]
bonjour voici le fichier en questions
la plage d’ip (89.0.0.0 89.255.255.255) banis c’est juste pour le test …
[code]
Generated by iptables-save v1.4.2 on Wed Jul 21 20:20:38 2010
*mangle
:PREROUTING ACCEPT [12482865:15106249448]
:INPUT ACCEPT [9162465:13329785520]
:FORWARD ACCEPT [3318109:1776042704]
:OUTPUT ACCEPT [3535807:277388770]
:POSTROUTING ACCEPT [6855406:2054021341]
-A PREROUTING -p tcp -m tcp --dport 587 -j MARK --set-xmark 0x1/0xffffffff
-A PREROUTING -p tcp -m tcp --dport 25 -j MARK --set-xmark 0x1/0xffffffff
-A OUTPUT -p tcp -m tcp --dport 587 -j MARK --set-xmark 0x1/0xffffffff
-A OUTPUT -p tcp -m tcp --dport 25 -j MARK --set-xmark 0x1/0xffffffff
COMMIT
Completed on Wed Jul 21 20:20:38 2010
Generated by iptables-save v1.4.2 on Wed Jul 21 20:20:38 2010
*nat
:PREROUTING ACCEPT [215983]
:POSTROUTING ACCEPT [883:136389]
:OUTPUT ACCEPT [17177:1585165]
-A PREROUTING -i eth0 -p tcp -m tcp --dport 30003 -j DNAT --to-destination 192.168.80.2:30003
-A PREROUTING -i eth0 -p udp -m udp --dport 30013 -j DNAT --to-destination 192.168.80.2:30013
-A PREROUTING -i eth0 -p tcp -m tcp --dport 40000 -j DNAT --to-destination 192.168.80.2:40000
-A PREROUTING -i eth0 -p udp -m udp --dport 45000 -j DNAT --to-destination 192.168.80.2:45000
-A POSTROUTING -o eth0 -j MASQUERADE
-A POSTROUTING -o eth2 -j MASQUERADE
-A POSTROUTING -o ppp0 -j MASQUERADE
-A POSTROUTING -o eth2 -j SNAT --to-source 192.168.2.20
COMMIT
Completed on Wed Jul 21 20:20:38 2010
Generated by iptables-save v1.4.2 on Wed Jul 21 20:20:38 2010
*filter
:INPUT DROP [3723:336154]
:FORWARD ACCEPT [3318109:1776042704]
:OUTPUT DROP [72:5956]
-A INPUT -s 192.168.6.12/32 -p tcp -m tcp --dport 80 -j DROP
-A INPUT -i lo -j ACCEPT
-A INPUT -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i eth2 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i ppp0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i tap0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -m iprange --src-range 118.160.0.0-118.171.255.255 -j LOG
-A INPUT -m iprange --src-range 118.160.0.0-118.171.255.255 -j DROP
-A INPUT -m iprange --src-range 114.32.0.0-114.47.255.255 -j LOG
-A INPUT -m iprange --src-range 114.32.0.0-114.47.255.255 -j DROP
-A INPUT -p gre -j ACCEPT
-A INPUT -p tcp -m tcp --dport 1723 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 21 -m recent --update --seconds 999999 --hitcount 5 --name ftp --rsource -j DROP
-A INPUT -p tcp -m tcp --dport 21 -m recent --set --name ftp --rsource
-A INPUT -p tcp -m tcp --dport 20 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 12345 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 587 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 8000 -j ACCEPT
-A INPUT -p udp -m udp --dport 4000 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 8080 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 53 -j ACCEPT
-A INPUT -p udp -m udp --dport 53 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 110 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 143 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT
-A INPUT -p icmp -j ACCEPT
-A INPUT -s 192.168.0.0/16 -j ACCEPT
-A FORWARD -o eth0 -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -o ppp00 -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
-A OUTPUT -m iprange --src-range 89.0.0.0-89.255.255.255 -j DROP
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -o eth0 -m state --state NEW,RELATED,ESTABLISHED,UNTRACKED -j ACCEPT
-A OUTPUT -o eth1 -m state --state NEW,RELATED,ESTABLISHED,UNTRACKED -j ACCEPT
-A OUTPUT -o eth2 -m state --state NEW,RELATED,ESTABLISHED,UNTRACKED -j ACCEPT
-A OUTPUT -o ppp0 -m state --state NEW,RELATED,ESTABLISHED,UNTRACKED -j ACCEPT
-A OUTPUT -o tap0 -m state --state NEW,RELATED,ESTABLISHED,UNTRACKED -j ACCEPT
COMMIT
Completed on Wed Jul 21 20:20:38 2010[/code]