Après avoir miséré avec scp voici les règles iptables de IPCOP
[code]Chain BADTCP (2 references)
pkts bytes target prot opt in out source destination
0 0 PSCAN tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x29
0 0 PSCAN tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x00
0 0 PSCAN tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x01
0 0 PSCAN tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x06
0 0 PSCAN tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x03/0x03
446 59577 NEWNOTSYN tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp flags:!0x17/0x02 state NEW
Chain CUSTOMFORWARD (1 references)
pkts bytes target prot opt in out source destination
Chain CUSTOMINPUT (1 references)
pkts bytes target prot opt in out source destination
Chain CUSTOMOUTPUT (1 references)
pkts bytes target prot opt in out source destination
Chain DHCPBLUEINPUT (1 references)
pkts bytes target prot opt in out source destination
Chain DMZHOLES (1 references)
pkts bytes target prot opt in out source destination
Chain GUIINPUT (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT icmp – !eth1 * 0.0.0.0/0 0.0.0.0/0 icmp type 8
Chain INPUT (policy DROP 467K packets, 21M bytes)
pkts bytes target prot opt in out source destination
874K 52M ipac~o all – * * 0.0.0.0/0 0.0.0.0/0
874K 52M BADTCP all – * * 0.0.0.0/0 0.0.0.0/0
874K 52M CUSTOMINPUT all – * * 0.0.0.0/0 0.0.0.0/0
874K 52M GUIINPUT all – * * 0.0.0.0/0 0.0.0.0/0
181K 13M ACCEPT all – * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
693K 39M IPSECVIRTUAL all – * * 0.0.0.0/0 0.0.0.0/0
693K 39M OPENSSLVIRTUAL all – * * 0.0.0.0/0 0.0.0.0/0
6 410 ACCEPT all – lo * 0.0.0.0/0 0.0.0.0/0 state NEW
0 0 DROP all – * * 127.0.0.0/8 0.0.0.0/0 state NEW
0 0 DROP all – * * 0.0.0.0/0 127.0.0.0/8 state NEW
226K 18M ACCEPT !icmp – eth0 * 0.0.0.0/0 0.0.0.0/0 state NEW
467K 21M DHCPBLUEINPUT all – * * 0.0.0.0/0 0.0.0.0/0
467K 21M IPSECPHYSICAL all – * * 0.0.0.0/0 0.0.0.0/0
467K 21M OPENSSLPHYSICAL all – * * 0.0.0.0/0 0.0.0.0/0
467K 21M WIRELESSINPUT all – * * 0.0.0.0/0 0.0.0.0/0 state NEW
467K 21M REDINPUT all – * * 0.0.0.0/0 0.0.0.0/0
467K 21M XTACCESS all – * * 0.0.0.0/0 0.0.0.0/0 state NEW
1854 176K LOG all – * * 0.0.0.0/0 0.0.0.0/0 limit: avg 10/min burst 5 LOG flags 0 level 4 prefix `INPUT ’
Chain FORWARD (policy DROP 3725 packets, 171K bytes)
pkts bytes target prot opt in out source destination
8950K 6203M ipac~fi all – * * 0.0.0.0/0 0.0.0.0/0
8950K 6203M ipac~fo all – * * 0.0.0.0/0 0.0.0.0/0
8950K 6203M BADTCP all – * * 0.0.0.0/0 0.0.0.0/0
156K 7858K TCPMSS tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
8949K 6203M CUSTOMFORWARD all – * * 0.0.0.0/0 0.0.0.0/0
8671K 6183M ACCEPT all – * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
278K 21M IPSECVIRTUAL all – * * 0.0.0.0/0 0.0.0.0/0
278K 21M OPENSSLVIRTUAL all – * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all – lo * 0.0.0.0/0 0.0.0.0/0 state NEW
0 0 DROP all – * * 127.0.0.0/8 0.0.0.0/0 state NEW
0 0 DROP all – * * 0.0.0.0/0 127.0.0.0/8 state NEW
275K 21M ACCEPT all – eth0 * 0.0.0.0/0 0.0.0.0/0 state NEW
0 0 ACCEPT all – eth2 eth2 0.0.0.0/0 0.0.0.0/0 state NEW
3753 173K WIRELESSFORWARD all – * * 0.0.0.0/0 0.0.0.0/0 state NEW
3757 173K REDFORWARD all – * * 0.0.0.0/0 0.0.0.0/0
0 0 DMZHOLES all – eth2 * 0.0.0.0/0 0.0.0.0/0 state NEW
3753 173K PORTFWACCESS all – * * 0.0.0.0/0 0.0.0.0/0 state NEW
164 9008 LOG all – * * 0.0.0.0/0 0.0.0.0/0 limit: avg 10/min burst 5 LOG flags 0 level 4 prefix `OUTPUT ’
Chain IPSECPHYSICAL (1 references)
pkts bytes target prot opt in out source destination
Chain IPSECVIRTUAL (2 references)
pkts bytes target prot opt in out source destination
Chain LOG_DROP (0 references)
pkts bytes target prot opt in out source destination
0 0 LOG all – * * 0.0.0.0/0 0.0.0.0/0 limit: avg 10/min burst 5 LOG flags 0 level 4
0 0 DROP all – * * 0.0.0.0/0 0.0.0.0/0
Chain LOG_REJECT (0 references)
pkts bytes target prot opt in out source destination
0 0 LOG all – * * 0.0.0.0/0 0.0.0.0/0 limit: avg 10/min burst 5 LOG flags 0 level 4
0 0 REJECT all – * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
Chain NEWNOTSYN (1 references)
pkts bytes target prot opt in out source destination
364 56294 LOG all – * * 0.0.0.0/0 0.0.0.0/0 limit: avg 10/min burst 5 LOG flags 0 level 4 prefix `NEW not SYN? '
446 59577 DROP all – * * 0.0.0.0/0 0.0.0.0/0
Chain OPENSSLPHYSICAL (1 references)
pkts bytes target prot opt in out source destination
Chain OPENSSLVIRTUAL (2 references)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 191K packets, 16M bytes)
pkts bytes target prot opt in out source destination
191K 16M ipac~i all – * * 0.0.0.0/0 0.0.0.0/0
191K 16M CUSTOMOUTPUT all – * * 0.0.0.0/0 0.0.0.0/0
Chain PORTFWACCESS (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp – eth1 * 192.168.1.13 192.168.2.200 tcp dpt:5900
Chain PSCAN (5 references)
pkts bytes target prot opt in out source destination
0 0 LOG tcp – * * 0.0.0.0/0 0.0.0.0/0 limit: avg 10/min burst 5 LOG flags 0 level 4 prefix TCP Scan? ' 0 0 LOG udp -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 10/min burst 5 LOG flags 0 level 4 prefix
UDP Scan? '
0 0 LOG icmp – * * 0.0.0.0/0 0.0.0.0/0 limit: avg 10/min burst 5 LOG flags 0 level 4 prefix ICMP Scan? ' 0 0 LOG all -f * * 0.0.0.0/0 0.0.0.0/0 limit: avg 10/min burst 5 LOG flags 0 level 4 prefix
FRAG Scan? '
0 0 DROP all – * * 0.0.0.0/0 0.0.0.0/0
Chain REDFORWARD (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp – eth2 eth1 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT udp – eth2 eth1 0.0.0.0/0 0.0.0.0/0
Chain REDINPUT (1 references)
pkts bytes target prot opt in out source destination
Chain WIRELESSFORWARD (1 references)
pkts bytes target prot opt in out source destination
Chain WIRELESSINPUT (1 references)
pkts bytes target prot opt in out source destination
Chain XTACCESS (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp – eth1 * 0.0.0.0/0 192.168.1.2 tcp dpt:113
0 0 ACCEPT tcp – eth1 * 192.168.1.13 192.168.1.2 tcp dpt:445
5 300 ACCEPT tcp – eth1 * 192.168.1.13 192.168.1.2 tcp dpt:222
Chain ipac~fi (1 references)
pkts bytes target prot opt in out source destination
0 0 all – eth0 * 0.0.0.0/0 0.0.0.0/0
0 0 all – eth2 * 0.0.0.0/0 0.0.0.0/0
0 0 all – eth1 * 0.0.0.0/0 0.0.0.0/0
Chain ipac~fo (1 references)
pkts bytes target prot opt in out source destination
0 0 all – * eth0 0.0.0.0/0 0.0.0.0/0
0 0 all – * eth2 0.0.0.0/0 0.0.0.0/0
0 0 all – * eth1 0.0.0.0/0 0.0.0.0/0
Chain ipac~i (1 references)
pkts bytes target prot opt in out source destination
32 2016 all – * eth0 0.0.0.0/0 0.0.0.0/0
0 0 all – * eth2 0.0.0.0/0 0.0.0.0/0
178 52796 all – * eth1 0.0.0.0/0 0.0.0.0/0
Chain ipac~o (1 references)
pkts bytes target prot opt in out source destination
81 5993 all – eth0 * 0.0.0.0/0 0.0.0.0/0
0 0 all – eth2 * 0.0.0.0/0 0.0.0.0/0
227 20215 all – eth1 * 0.0.0.0/0 0.0.0.0/0 [/code]
J’espère que ça vous permettra de savoir pourquoi rien ne passe entre les 2 réseaux et éventuellement me proposer une solution ou un piste
précisions :
eth0: patte 192.168.2.1
eth1: patte 192.168.1.2
eth2: sert pas (DMZ prévue)