Konfigurasi Proxy Server di FC5

Script IPTABLES :

# Firewall configuration written by system-config-securitylevel
# Manual customization of this file is not recommended.
# *filter
# :INPUT ACCEPT [0:0]
# :FORWARD ACCEPT [0:0]
# :OUTPUT ACCEPT [0:0]
# :RH-Firewall-1-INPUT – [0:0]
# -A INPUT -j RH-Firewall-1-INPUT
# -A FORWARD -j RH-Firewall-1-INPUT
# -A RH-Firewall-1-INPUT -i lo -j ACCEPT
# -A RH-Firewall-1-INPUT -p icmp –icmp-type any -j ACCEPT
# -A RH-Firewall-1-INPUT -p 50 -j ACCEPT
# -A RH-Firewall-1-INPUT -p 51 -j ACCEPT
# -A RH-Firewall-1-INPUT -p udp –dport 5353 -d 224.0.0.251 -j ACCEPT
# -A RH-Firewall-1-INPUT -p udp -m udp –dport 631 -j ACCEPT
# -A RH-Firewall-1-INPUT -m state –state ESTABLISHED,RELATED -j ACCEPT
# -A RH-Firewall-1-INPUT -j REJECT –reject-with icmp-host-prohibited
# COMMIT

# Generated by iptables-save v1.3.7 on Tue Aug 14 11:32:50 2007
*nat
:PREROUTING ACCEPT [5:340]
:POSTROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
-A POSTROUTING -s 192.168.0.201/255.255.255.0 -o eth0 -j SNAT –to-source 192.168.1.99
#A POSTROUTING -s 192.168.0.0/255.255.255.0 -o eth0 -j SNAT –to-source 192.168.1.99
#-A POSTROUTING -s 192.168.20.0/255.255.255.0 -o eth1 -j SNAT –to-source 192.168.1.99
-A POSTROUTING -s 192.168.30.0/255.255.255.0 -o eth1 -j SNAT –to-source 192.168.1.99
-A POSTROUTING -s 192.168.40.0/255.255.255.0 -o eth1 -j SNAT –to-source 192.168.1.99
-A POSTROUTING -s 192.168.50.0/255.255.255.0 -o eth1 -j SNAT –to-source 192.168.1.99
-A POSTROUTING -s 192.168.60.0/255.255.255.0 -o eth1 -j SNAT –to-source 192.168.1.99
COMMIT
# Completed on Tue Aug 14 11:32:50 2007

Tinggalkan komentar