pour monter les regles iptables de ma passerelle, j'ai recopiée celle fournie ici en exemple:
http://people.via.ecp.fr/~alexis/format ... l#AEN10703
Ce qui donne pour la table FILTER:
- Code: Tout sélectionner
malibu:/home# iptables -v -L
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- lo any anywhere anywhere
4 213 ACCEPT icmp -- any any anywhere anywhere
0 0 ACCEPT igmp -- any any anywhere anywhere
113 5570 ACCEPT all -- any any anywhere anywhere
state RELATED,ESTABLISHED
0 0 ACCEPT tcp -- any any anywhere anywhere
tcp dpt:ssh
1 48 ACCEPT tcp -- any any anywhere anywhere
tcp dpt:telnet
191 12637 REJECT all -- any any anywhere anywhere
reject-with icmp-port-unreachable
Chain FORWARD (policy ACCEPT 1661 packets, 1146K bytes)
pkts bytes target prot opt in out source destination
41 1968 TCPMSS tcp -- any eth1 anywhere anywhere
tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU
Chain OUTPUT (policy ACCEPT 271 packets, 20132 bytes)
pkts bytes target prot opt in out source destination
et pour la table NAT:
- Code: Tout sélectionner
malibu:/home# iptables -v -L -t nat
Chain PREROUTING (policy ACCEPT 266 packets, 17505 bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 1 packets, 48 bytes)
pkts bytes target prot opt in out source destination
53 2737 MASQUERADE all -- any eth1 anywhere anywhere
Chain OUTPUT (policy ACCEPT 5 packets, 306 bytes)
pkts bytes target prot opt in out source destination
Or il m'est impossible depuis mon LAN de scanner ma passerelle et vérifier les services.
Comment puis-je modifier ma config pour autoriser les scans UNIQUEMENT depuis mon LAN ?
Merci