As first I was a bit weary, but after I modified a sample iptables to my likings, I found I got what I wanted.
#First we flush our current rules iptables -F iptables -t nat -F #Then we lock our services so they only work from the LAN iptables -I INPUT 1 -i eth1 -j ACCEPT iptables -I INPUT 1 -i lo -j ACCEPT iptables -A INPUT -p UDP --dport bootps -i ! eth0 -j REJECT iptables -A INPUT -p UDP --dport domain -i ! eth0 -j REJECT #(Optional) Allow access to our ssh server from the WAN # Additional: port 81 (alt http) and port 443 (https), port 21 (ftp) #iptables -A INPUT -p TCP --dport ssh -i eth0 -j ACCEPT iptables -A INPUT -p TCP --dport 2222 -i eth0 -j ACCEPT iptables -A INPUT -p TCP --dport 81 -i eth0 -j ACCEPT iptables -A INPUT -p TCP --dport 443 -i eth0 -j ACCEPT iptables -A INPUT -p TCP --dport 21 -i eth0 -j ACCEPT #iptables -A INPUT -p TCP --dport 25 -i eth0 -j ACCEPT #iptables -A INPUT -p TCP --dport 143 -i eth0 -j ACCEPT #iptables -A INPUT -p TCP --dport 993 -i eth0 -j ACCEPT #iptables -A INPUT -p TCP --dport 995 -i eth0 -j ACCEPT #iptables -A INPUT -p TCP --dport 110 -i eth0 -j ACCEPT #Drop TCP / UDP packets to privileged ports iptables -A INPUT -p TCP -i ! eth1 -d 0/0 --dport 0:1023 -j DROP iptables -A INPUT -p UDP -i ! eth1 -d 0/0 --dport 0:1023 -j DROP #Finally we add the rules for NAT iptables -I FORWARD -i eth1 -d 192.168.0.0/255.255.0.0 -j DROP iptables -A FORWARD -i eth1 -s 192.168.0.0/255.255.0.0 -j ACCEPT iptables -A FORWARD -i eth0 -d 192.168.0.0/255.255.0.0 -j ACCEPT iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE #Actual port forwarding iptables -t nat -A PREROUTING -p tcp --dport 3389 -i eth0 -j DNAT --to 192.168.0.250 iptables -t nat -A PREROUTING -p tcp --dport 6881 -i eth0 -j DNAT --to 192.168.0.250 iptables -t nat -A PREROUTING -p udp --dport 6881 -i eth0 -j DNAT --to 192.168.0.250 #This is so when we boot we don't have to run the rules by hand /etc/init.d/iptables save I've found it to work very well. On 6/2/05, A. Khattri <[EMAIL PROTECTED]> wrote: > On Tue, 31 May 2005, Ow Mun Heng wrote: > > > > I prefer just plain iptables myself ;-) > > > > One man's meat is another's poison. > > > > That's the beauty of Open Source. You're free to decide. > > Well its one less package to manage - and you dont need any startup > scripts ("/etc/init.d/iptables save" saves the current rule set and > automatically restores it on startup). > > > -- > > -- > gentoo-user@gentoo.org mailing list > > -- - Mark Shields -- gentoo-user@gentoo.org mailing list