CCNP
Hastighetsproblem efter byte till iptables.
#!/bin/bash
# Configuration
IPTABLES="/sbin/iptables"
NET_IFACE="eth2"
LOCAL_IFACE="eth3"
EXTIF="$NET_IFACE"
INTIF="$LOCAL_IFACE"
EXTIP="`ifconfig $EXTIF|grep "inet addr:"|cut -d ":" -f 2|cut -d " " -f 1`"
INTIP="192.168.0.1"
LO_IFACE="lo"
DO_NAT="TRUE"
fw_start() {
echo "Starting Firewall"
echo "SYSCTL, performance tuning"
echo 1 > /proc/sys/net/ipv4/ip_forward # Enable IP masq
echo 1 > /proc/sys/net/ipv4/ip_dynaddr # Rewrite new address
echo 0 > /proc/sys/net/ipv4/tcp_syncookies # TCP SYN overload
echo 1 > /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts # Smurf amplify off
echo 1 > /proc/sys/net/ipv4/conf/all/log_martians # Spoof/route/redir
echo 1 > /proc/sys/net/ipv4/tcp_timestamps # Uptime/GB Ethernet
echo 0 > /proc/sys/net/ipv4/conf/all/accept_redirects # ICMP redirects off
echo 1 > /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts # No bcast response
echo 1 > /proc/sys/net/ipv4/conf/all/accept_source_route # No return path mod
echo 1 > /proc/sys/net/ipv4/icmp_ignore_bogus_error_responses # No bad msgs
for r in /proc/sys/net/ipv4/conf/*/rp_filter; do # Reverse path filter
echo 1 > $r # (default for Debian
done # installations)
# Allow 'legal' traffic and drop all other:
echo "Creating incomming traffic rules"
$IPTABLES -A INPUT -p all -i $LO_IFACE -j ACCEPT
$IPTABLES -P INPUT DROP
$IPTABLES -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
$IPTABLES -A INPUT -p all -i $INTIF -j ACCEPT
echo "Creating IPv6 tunnel rules"
$IPTABLES -A INPUT -p 41 -j ACCEPT
$IPTABLES -A OUTPUT -p 41 -j ACCEPT
echo "Creating ICMP traffic rules"
$IPTABLES -A INPUT -p icmp -j ACCEPT
# Allow TCP/UDP traffic on some ports:
echo "Creating general TCP/UDP traffic rules"
echo " ... blabla"
$IPTABLES -A INPUT -p tcp -i $NET_IFACE --dport 22 -j ACCEPT
$IPTABLES -A INPUT -p tcp -i $NET_IFACE --dport 80 -j ACCEPT
$IPTABLES -A INPUT -p tcp -i $NET_IFACE --dport 113 -j ACCEPT
$IPTABLES -A INPUT -p tcp -i $NET_IFACE --dport 3784:3786 -j ACCEPT
$IPTABLES -A INPUT -p udp -i $NET_IFACE --dport 3784:3786 -j ACCEPT
$IPTABLES -A INPUT -p tcp -i $NET_IFACE --dport 2500:2600 -j ACCEPT
echo " ... blabla -> 192.168.0.250"
$IPTABLES -A FORWARD -i $EXTIF -o $INTIF -p tcp --dport 21 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
$IPTABLES -A PREROUTING -t nat -p tcp -d $EXTIP --dport 21 -j DNAT --to 192.168.0.2:21
$IPTABLES -A FORWARD -i $EXTIF -o $INTIF -p tcp --dport 200:2400 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
$IPTABLES -A PREROUTING -t nat -p tcp -d $EXTIP --dport 200:2400 -j DNAT --to 192.168.0.2:200-2400
$IPTABLES -A FORWARD -i $EXTIF -o $INTIF -p tcp --dport 18710 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
$IPTABLES -A PREROUTING -t nat -p tcp -d $EXTIP --dport 18710 -j DNAT --to 192.168.0.2:18710
$IPTABLES -A FORWARD -i $EXTIF -o $INTIF -p tcp --dport 3389 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
$IPTABLES -A PREROUTING -t nat -p tcp -d $EXTIP --dport 3389 -j DNAT --to 192.168.0.2:3389
$IPTABLES -A FORWARD -i $EXTIF -o $INTIF -p udp --dport 18710 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
$IPTABLES -A PREROUTING -t nat -p udp -d $EXTIP --dport 18710 -j DNAT --to 192.168.0.2:18710
$IPTABLES -A FORWARD -i $EXTIF -o $INTIF -p udp --dport 21 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
$IPTABLES -A PREROUTING -t nat -p udp -d $EXTIP --dport 21 -j DNAT --to 192.168.0.2:21
$IPTABLES -A FORWARD -i $EXTIF -o $INTIF -p tcp --dport 20 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
$IPTABLES -A PREROUTING -t nat -p tcp -d $EXTIP --dport 20 -j DNAT --to 192.168.0.2:20
$IPTABLES -A FORWARD -i $EXTIF -o $INTIF -p udp --dport 20 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
$IPTABLES -A PREROUTING -t nat -p udp -d $EXTIP --dport 20 -j DNAT --to 192.168.0.2:20
if [ "$LOCAL_IFACE" != "" ]
then
echo "Allowing ALL traffic on ${LOCAL_IFACE}."
$IPTABLES -A INPUT -p all -i $LOCAL_IFACE -j ACCEPT
fi
# Log all kind of portscan attacks:
echo "Creating Anti-Portscan rules"
$IPTABLES -A INPUT -p tcp -i $NET_IFACE --tcp-flags ALL FIN,URG,PSH -m limit --limit 5/minute -j LOG --log-level alert --log-prefix "NMAP-XMAS:"
$IPTABLES -A INPUT -p tcp -i $NET_IFACE --tcp-flags ALL FIN,URG,PSH -j DROP
$IPTABLES -A INPUT -p tcp -i $NET_IFACE --tcp-flags ALL ALL -m limit --limit 5/minute -j LOG --log-level 1 --log-prefix "XMAS:"
$IPTABLES -A INPUT -p tcp -i $NET_IFACE --tcp-flags ALL ALL -j DROP
$IPTABLES -A INPUT -p tcp -i $NET_IFACE --tcp-flags ALL SYN,RST,ACK,FIN,URG -m limit --limit 5/minute -j LOG --log-level 1 --log-prefix "XMAS-PSH:"
$IPTABLES -A INPUT -p tcp -i $NET_IFACE --tcp-flags ALL SYN,RST,ACK,FIN,URG -j DROP
$IPTABLES -A INPUT -p tcp -i $NET_IFACE --tcp-flags ALL NONE -m limit --limit 5/minute -j LOG --log-level 1 --log-prefix "NULL_SCAN:"
$IPTABLES -A INPUT -p tcp -i $NET_IFACE --tcp-flags ALL NONE -j DROP
$IPTABLES -A INPUT -p tcp -i $NET_IFACE --tcp-flags SYN,RST SYN,RST -m limit --limit 5/minute -j LOG --log-level 5 --log-prefix "SYN/RST:"
$IPTABLES -A INPUT -p tcp -i $NET_IFACE --tcp-flags SYN,RST SYN,RST -j DROP
$IPTABLES -A INPUT -p tcp -i $NET_IFACE --tcp-flags SYN,FIN SYN,FIN -m limit --limit 5/minute -j LOG --log-level 5 --log-prefix "SYN/FIN:"
$IPTABLES -A INPUT -p tcp -i $NET_IFACE --tcp-flags SYN,FIN SYN,FIN -j DROP
if [ "$DO_NAT" == "TRUE" ]
then
echo "Creating NAT/MASQUERADE rules"
$IPTABLES -P FORWARD DROP
$IPTABLES -t nat -A POSTROUTING -s 192.168.0.0/24 -j MASQUERADE
$IPTABLES -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
$IPTABLES -A FORWARD -s 192.168.0.0/24 -j ACCEPT
fi
}
fw_stop() {
echo "Stopping firewall"
echo "Flushing all firewall rules"
$IPTABLES -F
$IPTABLES -t nat -F
$IPTABLES -X
echo "Change the default rule to ACCEPT"
$IPTABLES -P FORWARD ACCEPT
$IPTABLES -P INPUT ACCEPT
$IPTABLES -P OUTPUT ACCEPT
}
fw_panic() {
echo "SETTING PANIC RULES! (Our only policy: deny everything!)"
$IPTABLES -F
$IPTABLES -X
$IPTABLES -t nat -F
$IPTABLES -P FORWARD DROP
$IPTABLES -P INPUT DROP
$IPTABLES -P OUTPUT DROP
$IPTABLES -A INPUT -i lo -j ACCEPT
$IPTABLES -A OUTPUT -o lo -j ACCEPT
$IPTABLES -A INPUT -i eth1 -j ACCEPT
$IPTABLES -A OUTPUT -o eth1 -j ACCEPT
}
fw_status() {
echo "Status"
$IPTABLES -L -n -v --line-numbers
echo "NAT status"
$IPTABLES -L -n -v --line-numbers -t nat
}
fw_restart() {
fw_stop
fw_start
}
fw_help() {
echo "Commands for firewall"
echo "$0 start - Start the firewall."
echo "$0 stop - Stopping the firewall."
echo "$0 status - View firewall status."
echo "$0 restart - Restart the firewall."
echo "$0 help - Read this again."
echo "$0 panic - Block ALL traffic!"
}
case "$1" in
'start')
fw_start
;;
'stop')
fw_stop
;;
'restart')
fw_restart
;;
'panic')
fw_panic
;;
'status')
fw_status
;;
'help')
fw_help
;;
*)
echo "usage $0 start|stop|restart|panic|status|help"
esac
- Idag Färska SDD-enheter överhettas – kan ge datakorruption 1
- Igår Exploderande Ryzen-processor obduceras – nådde över 1 000 grader 96
- Igår Teenage Engineering gör modern bandspelare för 15 000 kronor 31
- Igår Test: Asus ROG Ally – lika bra som irriterande 33
- Igår Fairphone gör hörlurar i elva delar 26
- Idag EU-lagförslag ska reglera AI och förbjuda riskfylld användning 20
- Idag Google öppnar Bard för alla – svarar fel om Google-produkter 20
- Igår Microsoft Defender slöar ned datorn mer än andra antivirusprogram 86
- 10 / 5 Youtube blockerar annonsblockerare 207
- 9 / 5 Spotify raderar AI-genererad musik – upptäckte artificiella strömningar 21
- Lite tips om uppgradering13
- Färska SDD-enheter överhettas – kan ge datakorruption2
- Portabel kylning till extern 2,5" HDD?0
- Custom loop - temperaturer - 5800x3D/RTX 3080 Ti42
- Router ej kinatillverkad2
- Wordle på svenska - ordlig.se5655
- IPTVbox Formuler Z8 PRO/TVIP 605 4K vad gör dom?6
- Krönika: Är detta början på slutet för PC Master Race?116
- Dagens fynd (bara tips, ingen diskussion) — Läs första inlägget först!16871
- Portabel AC inför sommaren [Samlingstråd]4394
- Säljes Ryzen 5 2600x
- Säljes God of War: Ragnarök inplastad
- Skänkes Nvidia GTX570, Radeon HD4890, nätverkskort, sata-controller
- Säljes Apple Watch Series 3 42mm
- Säljes 32:9 LCD skärm
- Säljes Nvidia Shield K1 tablet
- Säljes Presentkort Webhallen - 4699kr
- Säljes Steam Deck 64GB *NY* + 256GB minneskort
- Säljes Thrustmaster Warthog Hotas + Table mounts
- Säljes 3st sfx PSU/ Razer deathadder V3 Pro/Kone Kone air/ Noctua fläktar
- Färska SDD-enheter överhettas – kan ge datakorruption2
- EU-lagförslag ska reglera AI och förbjuda riskfylld användning20
- Microsoft vill ta Xbox "Quick Resume" till PC15
- Google öppnar Bard för alla – svarar fel om Google-produkter20
- Exploderande Ryzen-processor obduceras – nådde över 1 000 grader96
- Teenage Engineering gör modern bandspelare för 15 000 kronor31
- Test: Asus ROG Ally – lika bra som irriterande33
- Fairphone gör hörlurar i elva delar26
- Quiz: Vad kan du om robotdammsugare?61
- Asus bestyckar färska RTX 4090 med gammal kylare15