insmac
Newbie | Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору помогите разобраться. Не устанавливает соединения ESTABLISHED по порту 4899. Делаю проброс порта: Код: filter chain=forward src-address=1.1.1.1 dst-address=2.2.2.2 protocol=tcp dst-port=4899 action=accept nat chain=dstnat in-interface=ether1 src-address=1.1.1.1 protocol=tcp dst-port=4899 action=dst-nat to-addresses=2.2.2.2 to-ports=4899 | проблема в том что отправляется SYN SENT но ответа не получает( ип 2.2.2.2 на соединения по порту 4899 внутри сети реагирует, дает возможность подключиться. Ниже приведу все цепочки которые есть: таблица filter Код: 0 ;;; Port scanners to list chain=input protocol=tcp psd=21,3s,3,1 action=add-src-to-address-list address-list=port scanners address-list-timeout=2w 1 ;;; NMAP FIN Stealth scan chain=input protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg action=add-src-to-address-list address-list=port scanners address-list-timeout=2w 2 ;;; SYN/FIN scan chain=input protocol=tcp tcp-flags=fin,syn action=add-src-to-address-list address-list=port scanners address-list-timeout=2w 3 ;;; SYN/RST scan chain=input protocol=tcp tcp-flags=syn,rst action=add-src-to-address-list address-list=port scanners address-list-timeout=2w 4 ;;; FIN/PSH/URG scan chain=input protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack action=add-src-to-address-list address-list=port scanners address-list-timeout=2w 5 ;;; ALL/ALL scan chain=input protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg action=add-src-to-address-list address-list=port scanners address-list-timeout=2w 6 ;;; NMAP NULL scan chain=input protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg action=add-src-to-address-list address-list=port scanners address-list-timeout=2w 7 ;;; dropping port scanners chain=input src-address-list=port scanners action=drop 14 chain=forward protocol=tcp action=jump jump-target=tcp 15 chain=forward protocol=udp action=jump jump-target=udp 16 chain=forward protocol=icmp action=jump jump-target=icmp 18 chain=forward connection-state=established action=accept 19 chain=forward connection-state=related action=accept 20 chain=icmp protocol=icmp icmp-options=0:0 action=accept 21 chain=icmp protocol=icmp icmp-options=3:0 action=accept 22 chain=icmp protocol=icmp icmp-options=11:0 action=accept 23 chain=icmp protocol=icmp icmp-options=3:1 action=accept 24 chain=icmp protocol=icmp icmp-options=4:0 action=accept 25 chain=icmp protocol=icmp icmp-options=8:0 action=accept 26 chain=icmp protocol=icmp icmp-options=12:0 action=accept 27 chain=input protocol=icmp action=accept 28 chain=input protocol=udp action=accept 33 chain=forward src-address=2.2.2.2 action=accept 34 chain=forward in-interface=ether1 src-address=1.1.1.1 dst-address=2.2.2.2 protocol=tcp dst-port=4899 action=log log-prefix="" 35 chain=forward src-address=1.1.1.1 dst-address=2.2.2.2 protocol=tcp dst-port=4899 action=accept 38 ;;; SYN Flood protect chain=input protocol=tcp connection-limit=100,32 action=add-src-to-address-list address-list=blocked-addr address-list-timeout=1d 39 chain=input protocol=tcp connection-limit=3,32 src-address-list=blocked-addr action=tarpit 40 chain=forward protocol=tcp tcp-flags=syn connection-state=new action=jump jump-target=SYN-Protect 41 chain=SYN-Protect protocol=tcp tcp-flags=syn limit=400,5 connection-state=new action=accept 42 chain=SYN-Protect protocol=tcp tcp-flags=syn connection-state=new action=drop 43 ;;; Drop Blaster Worm chain=virus protocol=tcp dst-port=135-139 action=drop 44 ;;; Drop Messenger Worm chain=virus protocol=udp dst-port=135-139 action=drop 45 ;;; Drop Blaster Worm chain=virus protocol=tcp dst-port=445 action=drop 46 ;;; Drop Blaster Worm chain=virus protocol=udp dst-port=445 action=drop 47 ;;; ________ chain=virus protocol=tcp dst-port=593 action=drop 48 ;;; ________ chain=virus protocol=tcp dst-port=1024-1030 action=drop 49 ;;; Drop MyDoom chain=virus protocol=tcp dst-port=1080 action=drop 50 ;;; ________ chain=virus protocol=tcp dst-port=1214 action=drop 51 ;;; ndm requester chain=virus protocol=tcp dst-port=1363 action=drop 52 ;;; ndm server chain=virus protocol=tcp dst-port=1364 action=drop 53 ;;; screen cast chain=virus protocol=tcp dst-port=1368 action=drop 54 ;;; hromgrafx chain=virus protocol=tcp dst-port=1373 action=drop 55 ;;; cichlid chain=virus protocol=tcp dst-port=1377 action=drop 56 ;;; Worm chain=virus protocol=tcp dst-port=1433-1434 action=drop 57 ;;; Bagle Virus chain=virus protocol=tcp dst-port=2745 action=drop 58 ;;; Drop Dumaru.Y chain=virus protocol=tcp dst-port=2283 action=drop 59 ;;; Drop Beagle chain=virus protocol=tcp dst-port=2535 action=drop 60 ;;; Drop Beagle.C-K chain=virus protocol=tcp dst-port=2745 action=drop 61 ;;; Drop MyDoom chain=virus protocol=tcp dst-port=3127-3128 action=drop 62 ;;; Drop Backdoor OptixPro chain=virus protocol=tcp dst-port=3410 action=drop 63 ;;; Worm chain=virus protocol=tcp dst-port=4444 action=drop 64 ;;; Worm chain=virus protocol=udp dst-port=4444 action=drop 65 ;;; Drop Sasser chain=virus protocol=tcp dst-port=5554 action=drop 66 ;;; Drop Beagle.B chain=virus protocol=tcp dst-port=8866 action=drop 67 ;;; Drop Dabber.A-B chain=virus protocol=tcp dst-port=9898 action=drop 68 ;;; Drop Dumaru.Y chain=virus protocol=tcp dst-port=10000 action=drop 69 ;;; Drop MyDoom.B chain=virus protocol=tcp dst-port=10080 action=drop 70 ;;; Drop NetBus chain=virus protocol=tcp dst-port=12345 action=drop 71 ;;; Drop Kuang2 chain=virus protocol=tcp dst-port=17300 action=drop 72 ;;; Drop SubSeven chain=virus protocol=tcp dst-port=27374 action=drop 73 ;;; Drop PhatBot, Agobot, Gaobot chain=virus protocol=tcp dst-port=65506 action=drop 74 ;;; jump to the virus chain chain=forward action=jump jump-target=virus 75 chain=input connection-state=invalid action=drop 76 chain=forward protocol=tcp tcp-flags=syn connection-limit=6,32 action=dro> 77 chain=forward protocol=tcp connection-state=invalid action=drop 78 chain=forward src-address=0.0.0.0/8 action=drop 79 chain=forward dst-address=0.0.0.0/8 action=drop 80 chain=forward src-address=127.0.0.0/8 action=drop 81 chain=forward dst-address=127.0.0.0/8 action=drop 82 chain=forward src-address=224.0.0.0/3 action=drop 83 chain=forward dst-address=224.0.0.0/3 action=drop 84 chain=input protocol=tcp dst-port=23 action=drop 85 chain=tcp protocol=tcp dst-port=69 action=drop 86 chain=tcp protocol=tcp dst-port=111 action=drop 87 chain=udp protocol=udp dst-port=111 action=drop 92 chain=tcp protocol=tcp dst-port=2049 action=drop 93 chain=tcp protocol=tcp dst-port=12345-12346 action=drop 94 chain=tcp protocol=tcp dst-port=20034 action=drop 95 chain=tcp protocol=tcp dst-port=3133 action=drop 96 chain=tcp protocol=tcp dst-port=67-68 action=drop 97 chain=udp protocol=udp dst-port=69 action=drop 98 chain=udp protocol=udp dst-port=2049 action=drop 99 chain=udp protocol=udp dst-port=3133 action=drop 100 chain=icmp action=drop 101 chain=forward action=drop | таблица nat Код: 0 chain=dstnat in-interface=ether1 protocol=tcp dst-port=4899 icmp-options=0:0 action=log log-prefix="" 1 chain=dstnat in-interface=ether1 src-address=1.1.1.1 protocol=tcp dst-port=4899 action=dst-nat to-addresses=2.2.2.2 to-ports=4899 7 chain=srcnat out-interface=!ether2 action=masquerade | подскажите где упустил возможность установки соединения? буду признателен! |