25
hi
目前遇到一個問題,就是內部人員無法看到內部的網站?
其log如下:
Mar 1 17:15:17 fw kernel: ** Firewall DROP **IN=eth0 OUT=eth0 SRC=192.168.100.14 DST=192.168.100.3 LEN=48 TOS=0x00 PREC=0x00 TTL=126 ID=31814 DF PROTO=TCP SPT=1947 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
192.168.100.3是內部網站。
當然內部網站有轉至外部的公有ip,所以從外連是ok的。
請問可能是被什麼擋了? policy預設為drop
iptables_save 如下:
[root@fw ~]# iptables-save
# Generated by iptables-save v1.3.5 on Wed Mar 1 17:23:55 2006
*filter
:INPUT DROP [13:766]
:FORWARD DROP [19:2601]
:OUTPUT DROP [1:92]
:BADIP - [0:0]
:BADPKT - [0:0]
-A INPUT -i lo -j ACCEPT
-A INPUT -s 127.0.0.0/255.0.0.0 -i ! lo -j DROP
-A INPUT -m state --state INVALID -j BADPKT
-A INPUT -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -j BADPKT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j BADPKT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -j BADPKT
-A INPUT -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j BADPKT
-A INPUT -p tcp -m tcp --tcp-flags FIN,RST FIN,RST -j BADPKT
-A INPUT -p tcp -m tcp --tcp-flags FIN,ACK FIN -j BADPKT
-A INPUT -p tcp -m tcp --tcp-flags ACK,URG URG -j BADPKT
-A INPUT -p tcp -m tcp --tcp-flags PSH,ACK PSH -j BADPKT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,PSH,URG -j BADPKT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,SYN,RST,ACK,URG -j BADPKT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,SYN,RST,PSH,ACK,URG -j BADPKT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN -j BADPKT
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -s 68.166.193.130 -j BADIP
-A INPUT -s 123.100.200.0/255.255.255.0 -j BADIP
-A INPUT -i eth1 -p tcp -m tcp --dport 22 --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -j ACCEPT
-A INPUT -i eth1 -p tcp -m tcp --dport 80 --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -j ACCEPT
-A INPUT -i eth0 -m state --state NEW -j ACCEPT
-A INPUT -j LOG --log-prefix "** Firewall DROP **"
-A FORWARD -m state --state INVALID -j BADPKT
-A FORWARD -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -j BADPKT
-A FORWARD -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j BADPKT
-A FORWARD -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -j BADPKT
-A FORWARD -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j BADPKT
-A FORWARD -p tcp -m tcp --tcp-flags FIN,RST FIN,RST -j BADPKT
-A FORWARD -p tcp -m tcp --tcp-flags FIN,ACK FIN -j BADPKT
-A FORWARD -p tcp -m tcp --tcp-flags ACK,URG URG -j BADPKT
-A FORWARD -p tcp -m tcp --tcp-flags PSH,ACK PSH -j BADPKT
-A FORWARD -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,PSH,URG -j BADPKT
-A FORWARD -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,SYN,RST,ACK,URG -j BADPKT
-A FORWARD -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,SYN,RST,PSH,ACK,URG -j BADPKT
-A FORWARD -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN -j BADPKT
-A FORWARD -o eth1 -p udp -m state --state NEW -m udp --dport 53 -j ACCEPT
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -s 68.166.193.130 -j BADIP
-A FORWARD -s 123.100.200.0/255.255.255.0 -j BADIP
-A FORWARD -i eth1 -o eth0 -p tcp -m tcp --dport 25 --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -j ACCEPT
-A FORWARD -i eth1 -o eth0 -p tcp -m tcp --dport 53 --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -j ACCEPT
-A FORWARD -i eth1 -o eth0 -p tcp -m tcp --dport 80 --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -j ACCEPT
-A FORWARD -i eth1 -o eth0 -p udp -m udp --dport 53 -m state --state NEW -j ACCEPT
-A FORWARD -i eth1 -o eth0 -p icmp -m icmp --icmp-type 0 -m state --state NEW -j ACCEPT
-A FORWARD -i eth1 -o eth0 -p icmp -m icmp --icmp-type 3 -m state --state NEW -j ACCEPT
-A FORWARD -i eth1 -o eth0 -p icmp -m icmp --icmp-type 8 -m state --state NEW -j ACCEPT
-A FORWARD -i eth1 -o eth0 -p icmp -m icmp --icmp-type 11 -m state --state NEW -j ACCEPT
-A FORWARD -i eth0 -o eth1 -m state --state NEW -j ACCEPT
-A FORWARD -j LOG --log-prefix "** Firewall DROP **"
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -d 127.0.0.0/255.0.0.0 -o ! lo -j DROP
-A OUTPUT -p udp -m state --state NEW -m udp --dport 53 -j ACCEPT
-A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -o eth1 -p tcp -m tcp --dport 22 --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -j ACCEPT
-A OUTPUT -o eth1 -p tcp -m tcp --dport 25 --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -j ACCEPT
-A OUTPUT -o eth1 -p tcp -m tcp --dport 53 --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -j ACCEPT
-A OUTPUT -o eth1 -p tcp -m tcp --dport 80 --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -j ACCEPT
-A OUTPUT -o eth1 -p udp -m udp --dport 53 -m state --state NEW -j ACCEPT
-A OUTPUT -o eth1 -p icmp -m icmp --icmp-type 0 -j ACCEPT
-A OUTPUT -o eth1 -p icmp -m icmp --icmp-type 3 -j ACCEPT
-A OUTPUT -o eth1 -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A OUTPUT -o eth1 -p icmp -m icmp --icmp-type 11 -j ACCEPT
-A OUTPUT -o eth0 -p tcp -m tcp --dport 80 --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -j ACCEPT
-A OUTPUT -j LOG --log-prefix "** Firewall DROP **"
-A BADIP -j LOG --log-prefix "** Firewall BADIP **"
-A BADIP -j DROP
-A BADPKT -j LOG --log-prefix "** Firewall BADPKT **"
-A BADPKT -j DROP
COMMIT
# Completed on Wed Mar 1 17:23:55 2006
# Generated by iptables-save v1.3.5 on Wed Mar 1 17:23:55 2006
*mangle
:PREROUTING ACCEPT [8757454:4977786340]
:INPUT ACCEPT [838607:64205306]
:FORWARD ACCEPT [7907181:4911938575]
:OUTPUT ACCEPT [145259:43556420]
:POSTROUTING ACCEPT [7128504:4386718669]
COMMIT
# Completed on Wed Mar 1 17:23:55 2006
# Generated by iptables-save v1.3.5 on Wed Mar 1 17:23:55 2006
*nat
:PREROUTING ACCEPT [1003662:73062372]
:POSTROUTING ACCEPT [10513:556455]
:OUTPUT ACCEPT [736:51574]
-A PREROUTING -d 61.30.10.x -i eth1 -p udp -m udp --dport 53 -j DNAT --to-destination 192.168.100.3
-A PREROUTING -d 61.30.10.x -p tcp -m tcp --dport 80 -j DNAT --to-destination 192.168.100.3
-A PREROUTING -d 61.30.10.x -p tcp -m tcp --dport 25 -j DNAT --to-destination 192.168.100.3
-A PREROUTING -d 61.30.10.x -p tcp -m tcp --dport 53 -j DNAT --to-destination 192.168.100.3
-A POSTROUTING -s 192.168.100.0/255.255.255.0 -o eth1 -j MASQUERADE
COMMIT
# Completed on Wed Mar 1 17:23:55 2006
[root@fw ~]#