se llama gdesklets xD
mirar por google que hay una guia de los usuarios de ubuntu
mirar por google que hay una guia de los usuarios de ubuntu

Esta sección te permite ver todos los mensajes escritos por este usuario. Ten en cuenta que sólo puedes ver los mensajes escritos en zonas a las que tienes acceso en este momento.
Mostrar Mensajes MenúCitar
UnderHouse linux # modprobe -l | grep netfilter
/lib/modules/2.6.14-gentoo-r5/kernel/net/ipv4/netfilter/ip_conntrack.ko
/lib/modules/2.6.14-gentoo-r5/kernel/net/ipv4/netfilter/iptable_nat.ko
/lib/modules/2.6.14-gentoo-r5/kernel/net/ipv4/netfilter/iptable_mangle.ko
/lib/modules/2.6.14-gentoo-r5/kernel/net/ipv4/netfilter/iptable_filter.ko
/lib/modules/2.6.14-gentoo-r5/kernel/net/ipv4/netfilter/ipt_state.ko
/lib/modules/2.6.14-gentoo-r5/kernel/net/ipv4/netfilter/ipt_limit.ko
/lib/modules/2.6.14-gentoo-r5/kernel/net/ipv4/netfilter/ipt_REDIRECT.ko
/lib/modules/2.6.14-gentoo-r5/kernel/net/ipv4/netfilter/ipt_MASQUERADE.ko
/lib/modules/2.6.14-gentoo-r5/kernel/net/ipv4/netfilter/ipt_LOG.ko
/lib/modules/2.6.14-gentoo-r5/kernel/net/ipv4/netfilter/ip_tables.ko
/lib/modules/2.6.14-gentoo-r5/kernel/net/ipv4/netfilter/ip_nat.ko
Citarmodprobe ip_tables iptable_filter iptable_nat
CitarConceptos basicos
cd /usr/src/linux
make menuconfig
##Dejar la siguiente configuración (es la que recomiendo):
---------------------------------------------------------------------------
Networking --->
Networking options --->
- TCP/IP networking
- IP: multicasting
- IP: advanced router
- Network packet filtering (replaces ipchains) --->
IP: Netfilter Configuration --->
<M> Connection tracking (required for masq/NAT)
<M> IP tables support (required for filtering/masq/NAT)
<M> limit match support
<M> Connection state match support
<M> Packet filtering
<M> LOG target support
<M> Full NAT
<M> MASQUERADE target support
<M> REDIRECT target support
<M> Packet mangling
-------------------------------------------------------------------------------
###############################################################################
make && make modules_install && make install
Citar
UnderHouse soullost # iptables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Citar
iptables -P INPUT DROP
iptables -P OUTPUT ACCEPT
iptables -P FORWARD DROP
Citar
UnderHouse soullost # iptables -L
Chain INPUT (policy DROP)
target prot opt source destination
Chain FORWARD (policy DROP)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Citar
soullost@UnderHouse ~ $ su -c "ifconfig eth0"
Password:
eth0 Link encap:Ethernet HWaddr 00:0B:6A:8E:94:D8
inet addr:192.168.1.2 Bcast:192.168.1.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:137 errors:0 dropped:0 overruns:0 frame:0
TX packets:137 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:92963 (90.7 Kb) TX bytes:15155 (14.7 Kb)
Interrupt:11 Base address:0x6f00
Citar
iptables -P INPUT DROP
iptables -P OUTPUT DROP
iptables -P FORWARD DROP
Citar
UnderHouse soullost # ping 192.168.1.1
PING 192.168.1.1 (192.168.1.1) 56(84) bytes of data.
ping: sendmsg: Operation not permitted
ping: sendmsg: Operation not permitted
ping: sendmsg: Operation not permitted
--- 192.168.1.1 ping statistics ---
3 packets transmitted, 0 received, 100% packet loss, time 2012ms
Citar
UnderHouse soullost # iptables -A OUTPUT -s 192.168.1.2 -d 192.168.1.1 -p icmp -j ACCEPT
CitarUnderHouse soullost # ping 192.168.1.1
PING 192.168.1.1 (192.168.1.1) 56(84) bytes of data.
--- 192.168.1.1 ping statistics ---
2 packets transmitted, 0 received, 100% packet loss, time 1000ms
Citar
UnderHouse soullost # iptables -A INPUT -s 192.168.1.1 -d 192.168.1.2 -p icmp -j ACCEPT
Citar
UnderHouse soullost # ping 192.168.1.1
PING 192.168.1.1 (192.168.1.1) 56(84) bytes of data.
64 bytes from 192.168.1.1: icmp_seq=1 ttl=30 time=0.286 ms
64 bytes from 192.168.1.1: icmp_seq=2 ttl=30 time=0.328 ms
--- 192.168.1.1 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time 1006ms
rtt min/avg/max/mdev = 0.286/0.307/0.328/0.021 ms
Citar
UnderHouse soullost # iptables -L
Chain INPUT (policy DROP)
target prot opt source destination
ACCEPT icmp -- 192.168.1.1 192.168.1.2
Chain FORWARD (policy DROP)
target prot opt source destination
Chain OUTPUT (policy DROP)
target prot opt source destination
ACCEPT icmp -- 192.168.1.2 192.168.1.1
CitarUnderHouse soullost # telnet 192.168.1.1
Trying 192.168.1.1...
Citar
UnderHouse soullost # iptables -A OUTPUT -s 192.168.1.2 -d 192.168.1.1 -p tcp --sport 1024:65535 --dport 23 -j ACCEPT
Citar
UnderHouse soullost # iptables -A INPUT -s 192.168.1.1 -d 192.168.1.2 -p tcp --sport 23 --dport 1024:65535 -j ACCEPT
Citar
UnderHouse soullost # telnet 192.168.1.1 Trying 192.168.1.1...
Connected to 192.168.1.1.
Escape character is '^]'.
SpeedStream Telnet Server
login: as
password:
password: Connection closed by foreign host.
Citar
UnderHouse soullost # iptables -L -n
Chain INPUT (policy DROP)
target prot opt source destination
Chain FORWARD (policy DROP)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Citar
UnderHouse soullost # iptables -A INPUT -s 192.168.1.1 -i eth0 -p icmp -j ACCEPT
Citar
UnderHouse soullost # iptables -A INPUT -i eth0 -p udp --sport 53 -j ACCEPT
Citar
UnderHouse soullost # iptables -A INPUT -i eth0 -p tcp --sport 80 -j ACCEPT
Citar
iptables -A INPUT -i eth0 -p tcp -m state --state ESTABLISHED,RELATED -j ACCEPT
Citar
UnderHouse soullost # iptables -L --line-numbers
Chain INPUT (policy DROP)
num target prot opt source destination
1 ACCEPT icmp -- 192.168.1.1 anywhere
2 ACCEPT tcp -- anywhere anywhere tcp spt:http
3 ACCEPT udp -- anywhere anywhere udp spt:domain
4 ACCEPT tcp -- anywhere anywhere state RELATED,ESTABLISHED
Chain FORWARD (policy DROP)
num target prot opt source destination
Chain OUTPUT (policy ACCEPT)
num target prot opt source destination
Citar
UnderHouse soullost # iptables -D INPUT 1
Citar
net.ipv4.ip_forward = 1
Modem
--------- eth0 --------------- eth1 -----------
router ----> MiPc (gateway) ------> switch/hub
--------- --------------- -----------
|__|___|__________________________
| | |
-------- ------- --------
PC1 PC2 PC3
-------- ------- --------
Citar
UnderHouse soullost # route
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
192.168.1.0 * 255.255.255.0 U 0 0 0 eth0
loopback localhost 255.0.0.0 UG 0 0 0 lo
default 192.168.1.1 0.0.0.0 UG 0 0 0 eth0
Citar
UnderHouse soullost # iptables -t nat -A POSTROUTING -o eth0 -j SNAT --to 200.33.146.217
Citar
UnderHouse soullost # iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
Citar
UnderHouse soullost # iptables -t nat -A PREROUTING -p tcp --dport 80 -i eth1 -j DNAT --to 192.33.20.3:80
Citar
UnderHouse soullost # iptables -t nat -A PREROUTING -p tcp --dport 80 -j REDIRECT --to-port 113