Boa tarde amigos.
Tenho um servidor Slackware 10.2 com Squid,sarg,iptables,apache, para ser meu servidor proxy, mas quando coloco ele na minha rede windows, minhas estações navegam blza mas não recebo e nem envio e-mail pelo outlook, ja testei várias regras de pop3 e smtp mas nenhuma da certo, postei meu iptables, se alguem puder me dar essa força para sanar esse problema desde ja agradeço.
#!/bin/sh
echo "LIBERANDO REGRAS"
iptables -t filter -F
iptables -t filter -X
iptables -t filter -Z
iptables -t nat -F
iptables -t nat -X
iptables -t nat -Z
iptables -t mangle -F
iptables -t mangle -X
iptables -t mangle -Z
echo "CONCLUIDO"
echo "FECHANDO PORTAS "
iptables -t filter -P INPUT DROP
iptables -t filter -P FORWARD DROP
iptables -t filter -P OUTPUT ACCEPT
echo "CONCLUIDO"
echo "LIBERANDO MODULOS NECESSARIOS"
modprobe ip_conntrack_ftp
modprobe iptable_nat
modprobe ip_nat_ftp
echo "CONCLUIDO"
echo "LIBERANDO PORTAS DE ENTRADA"
#servidor local
iptables -t filter -A INPUT -s 127.0.0.1 -d 127.0.0.1 -j ACCEPT
#LIBERANDO ACESSO INTERNO DA REDE
iptables -A INPUT -p ALL -s 192.168.0.0/255.255.255.0 -j ACCEPT
iptables -A OUTPUT -p ALL -s 192.168.0.0/255.255.255.0 -j ACCEPT
#iptables -A FORWARD -p ALL -s 192.168.0.0/255.255.255.0 -j ACCEPT
#COMPARTILHANDO A WEB NA REDE INTERNA
#iptables -t nat -A POSTROUTING -s 192.168.0.0/255.255.255.0 eth0 -j MASQUERADE
#echo 1 > /proc/sys/net/ipv4/ip_forward &&
#DNS
iptables -t filter -A INPUT -p tcp --dport 53 -j ACCEPT
iptables -t filter -A INPUT -p tcp --sport 53 -j ACCEPT
iptables -t filter -A INPUT -p udp --dport 53 -j ACCEPT
iptables -t filter -A INPUT -p udp --sport 53 -j ACCEPT
#HTTP
iptables -t filter -A INPUT -p tcp --dport 80 -j ACCEPT
iptables -t filter -A INPUT -p tcp --sport 80 -j ACCEPT
iptables -t filter -A INPUT -p udp --dport 80 -j ACCEPT
iptables -t filter -A INPUT -p udp --sport 80 -j ACCEPT
#HTTPS
iptables -t filter -A INPUT -p tcp --dport 443 -j ACCEPT
iptables -t filter -A INPUT -p tcp --sport 443 -j ACCEPT
iptables -t filter -A INPUT -p udp --dport 443 -j ACCEPT
iptables -t filter -A INPUT -p udp --sport 443 -j ACCEPT
#FTP
iptables -t filter -A INPUT -p tcp --dport 20:21 -j ACCEPT
iptables -t filter -A INPUT -p tcp --sport 20:21 -j ACCEPT
iptables -t filter -A INPUT -p udp --dport 20:21 -j ACCEPT
iptables -t filter -A INPUT -p udp --sport 20:21 -j ACCEPT
#SQUID
iptables -t filter -A INPUT -p tcp --dport 3128 -j ACCEPT
iptables -t filter -A INPUT -p tcp --sport 3128 -j ACCEPT
iptables -t filter -A INPUT -p udp --dport 3128 -j ACCEPT
iptables -t filter -A INPUT -p udp --sport 3128 -j ACCEPT
#SSH
iptables -t filter -A INPUT -p tcp --sport 22 -j ACCEPT
iptables -t filter -A OUTPUT -p tcp --dport 22 -j ACCEPT
#ULTRAVNC
iptables -t filter -A INPUT -p tcp --sport 5800 -j ACCEPT
iptables -t filter -A OUTPUT -p tcp --dport 5800 -j ACCEPT
iptables -t filter -A INPUT -p tcp --sport 5900 -j ACCEPT
iptables -t filter -A OUTPUT -p tcp --dport 5800 -j ACCEPT
#POP3 E SMTP
#outlook
iptables -A FORWARD -p TCP -s 192.168.0.0/24 --dport 110 -j ACCEPT
iptables -A FORWARD -p TCP -d 192.168.0.0/24 --sport 110 -j ACCEPT
iptables -t nat -A POSTROUTING -p TCP --dport 110 -j MASQUERADE
iptables -t nat -A POSTROUTING -p TCP --dport 25 -j MASQUERADE
#E-MAIL GMAIL
iptables -t filter -A FORWARD -p tcp --dport 995 -j ACCEPT
iptables -t filter -A FORWARD -p tcp --sport 995 -j ACCEPT
#ULTRAVNC
#iptables -t nat -A POSTROUTING -p tcp --dport 5900 -j REDIRECT --to 200.233.175.41/24
#CONECTIVIDADE SOCIAL
iptables -t filter -A FORWARD -p tcp --sport 8017 -j ACCEPT
iptables -t filter -A FORWARD -p udp --sport 8017 -j ACCEPT
iptables -t filter -A INPUT -p tcp --dport 8017 -j ACCEPT
iptables -t filter -A INPUT -p tcp --sport 8017 -j ACCEPT
iptables -t filter -A INPUT -p udp --dport 8017 -j ACCEPT
iptables -t filter -A INPUT -p udp --sport 8017 -j ACCEPT
#SKYPE
iptables -A FORWARD -p tcp -s 192.168.0.0/24 --dport 5800:5900 -j ACCEPT
iptables -A FORWARD -p tcp -d 192.168.0.0/24 --sport 5800:5900 -j ACCEPT
iptables -t nat -A POSTROUTING -p tcp --dport 5800:5900 -j MASQUERADE
#SQUID
iptables -A INPUT -p tcp -s 192.168.0.0/24 --dport 3128 -j ACCEPT
#SOCKS (MSN & ICQ)
iptables -A OUTPUT -p tcp --sport 1024:5999 --dport 1863:1863 -m state --state NEW -j ACCEPT
iptables -A INPUT -p tcp --dport 1080 -j ACCEPT
iptables -A OUTPUT -p tcp --dport 1080 -j ACCEPT
#NAT POR PORTA
#GERENCIADOR FINANCEIRO BANCO DO BRASIL
iptables -t filter -A FORWARD -p tcp --dport 5000 -s 192.168.0.0/24 -j ACCEPT
iptables -t filter -A FORWARD -p tcp --sport 5000 -d 192.168.0.0/24 -j ACCEPT
iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -p tcp --dport 5000 -j ACCEPT
iptables -t nat -A POSTROUTING -d 192.168.0.0/24 -p tcp --sport 5000 -j ACCEPT
#COB CAIXA
iptables -t filter -A FORWARD -p tcp --dport 5002 -s 192.168.0.0/24 -j ACCEPT
iptables -t filter -A FORWARD -p tcp --sport 5002 -d 192.168.0.0/24 -j ACCEPT
iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -p tcp --dport 5002 -j ACCEPT
iptables -t nat -A POSTROUTING -d 192.168.0.0/24 -p tcp --sport 5002 -j ACCEPT
#LIBERAR ICMP(Ping)
iptables -A FORWARD -p icmp -s 192.168.0.0/24 -j ACCEPT
#ACELERAR A VELOCIDADE
#iptables -A FORWARD -m state state RELATED,ESTABLISHED -j ACCEPTACELE
echo "CONCLUIDO"
echo "CONFIGURACAO DO FIREWALL CONCLUIDA"
Trabalhando Nativamente com Logs no Linux
Jogando Daikatana (Steam) com Patch 1.3 via Luxtorpeda no Linux
LazyDocker – Interface de Usuário em Tempo Real para o Docker
Linux Mint: Zram + Swapfile em Btrfs
O widget do Plasma 6 Área de Notificação
[Resolvido] Conselho distribuiçao brasileira (12)
Vou destruir sua infância:) (1)









