next up previous
Next: About this document ...

Configuring a Stateful Linux Firewall with IPTables / NetFilter

Tony Perrie
Engineer / Scientist
IBM Network Processor Development
Rochester, Minnesota

January 9, 2002

Linux Packet Filtering Implementations

Routing Packets with SNAT

Default Policies / Output Port Blocking

Output Port Blocking / External Port Blocking

Drop Bogus Packets / Log & Limit Suspicious Traffic

Jump to a Custom Chain / Define Stateful Rules Blocking ICMP / Port Forwarding with DNAT ToS Packet Mangling / MAC Addresses as Filtering Criteria IBM-Rochester Nortel VPN Access
 ## OPENS NORTEL EXTERNAL PORT 500
 iptables -A OUTPUT  -i eth0 -p tcp
--dport 500 -j ACCEPT
 iptables -A FORWARD -i eth0 -p tcp
--dport 500 -j ACCEPT
 ## PORT FORWARD FOR IPSEC "REKEYING"
 iptables -t nat -A PREROUTING -i eth0 -p 17 
   --dport 500 -j DNAT --to 192.168.0.2:500

Configuring dhcpd

#filename: /etc/dhcpd.conf

default-lease-time 86400;
max-lease-time 86400;

subnet 192.168.0.0 netmask 255.255.255.0 {
  range 192.168.0.2 192.168.0.250;
  option subnet-mask 255.255.255.0;
  option broadcast-address 192.168.0.255;
  option routers 192.168.0.1;
  option domain-name-servers 192.168.0.4, 
  12.24.250.39, 12.24.250.40, 206.25.127.40;
  option domain-name "chartermi.net";
}




next up previous
Next: About this document ...
root 2002-01-09