Sziasztok,
Nem működik a masquerading. Tudtok segíteni?
OS: Debian-lenny
Két hálókártya: eth0 WAN fele, ath0 vezetéknélküli hálókártya LAN, AP-nak beállítva. Driver madwifi.
eth0 ADSL routerről kap IP-címet (192.168.1.100), ath0-nek statikus címe van: 192.168.2.1
IP-masquerading van beállítva.
Kliens csatlakozik az AP-hoz. Böngészés viszont nem megy.
/etc/network/interfaces:
auto lo
iface lo inet loopback
# The primary network interface
allow-hotplug eth0
iface eth0 inet dhcp
up ethtool -s eth0 wol g
#Ap interface setup
auto ath0
iface ath0 inet static
address 192.168.2.1
netmask 255.255.255.0
broadcast 192.168.2.255
pre-up /etc/init.d/ath0_preup
post-down /etc/init.d/ath0_postdown
iptables_rules:
#!/bin/bash
case "$1" in
start)
echo -n "Starting IP Firewall..."
#allandok
NET_INT=192.168.1.0/255.255.255 #belso halozatot lefedo teljes cimtartomany
IFACE=eth0
WLANIF=ath0
IP_GW=192.168.1.1 #gateway address
#IPtables modulok betoltese
modprobe ip_conntrack_ftp
## Kernel flags
# To dynamically change kernel parameters and variables on the fly you need
# CONFIG_SYSCTL defined in your kernel. I would advise the following:
# Disable response to ping.
/bin/echo "1" > /proc/sys/net/ipv4/icmp_echo_ignore_all
# Disable response to broadcasts.
# You don't want yourself becoming a Smurf amplifier.
/bin/echo "1" > /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts
# Don't accept source routed packets. Attackers can use source routing to generate
# traffic pretending to be from inside your network, but which is routed back along
# the path from which it came, namely outside, so attackers can compromise your
# network. Source routing is rarely used for legitimate purposes.
/bin/echo "0" > /proc/sys/net/ipv4/conf/all/accept_source_route
# Disable ICMP redirect acceptance. ICMP redirects can be used to alter your routing
# tables, possibly to a bad end.
/bin/echo "0" > /proc/sys/net/ipv4/conf/all/accept_redirects
# Enable bad error message protection.
/bin/echo "1" > /proc/sys/net/ipv4/icmp_ignore_bogus_error_responses
# Log spoofed packets, source routed packets, redirect packets.
/bin/echo "1" > /proc/sys/net/ipv4/conf/all/log_martians
# This enables dynamic address hacking.
# This may help if you have a dynamic IP address \(e.g. slip, ppp, dhcp\).
/bin/echo "1" > /proc/sys/net/ipv4/ip_dynaddr
# Make sure that IP forwarding is turned off. We only want this for a multi-homed host.
/bin/echo "1" > /proc/sys/net/ipv4/ip_forward
#Clear old rules
iptables -F
iptables -X
iptables -t nat -F
iptables -t nat -X
iptables -Z
#-----------Chain_Rules---------------------------#
iptables -P INPUT DROP
iptables -P OUTPUT DROP
iptables -P FORWARD DROP
#----------------------Loopback_Interface_engedelyezese------------------------#
iptables -A INPUT -i lo -j ACCEPT
iptables -A OUTPUT -o lo -j ACCEPT
#---------------------Gateway_engedelyezese------------------------------------#
iptables -A INPUT -s 192.168.1.1 -j ACCEPT
iptables -A OUTPUT -d 192.168.1.1 -j ACCEPT
#-------------------------------VMWare-----------------------------------------#
iptables -A INPUT -i vmnet8 -j ACCEPT
iptables -A INPUT -i vmnet1 -j ACCEPT
iptables -A OUTPUT -o vmnet8 -j ACCEPT
iptables -A OUTPUT -o vmnet8 -j ACCEPT
#--------------------Network_printer_engedelyezese-----------------------------#
iptables -A INPUT -s 192.168.1.115 -j ACCEPT
iptables -A OUTPUT -d 192.168.1.115 -j ACCEPT
#-------------------WLANSETUP--------------------------------------------------#
iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
iptables -A FORWARD -i eth0 -o ath0 -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -i ath0 -o eth0 -m state --state NEW -j ACCEPT
#-------------------------------------------------------------------------------#
# Allow DHCP request
iptables -A INPUT -p udp --dport 67:68 --sport 67:68 -j ACCEPT
iptables -A OUTPUT -p udp --dport 67:68 --sport 67:68 -j ACCEPT
## SYN-FLOODING PROTECTION
## Make sure NEW tcp connections are SYN packets
iptables -A INPUT -p tcp ! --syn -m state --state NEW -j LOG --log-prefix "hidden portscan :"
iptables -A INPUT -p tcp ! --syn -m state --state NEW -j DROP
## SYN-FLOODING PROTECTION
# This rule maximises the rate of incoming connections. In order to do this we divert tcp
# packets with the SYN bit set off to a user-defined chain. Up to limit-burst connections
# can arrive in 1/limit seconds ..... in this case 4 connections in one second. After this, one
# of the burst is regained every second and connections are allowed again. The default limit
# is 3/hour. The default limit burst is 5.
iptables -N syn-flood
iptables -A INPUT -p tcp --syn -j syn-flood
iptables -A syn-flood -m limit --limit 1/s --limit-burst 4 -j RETURN
iptables -A syn-flood -j LOG --log-prefix "SYN-Flood attack :"
iptables -A syn-flood -p tcp --syn -j DROP
# Nmap FIN/URG/PSH
iptables -A INPUT -p tcp --tcp-flags ALL FIN,URG,PSH -m limit --limit 5/m -j LOG --log-prefix "Nmap XMAS scan :"
iptables -A INPUT -p tcp --tcp-flags ALL FIN,URG,PSH -j DROP
# SYN/RST
iptables -A INPUT -p tcp --tcp-flags SYN,RST SYN,RST -m limit --limit 5/m -j LOG --log-prefix "SYN/RST scan :"
iptables -A INPUT -p tcp --tcp-flags SYN,RST SYN,RST -j DROP
#SYN/FIN
iptables -A INPUT -p tcp --tcp-flags SYN,FIN SYN,FIN -m limit --limit 5/m -j LOG --log-prefix "SYN/FIN scan :"
iptables -A INPUT -p tcp --tcp-flags SYN,FIN SYN,FIN -j DROP
# Portscan,PoD
iptables -A INPUT -p tcp --tcp-flags ALL ALL -j LOG --log-prefix "XMAS-tree scan :"
iptables -A INPUT -p tcp --tcp-flags ALL NONE -m state --state ! ESTABLISHED -j LOG --log-prefix "NULL scan :"
# Jovahagyott kapcsolatok engedelyezese
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A OUTPUT -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
# Allow no-ip.org
iptables -A INPUT -p tcp -s 204.16.252.97 --sport 8245 -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A OUTPUT -p tcp -d 204.16.252.97 --dport 8245 -m state --state NEW,ESTABLISHED -j ACCEPT
## DNS
# NOTE: DNS uses tcp for zone transfers, for transfers greater than 512 bytes (possible, but unusual), and on certain
# platforms like AIX (I am told), so you might have to add a copy of this rule for tcp if you need it
# Allow UDP packets in for DNS client from nameservers.
iptables -A INPUT -p udp --sport 53 -m state --state ESTABLISHED -j ACCEPT
iptables -A INPUT -p tcp --sport 53 -m state --state ESTABLISHED -j ACCEPT
iptables -A INPUT -p udp --sport 5353 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
iptables -A INPUT -p tcp --sport 5353 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
# Allow UDP packets to DNS servers from client.
iptables -A OUTPUT -p udp --dport 53 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A OUTPUT -p tcp --dport 53 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A OUTPUT -p udp --sport 5353 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A OUTPUT -p tcp --sport 5353 -m state --state NEW,ESTABLISHED -j ACCEPT
#Allow SSH and logging
iptables -A INPUT -p tcp --dport 22 -m limit --limit 6/h --limit-burst 5 -j LOG --log-prefix "Incoming_SSH_connection: "
#ALLOW SSH IN
iptables -A INPUT -p tcp --dport 22 -m state --state NEW -m recent --set
iptables -A INPUT -p tcp --dport 22 -m state --state NEW -m recent --update --seconds 60 --hitcount 2 -j DROP
#iptables -A INPUT -p tcp -s 213.253.214.125 --dport 22 -m state --state NEW,ESTABLISHED -j ACCEPT
#iptables -A INPUT -p tcp -s 217.22.55.50 --dport 22 -m state --state NEW,ESTABLISHED -j ACCEPT
#iptables -A INPUT -p tcp -s 192.168.1.1/24 --dport 22 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A OUTPUT -p tcp --sport 22 -m state --state ESTABLISHED -j ACCEPT
#ALLOW SSH OUT
iptables -A INPUT -p tcp --sport 22 -m state --state ESTABLISHED -j ACCEPT
iptables -A OUTPUT -p tcp --dport 22 -m state --state NEW,ESTABLISHED -j ACCEPT
## FTP In and Out
# FTP loggolasa
iptables -A INPUT -p tcp --dport 21 -j LOG --log-prefix "Incoming_FTP_Connection: "
# Allow ftps inbound
iptables -A INPUT -p tcp --sport 1024: --dport 989:990 -j ACCEPT
iptables -A INPUT -p udp --sport 1024: --dport 989:990 -j ACCEPT
# Allow ftp server inbound
# Allow active ftp
iptables -A INPUT -p tcp --dport 21 --sport 1024: -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A OUTPUT -p tcp --sport 21 --dport 1024: -m state --state ESTABLISHED -j ACCEPT
iptables -A INPUT -p tcp --sport 1024: --dport 20 -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A OUTPUT -p tcp --sport 20 --dport 1024: -m state --state ESTABLISHED,RELATED -j ACCEPT
# Allow passive ftp
#iptables -A INPUT -p tcp --dport 21 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A OUTPUT -p tcp --sport 21 --dport 1024: -m state --state ESTABLISHED -j ACCEPT
iptables -A INPUT -p tcp --sport 1024: --dport 50000:50100 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
iptables -A OUTPUT -p tcp --sport 50000:50100 --dport 1024: -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
# Allow ftp client outbound.
iptables -A INPUT -p tcp --sport 21 -m state --state ESTABLISHED -j ACCEPT
iptables -A OUTPUT -p tcp --dport 21 -m state --state NEW,ESTABLISHED -j ACCEPT
# Now for the connection tracking part of ftp. This is discussed more completely in my section
# on connection tracking to be found here.
# 1) Active ftp.
# This involves a connection INbound from port 20 on the remote machine, to a local port
# passed over the ftp channel via a PORT command. The ip_conntrack_ftp module recognizes
# the connection as RELATED to the original outgoing connection to port 21 so we don't
# need NEW as a state match.
iptables -A INPUT -p tcp --sport 20 -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A OUTPUT -p tcp --dport 20 -m state --state ESTABLISHED -j ACCEPT
# 2) Passive ftp.
# This involves a connection outbound from a port >1023 on the local machine, to a port >1023
# on the remote machine previously passed over the ftp channel via a PORT command. The
# ip_conntrack_ftp module recognizes the connection as RELATED to the original outgoing
# connection to port 21 so we don't need NEW as a state match.
iptables -A INPUT -p tcp --sport 1024:65535 --dport 1024:65535 -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A OUTPUT -p tcp --sport 1024:65535 --dport 1024:65535 -m state --state ESTABLISHED,RELATED -j ACCEPT
## Allow Apache Web Server inbound
iptables -A INPUT -p tcp --sport 1024: -m multiport --dports 80,8080,443 -j LOG --log-prefix "Incoming_web_connection: "
iptables -A INPUT -p tcp --sport 1024: -m multiport --dports 80,443 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A OUTPUT -p tcp --sport 80 --dport 1024: -m state --state ESTABLISHED,RELATED -j ACCEPT
## Allow web browser outbound
iptables -A INPUT -p tcp -m multiport --sports 80,8080,443 -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A OUTPUT -p tcp --sport 1024: -m multiport --dports 80,8080,443 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
# Allow Privoxy
iptables -A INPUT -p tcp -s 127.0.0.1 --dport 8118 -j ACCEPT
iptables -A OUTPUT -p tcp -m owner --uid-owner 109 -j ACCEPT
#Allow Tor client
iptables -A INPUT -p tcp -s 127.0.0.1 --dport 9050 -j ACCEPT
iptables -A OUTPUT -p tcp -m owner --uid-owner 110 -j ACCEPT
# Allow Tor server
iptables -A INPUT -p tcp -m multiport --dports 9001,9030 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A OUTPUT -p tcp -m multiport --sports 9001,9030 -m state --state ESTABLISHED,RELATED -j ACCEPT
#Allow Bittornado
#Allow tracker port
iptables -A OUTPUT -p tcp -m multiport --dports 6969,9898 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A INPUT -p tcp -m multiport --sports 6969,9898 -m state --state ESTABLISHED,RELATED -j ACCEPT
#Minport 10001, maxport 10004
iptables -A INPUT -p tcp --dport 6881:6999 -j ACCEPT
iptables -A INPUT -p tcp --dport 10001:10004 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
iptables -A INPUT -p udp --dport 10001:10004 -j ACCEPT
#iptables -A OUTPUT -p tcp -m owner --uid-owner 1000 -j ACCEPT
# Spamassassin utilizes port 783 to properly scan and release e-mail. If you have a firewall on
#your server, you will need to open port 783 going in and out.
iptables -A INPUT -s 127.0.0.1 -p tcp --dport 783 -j ACCEPT
iptables -A OUTPUT -d 127.0.0.1 -p tcp --dport 783 -j ACCEPT
# Allow CUPS
iptables -A INPUT -s 127.0.0.1 -p tcp --dport 631 -j ACCEPT
iptables -A INPUT -s 127.0.0.1 -p udp --dport 631 -j ACCEPT
iptables -A OUTPUT -d 127.0.0.1 -p tcp --dport 631 -j ACCEPT
iptables -A OUTPUT -d 127.0.0.1 -p udp --dport 631 -j ACCEPT
# Allow HPLIP
iptables -A INPUT -s 127.0.0.1 -p tcp --dport 2207:2208 -j ACCEPT
iptables -A INPUT -s 127.0.0.1 -p udp --dport 2207:2208 -j ACCEPT
iptables -A OUTPUT -d 127.0.0.1 -p tcp --dport 2207:2208 -j ACCEPT
iptables -A OUTPUT -d 127.0.0.1 -p udp --dport 2207:2208 -j ACCEPT
iptables -A INPUT -s 127.0.0.1 -p tcp --dport 2912 -j ACCEPT
iptables -A OUTPUT -d 127.0.0.1 -p tcp --dport 2912 -j ACCEPT
#Telnet
iptables -A INPUT -p tcp --sport 23 -m state --state ESTABLISHED -j ACCEPT
iptables -A OUTPUT -p tcp --dport 23 -m state --state NEW,ESTABLISHED -j ACCEPT
## SMTP,SMTPS,IMAP,IMAPS,POP3,POP3S
# Allow smtp,POP etc. outbound.
iptables -A INPUT -p tcp -m multiport --sports 25,465,143,993,110,995 -m state --state ESTABLISHED -j ACCEPT
iptables -A OUTPUT -p tcp -m multiport --dports 25,465,143,993,110,995 -m state --state NEW,ESTABLISHED -j ACCEPT
## AUTH server
# Reject ident probes with a tcp reset.
# I need to do this for a broken mailhost that won't accept my mail if I just drop its ident probe.
iptables -A INPUT -p tcp --dport 113 -j REJECT --reject-with tcp-reset
# ntp, rdate
iptables -I INPUT -p udp --sport 123 --dport 123 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -I INPUT -p tcp --dport 123 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A OUTPUT -p udp --sport 123 --dport 123 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A OUTPUT -p tcp -m multiport --dport 123,37 -m state --state NEW,ESTABLISHED -j ACCEPT
# Skype
iptables -A INPUT -p tcp --dport 23399 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A INPUT -p udp --dport 23399 -m state --state NEW,ESTABLISHED -j ACCEPT
# Ekiga
iptables -A INPUT -p udp -m multiport --sports 3478,5060 -m state --state NEW,ESTABLISHED -j ACCEPT
# Allow IRC
iptables -A INPUT -p tcp --sport 6667 -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A OUTPUT -p tcp --dport 6667 -m state --state NEW,ESTABLISHED -j ACCEPT
# Talk,ntalk
#iptables -A INPUT -p udp --dport 517:518 -j ACCEPT
#iptables -A OUTPUT -p udp --sport 517:518 -j ACCEPT
# ICQ
iptables -A OUTPUT -p tcp --dport 5190 -m state --state NEW,ESTABLISHED -j ACCEPT
# Skype
iptables -A INPUT -p tcp --dport 2172 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A INPUT -p udp --dport 2172 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A OUTPUT -p tcp --sport 2172 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A OUTPUT -p udp --sport 2172 -m state --state NEW,ESTABLISHED -j ACCEPT
# MSN,Yahoo
iptables -A OUTPUT -p tcp -m multiport --dports 1863,6891,6892,6893,6894,6895,6896,6897,6898,6899,6900,5050 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A OUTPUT -p udp -m multiport --dports 1900,6891:6900 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A INPUT -p udp -m multiport --dports 6891:6900 -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A INPUT -p tcp -m multiport --dports 1863,6891,6892,6893,6894,6895,6896,6897,6898,6899,6900,5050 -m state --state ESTABLISHED,RELATED -j ACCEPT
# PGP Keyserver
iptables -A OUTPUT -p tcp --dport 11371 -m state --state NEW,ESTABLISHED -j ACCEPT
## Allow samba
#iptables -A OUTPUT -p tcp --dport 134:139 -m state --state NEW,ESTABLISHED -j ACCEPT
#iptables -A OUTPUT -p udp --dport 134:139 -m state --state NEW,ESTABLISHED -j ACCEPT
#iptables -A OUTPUT -p tcp --dport 445 -m state --state NEW,ESTABLISHED -j ACCEPT
#iptables -A OUTPUT -p udp --dport 445 -m state --state NEW,ESTABLISHED -j ACCEPT
## Whois
iptables -A INPUT -p tcp --sport 43 -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A OUTPUT -p tcp --dport 43 -m state --state NEW,ESTABLISHED -j ACCEPT
## TRACEROUTE
# Outgoing traceroute anywhere.
# The reply to a traceroute is an icmp time-exceeded which is dealt with by the next rule.
iptables -A OUTPUT -p udp --sport 32769: --dport 33434:33523 -m state --state NEW -j ACCEPT
# ICMP
# We accept icmp in if it is "related" to other connections (e.g a time exceeded (11)
# from a traceroute) or it is part of an "established" connection (e.g. an echo reply (0)
# from an echo-request (8)).
#iptables -A INPUT -p icmp --icmp-type echo-request -m limit --limit 3/s -j ACCEPT
#iptables -A INPUT -p icmp --icmp-type echo-request -j LOG --log-prefix "PoD attack :"
iptables -A INPUT -p icmp -m state --state ESTABLISHED,RELATED -j ACCEPT
## LOGGING
# You don't have to split up your logging like I do below, but I prefer to do it this way
# because I can then grep for things in the logs more easily. One thing you probably want
# to do is rate-limit the logging. I didn't do that here because it is probably best not too
# when you first set things up ................. you actually really want to see everything going to
# the logs to work out what isn't working and why. You cam implement logging with
# "-m limit --limit 6/h --limit-burst 5" (or similar) before the -j LOG in each case.
#
# Any udp not already allowed is logged and then dropped.
iptables -A INPUT -p udp -j LOG --log-prefix "IPTABLES UDP-IN: "
iptables -A INPUT -p udp -j DROP
iptables -A OUTPUT -p udp -j LOG --log-prefix "IPTABLES UDP-OUT: "
iptables -A OUTPUT -p udp -j DROP
# Any icmp not already allowed is logged and then dropped.
iptables -A INPUT -p icmp -j LOG --log-prefix "IPTABLES ICMP-IN: "
iptables -A INPUT -p icmp -j DROP
iptables -A OUTPUT -p icmp -j LOG --log-prefix "IPTABLES ICMP-OUT: "
iptables -A OUTPUT -p icmp -j DROP
# Any tcp not already allowed is logged and then dropped.
iptables -A INPUT -p tcp -j LOG --log-prefix "IPTABLES TCP-IN: "
iptables -A INPUT -p tcp -j DROP
iptables -A OUTPUT -p tcp -j LOG --log-prefix "IPTABLES TCP-OUT: "
iptables -A OUTPUT -p tcp -j DROP
#FORWARD logging
iptables -A FORWARD -j LOG --log-prefix "FORWARD logs: "
echo "done."
echo
;;
stop)
echo -n "Stopping IP Firewall..."
iptables -F
iptables -X
iptables -Z
# IP tables base policy
iptables -P INPUT ACCEPT
iptables -P FORWARD ACCEPT
iptables -P OUTPUT ACCEPT
echo "done."
echo
;;
restart)
echo -n "Restarting IP Firewall..."
$0 stop > /dev/null
sleep 1
$0 start > /dev/null
;;
*)
echo "Usage: $0 {start|stop|restart}"
exit 1
;;
esac
exit 0
dmesg:
54259.215232] FORWARD logs: IN=ath0 OUT=eth0 SRC=192.168.2.10 DST=63.245.209.120 LEN=121 TOS=0x00 PREC=0x00 TTL=127 ID=55264 PROTO=TCP SPT=2663 DPT=443 WINDOW=65535 RES=0x00 ACK PSH URGP=0
[54259.215460] FORWARD logs: IN=ath0 OUT=eth0 SRC=192.168.2.10 DST=63.245.209.116 LEN=121 TOS=0x00 PREC=0x00 TTL=127 ID=55265 PROTO=TCP SPT=2665 DPT=443 WINDOW=62500 RES=0x00 ACK PSH URGP=0
[54264.074436] FORWARD logs: IN=ath0 OUT=eth0 SRC=192.168.2.10 DST=98.124.167.250 LEN=40 TOS=0x00 PREC=0x00 TTL=127 ID=55399 DF PROTO=TCP SPT=2668 DPT=80 WINDOW=62500 RES=0x00 ACK URGP=0
[54264.180084] FORWARD logs: IN=ath0 OUT=eth0 SRC=192.168.2.10 DST=98.124.167.250 LEN=469 TOS=0x00 PREC=0x00 TTL=127 ID=55402 DF PROTO=TCP SPT=2668 DPT=80 WINDOW=62500 RES=0x00 ACK PSH URGP=0
[54264.443602] FORWARD logs: IN=ath0 OUT=eth0 SRC=192.168.2.10 DST=63.245.209.49 LEN=205 TOS=0x00 PREC=0x00 TTL=127 ID=55403 DF PROTO=TCP SPT=2651 DPT=443 WINDOW=65535 RES=0x00 ACK PSH FIN URGP=0
[54264.443738] FORWARD logs: IN=ath0 OUT=eth0 SRC=192.168.2.10 DST=63.245.209.120 LEN=207 TOS=0x00 PREC=0x00 TTL=127 ID=55404 DF PROTO=TCP SPT=2652 DPT=443 WINDOW=65535 RES=0x00 ACK PSH FIN URGP=0
[54264.443851] FORWARD logs: IN=ath0 OUT=eth0 SRC=192.168.2.10 DST=66.249.93.101 LEN=121 TOS=0x00 PREC=0x00 TTL=127 ID=55405 DF PROTO=TCP SPT=2659 DPT=443 WINDOW=62500 RES=0x00 ACK PSH URGP=0
[54264.544220] FORWARD logs: IN=ath0 OUT=eth0 SRC=192.168.2.10 DST=63.245.209.116 LEN=220 TOS=0x00 PREC=0x00 TTL=127 ID=55406 DF PROTO=TCP SPT=2653 DPT=443 WINDOW=62500 RES=0x00 ACK PSH FIN URGP=0
[54264.544280] FORWARD logs: IN=ath0 OUT=eth0 SRC=192.168.2.10 DST=63.245.209.116 LEN=220 TOS=0x00 PREC=0x00 TTL=127 ID=55407 DF PROTO=TCP SPT=2654 DPT=443 WINDOW=62500 RES=0x00 ACK PSH FIN URGP=0
[54264.544343] FORWARD logs: IN=ath0 OUT=eth0 SRC=192.168.2.10 DST=63.245.209.116 LEN=220 TOS=0x00 PREC=0x00 TTL=127 ID=55408 DF PROTO=TCP SPT=2658 DPT=443 WINDOW=62500 RES=0x00 ACK PSH FIN URGP=0
[54264.544480] FORWARD logs: IN=ath0 OUT=eth0 SRC=192.168.2.10 DST=63.245.209.116 LEN=220 TOS=0x00 PREC=0x00 TTL=127 ID=55409 DF PROTO=TCP SPT=2655 DPT=443 WINDOW=62500 RES=0x00 ACK PSH FIN URGP=0
[54264.544621] FORWARD logs: IN=ath0 OUT=eth0 SRC=192.168.2.10 DST=63.245.209.116 LEN=220 TOS=0x00 PREC=0x00 TTL=127 ID=55410 DF PROTO=TCP SPT=2656 DPT=443 WINDOW=62500 RES=0x00 ACK PSH FIN URGP=0
[54264.544767] FORWARD logs: IN=ath0 OUT=eth0 SRC=192.168.2.10 DST=63.245.209.116 LEN=220 TOS=0x00 PREC=0x00 TTL=127 ID=55411 DF PROTO=TCP SPT=2657 DPT=443 WINDOW=62500 RES=0x00 ACK PSH FIN URGP=0
Ebből gondolom valamit nagyon elszúrtam. Mi a rossz a configban?
Köszönöm előre is.