[root@abcl sysconfig]# cat iptables
# Generated by iptables-save v1.2.11 on Sat Oct 31 10:08:59 2009
*filter
:INPUT ACCEPT [13051773:10402967582]
:FORWARD ACCEPT [59410980:44767755814]
:OUTPUT ACCEPT [12910266:10563084186]
:RH-Firewall-1-INPUT - [0:0]
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -j RH-Firewall-1-INPUT
-A FORWARD -j RH-Firewall-1-INPUT
-A RH-Firewall-1-INPUT -i lo -j ACCEPT
-A RH-Firewall-1-INPUT -i eth1 -j ACCEPT
-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT
-A RH-Firewall-1-INPUT -p 50 -j ACCEPT
-A RH-Firewall-1-INPUT -p 51 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp --dport 5353 -d 224.0.0.251 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 23 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 21 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 20 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 25 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 53 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 110 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 443 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 445 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 993 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 1433 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 1025 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 1521 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 2022 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 3306 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 3389 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 8899 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 3000 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 3344 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 3128 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 8000 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 8080 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 9160 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 50000:60000 -j ACCEPT
-A RH-Firewall-1-INPUT  -p udp --dport 53 -j ACCEPT
-A RH-Firewall-1-INPUT  -p udp --dport 80 -j ACCEPT
-A RH-Firewall-1-INPUT  -p udp --dport 111 -j ACCEPT
-A RH-Firewall-1-INPUT  -p udp --dport 161 -j ACCEPT
-A RH-Firewall-1-INPUT  -p udp --dport 162 -j ACCEPT
-A RH-Firewall-1-INPUT  -p udp --dport 1194 -j ACCEPT
-A RH-Firewall-1-INPUT  -p udp --dport 4000 -j ACCEPT
-A RH-Firewall-1-INPUT  -p udp --dport 8000 -j ACCEPT
-A RH-Firewall-1-INPUT  -s 192.168.5.0 -j ACCEPT
-A RH-Firewall-1-INPUT  -d 192.168.1.50 -j ACCEPT
-A RH-Firewall-1-INPUT  -s 192.168.1.166 -j ACCEPT
-A RH-Firewall-1-INPUT  -s 192.168.1.11 -j ACCEPT
-A RH-Firewall-1-INPUT  -s 192.168.1.135 -j ACCEPT
-A RH-Firewall-1-INPUT  -s 192.168.1.35 -j ACCEPT
-A RH-Firewall-1-INPUT  -s 192.168.1.95 -j ACCEPT
-A RH-Firewall-1-INPUT  -s 0.0.0.0/0 -j LOG --log-prefix "llog"
-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
COMMIT
# Completed on Sat Oct 31 10:08:59 2009
# Generated by iptables-save v1.2.11 on Sat Oct 31 10:08:59 2009
*nat
:PREROUTING ACCEPT [970703:113779277]
:POSTROUTING ACCEPT [585159:42566513]
:OUTPUT ACCEPT [534180:39211474]
-A PREROUTING -s 172.20.1.0/255.255.255.0 -i eth1 -p tcp -m tcp --dport 80 -j REDIRECT --to-ports 3128
-A PREROUTING -s 192.168.1.0/255.255.255.0 -p tcp -m tcp --dport 80 -j REDIRECT --to-ports 3128
-A PREROUTING -s 192.168.1.0/255.255.255.0 -d 192.168.1.100 -p tcp -m tcp --dport 2022 -j DNAT --to-destination 172.20.1.225:22
-A POSTROUTING -s 172.20.1.0/255.255.255.0 -o eth0 -j SNAT --to-source 192.168.1.50
COMMIT
# Completed on Sat Oct 31 10:08:59 2009