[root@llpwfirewall ~]# cat /etc/sysconfig/iptables
# Generated by iptables-save v1.2.11 on Sun Nov 22 16:17:23 2009
*nat
:PREROUTING ACCEPT [10936:947290]
:POSTROUTING ACCEPT [2049:153967]
:OUTPUT ACCEPT [1577:124636]
-A PREROUTING -s 172.20.1.0/255.255.255.0 -i eth0 -p tcp -m tcp --dport 80 -j REDIRECT --to-ports 3128
-A PREROUTING -s 192.168.1.0/255.255.255.0 -p tcp -m tcp --dport 80 -j REDIRECT --to-ports 3128
-A PREROUTING -s 192.168.1.0/255.255.255.0 -d 192.168.1.100 -p tcp -m tcp --dport 2022 -j DNAT --to-destination 172.20.1.225:22
-A PREROUTING -d 62.50.143.110 -p tcp -m tcp --dport 80 -j DNAT --to-destination 192.168.1.35:80
-A PREROUTING -d 66.50.143.110 -p tcp -m tcp --dport 7890 -j DNAT --to-destination 192.168.1.35:7890
-A PREROUTING -d 66.50.143.110 -p udp -m udp --dport 80 -j DNAT --to-destination 192.168.1.35:80
-A PREROUTING -d 66.50.143.110 -p udp -m udp --dport 7890 -j DNAT --to-destination 192.168.1.35:7890
-A PREROUTING -d 66.50.143.110 -p tcp -m tcp --dport 51521 -j DNAT --to-destination 192.168.1.136
-A PREROUTING -p tcp -m tcp --dport 53389 -j DNAT --to-destination 172.20.1.58:3389
-A PREROUTING -p tcp -m tcp --dport 51158 -j DNAT --to-destination 192.168.1.215:1158
-A PREROUTING -s 123.118.13.78 -d 66.50.143.110 -p tcp -m tcp --dport 1158 -j DNAT --to-destination 192.168.1.215:1158
-A POSTROUTING -s 172.20.1.0/255.255.255.0 -o eth1 -j SNAT --to-source 66.50.143.110
-A POSTROUTING -s 172.20.1.0/255.255.255.0 -o eth1 -j SNAT --to-source 192.168.1.50
-A POSTROUTING -s 192.168.1.95 -o eth1 -j SNAT --to-source 66.50.143.110
-A POSTROUTING -s 192.168.1.35 -o eth1 -j SNAT --to-source 666.50.143.110
-A POSTROUTING -s 192.168.1.0/255.255.255.0 -d 61.135.175.37 -j SNAT --to-source 666.50.143.110
-A POSTROUTING -s 192.168.1.0 -d 61.135.175.32/255.255.255.248 -o eth1 -j SNAT --to-source 666.50.143.110
-A POSTROUTING -s 192.168.1.136 -d 61.135.175.32/255.255.255.248 -o eth1 -j SNAT --to-source 666.50.143.110
-A POSTROUTING -s 192.168.1.136 -d 221.176.6.97 -o eth1 -j SNAT --to-source 666.50.143.110
-A POSTROUTING -s 192.168.1.0/255.255.255.0 -o eth1 -p udp -m udp --dport 161:162 -j SNAT --to-source 666.50.143.110
-A POSTROUTING -s 192.168.1.0/255.255.255.0 -o eth1 -p udp -m udp --dport 1194 -j SNAT --to-source 666.50.143.110
-A POSTROUTING -s 192.168.1.136 -d 221.176.6.96 -o eth1 -j SNAT --to-source 666.50.143.110
-A POSTROUTING -s 192.168.1.136 -o eth1 -p tcp -m tcp --dport 25 -j SNAT --to-source 666.50.143.110
-A POSTROUTING -s 192.168.1.215 -d 221.176.6.96 -o eth1 -j SNAT --to-source 666.50.143.110
-A POSTROUTING -s 192.168.1.216 -d 221.176.6.96 -o eth1 -j SNAT --to-source 666.50.143.110
COMMIT
# Completed on Sun Nov 22 16:17:23 2009
# Generated by iptables-save v1.2.11 on Sun Nov 22 16:17:23 2009
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [136518:119049641]
:RH-Firewall-1-INPUT - [0:0]
-A INPUT -j RH-Firewall-1-INPUT
-A FORWARD -s 172.20.1.0/255.255.255.0 -o eth1 -p udp -m multiport --dports 161,162,1194,8000 -j ACCEPT
-A FORWARD -s 172.20.1.0/255.255.255.0 -o eth1 -p udp -m limit --limit 60/sec --limit-burst 80 -j ACCEPT
-A FORWARD -s 172.20.1.0/255.255.255.0 -o eth1 -p udp -j DROP
-A FORWARD -i eth1 -p icmp -m icmp --icmp-type 8 -j DROP
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -j RH-Firewall-1-INPUT
-A RH-Firewall-1-INPUT -p tcp -m tcp --dport 9922 -j ACCEPT
-A RH-Firewall-1-INPUT -i eth1 -p icmp -m icmp --icmp-type 8 -j DROP
-A RH-Firewall-1-INPUT -m mac --mac-source 00:23:54:D0:E4:2A -j DROP
-A RH-Firewall-1-INPUT -d 192.168.1.100 -p udp -m udp --dport 67 -j DROP
-A RH-Firewall-1-INPUT -p udp -m udp --dport 1004 -j DROP
-A RH-Firewall-1-INPUT -p udp -m udp --dport 8093 -j DROP
-A RH-Firewall-1-INPUT -i lo -j ACCEPT
-A RH-Firewall-1-INPUT -i eth0 -j ACCEPT
-A RH-Firewall-1-INPUT -p icmp -m icmp --icmp-type any -j ACCEPT
-A RH-Firewall-1-INPUT -p ipv6-crypt -j ACCEPT
-A RH-Firewall-1-INPUT -p ipv6-auth -j ACCEPT
-A RH-Firewall-1-INPUT -d 224.0.0.251 -p udp -m udp --dport 5353 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 23 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 80 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 21 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 20 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 25 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 53 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 110 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 443 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 445 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 993 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 1433 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 1025 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 1194 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 1918 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 1521 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 2022 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 3306 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 3389 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 8899 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 7890 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 3000 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 3344 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 3128 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 8000 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 8080 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 9160 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 50000:60000 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 53 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 67 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 80 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 111 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 123 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 137 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 139 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 161 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 162 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 1194 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 4000 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 7890 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 8000 -j ACCEPT
-A RH-Firewall-1-INPUT -s 192.168.5.0 -j ACCEPT
-A RH-Firewall-1-INPUT -d 192.168.1.0/255.255.255.0 -j ACCEPT
-A RH-Firewall-1-INPUT -d 192.168.1.50 -j ACCEPT
-A RH-Firewall-1-INPUT -d 192.168.1.35 -j ACCEPT
-A RH-Firewall-1-INPUT -j LOG --log-prefix "llog "
-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
COMMIT
# Completed on Sun Nov 22 16:17:23 2009