Anzeige:
Ergebnis 1 bis 10 von 10

Thema: Freeswan / SuSEfirewall2 / IPSEC !!Dringend!!

  1. #1
    Registrierter Benutzer
    Registriert seit
    Oct 2002
    Beiträge
    21

    Freeswan / SuSEfirewall2 / IPSEC !!Dringend!!

    Hi,

    brauch mal dringend Hilfe, da ich mit der SuSEfirewall überhaupt nicht zurechtkomme, und hoffe auf eure Hilfe.

    Unsere VPN verbindung (Netz -> Gateway/Firewall -> Internet -> Gateway/Firewall -> Netz)steht, es funktioniert alles prima bis auf meine Firewall.

    Irgendwie ist da der Wurm drin und ich komm nichtklar. Es geht nichts durch die Firewall durch, er droped praktisch alles (ist im Log ersichtlich).

    Folgendes sollte gehen:

    Client Netz1 > Zugriff > auf Client Netz2
    Client Netz1 > Zugriff > Gateway Netz2
    Client Netz2 > Zugriff > Client Netz1
    Client Netz2 > Zugriff > Gateway Netz1
    Gateway zu Gateway

    Netz 1 hat die iprange 192.168.10.x/24
    Netz 2 hat die iprange 10.1.1.x/24



    Ich poste hier mal mein derzeitiges FW Script rein und hoffe das das mir mal einer in Ordnung bringt.

    # 1.)
    # Should the Firewall be started?
    #
    # This setting is done via the links in the /etc/init.d/rc?.d runlevel
    # directories, which can be tweaked with a runlevel editor (or manually)

    #
    # 2.)
    # Which is the interface that points to the internet/untrusted networks?
    #
    # Enter all the network devices here which are untrusted.
    #
    # Choice: any number of devices, seperated by a space
    # e.g. "eth0", "ippp0 ippp1 eth0:1"
    #
    FW_DEV_EXT="ppp0 ipsec0"

    #
    # 3.)
    # Which is the interface that points to the internal network?
    #
    # Enter all the network devices here which are trusted.
    # If you are not connected to a trusted network (e.g. you have just a
    # dialup) leave this empty.
    #
    # Choice: leave empty or any number of devices, seperated by a space
    # e.g. "tr0", "eth0 eth1 eth1:1" or ""
    #
    FW_DEV_INT="eth1"

    #
    # 4.)
    # Which is the interface that points to the dmz or dialup network?
    #
    # Enter all the network devices here which point to the dmz/dialups.
    # A "dmz" is a special, seperated network, which is only connected to the
    # firewall, and should be reachable from the internet to provide services,
    # e.g. WWW, Mail, etc. and hence are at risk from attacks.
    # See /usr/share/doc/packages/SuSEfirewall2/EXAMPLES for an example.
    #
    # Special note: You have to configure FW_FORWARD to define the services
    # which should be available to the internet and set FW_ROUTE to yes.
    #
    # Choice: leave empty or any number of devices, seperated by a space
    # e.g. "tr0", "eth0 eth1 eth1:1" or ""
    #
    FW_DEV_DMZ=""

    #
    # 5.)
    # Should routing between the internet, dmz and internal network be activated?
    # REQUIRES: FW_DEV_INT or FW_DEV_DMZ
    #
    # You need only set this to yes, if you either want to masquerade internal
    # machines or allow access to the dmz (or internal machines, but this is not
    # a good idea). This option supersedes IP_FORWARD from
    # /etc/sysconfig/network/options
    #
    # Setting this option one alone doesn't do anything. Either activate
    # massquerading with FW_MASQUERADE below if you want to masquerade your
    # internal network to the internet, or configure FW_FORWARD to define
    # what is allowed to be forwarded!
    #
    # Choice: "yes" or "no", defaults to "no"
    #
    FW_ROUTE="yes"

    #
    # 6.)
    # Do you want to masquerade internal networks to the outside?
    # REQUIRES: FW_DEV_INT or FW_DEV_DMZ, FW_ROUTE
    #
    # "Masquerading" means that all your internal machines which use services on
    # the internet seem to come from your firewall.
    # Please note that it is more secure to communicate via proxies to the
    # internet than masquerading. This option is required for FW_MASQ_NETS and
    # FW_FORWARD_MASQ.
    #
    # Choice: "yes" or "no", defaults to "no"
    #
    FW_MASQUERADE="yes"
    #
    # You must also define on which interface(s) to masquerade on. This is
    # normally your external device(s) to the internet.
    # Most users can leave the default below.
    #
    # e.g. "ippp0" or "$FW_DEV_EXT"
    FW_MASQ_DEV="ppp0"
    #
    # Which internal computers/networks are allowed to access the internet
    # directly (not via proxys on the firewall)?
    # Only these networks will be allowed access and will be masqueraded!
    #
    # Choice: leave empty or any number of hosts/networks seperated by a space.
    # Every host/network may get a list of allowed services, otherwise everything
    # is allowed. A target network, protocol and service is appended by a comma to
    # the host/network. e.g. "10.0.0.0/8" allows the whole 10.0.0.0 network with
    # unrestricted access. "10.0.1.0/24,0/0,tcp,80 10.0.1.0/24,0/0tcp,21" allows
    # the 10.0.1.0 network to use www/ftp to the internet.
    # "10.0.1.0/24,tcp,1024:65535 10.0.2.0/24" is OK too.
    # Set this variable to "0/0" to allow unrestricted access to the internet.
    #
    FW_MASQ_NETS="192.168.10.0/24 10.1.1.0/24"

    #
    # 7.)
    # Do you want to protect the firewall from the internal network?
    # REQUIRES: FW_DEV_INT
    #
    # If you set this to "yes", internal machines may only access services on
    # the machine you explicitly allow. They will be also affected from the
    # FW_AUTOPROTECT_SERVICES option.
    # If you set this to "no", any user can connect (and attack) any service on
    # the firewall.
    #
    # Choice: "yes" or "no", defaults to "yes"
    #
    # "yes" is a good choice
    FW_PROTECT_FROM_INTERNAL="no"

    #
    # 8.)
    # Do you want to autoprotect all running network services on the firewall?
    #
    # If set to "yes", all network access to services TCP and UDP on this machine
    # will be prevented (except to those which you explicitly allow, see below:
    # FW_SERVICES_{EXT,DMZ,INT}_{TCP,UDP})
    #
    # Choice: "yes" or "no", defaults to "yes"
    #
    FW_AUTOPROTECT_SERVICES="yes"

    #
    # 9.)
    # Which services ON THE FIREWALL should be accessible from either the internet
    # (or other untrusted networks), the dmz or internal (trusted networks)?
    # (see no.13 & 14 if you want to route traffic through the firewall) XXX
    #
    # Enter all ports or known portnames below, seperated by a space.
    # TCP services (e.g. SMTP, WWW) must be set in FW_SERVICES_*_TCP, and
    # UDP services (e.g. syslog) must be set in FW_SERVICES_*_UDP.
    # e.g. if a webserver on the firewall should be accessible from the internet:
    # FW_SERVICES_EXT_TCP="www"
    # e.g. if the firewall should receive syslog messages from the dmz:
    # FW_SERVICES_DMZ_UDP="syslog"
    # For IP protocols (like GRE for PPTP, or OSPF for routing) you need to set
    # FW_SERVICES_*_IP with the protocol name or number (see /etc/protocols)
    #
    # Choice: leave empty or any number of ports, known portnames (from
    # /etc/services) and port ranges seperated by a space. Port ranges are
    # written like this: allow port 1 to 10 -> "1:10"
    # e.g. "", "smtp", "123 514", "3200:3299", "ftp 22 telnet 512:514"
    # For FW_SERVICES_*_IP enter the protocol name (like "igmp") or number ("2")
    #
    # Common: smtp domain
    FW_SERVICES_EXT_TCP="21 80 4278 5365"
    # Common: domain
    FW_SERVICES_EXT_UDP="21 80 500 4278 4282 5365"
    # Common: domain
    # For VPN/Routing which END at the firewall!!
    FW_SERVICES_EXT_IP="50 51"
    #
    # Common: smtp domain
    FW_SERVICES_DMZ_TCP=""
    # Common: domain
    FW_SERVICES_DMZ_UDP=""
    # For VPN/Routing which END at the firewall!!
    FW_SERVICES_DMZ_IP=""
    #
    # Common: ssh smtp domain
    FW_SERVICES_INT_TCP=""
    # Common: domain syslog
    FW_SERVICES_INT_UDP=""
    # For VPN/Routing which END at the firewall!!
    FW_SERVICES_INT_IP=""

    #
    # 10.)
    # Which services should be accessible from trusted hosts/nets?
    #
    # Define trusted hosts/networks (doesnt matter if they are internal or
    # external) and the TCP and/or UDP services they are allowed to use.
    # Please note that a trusted host/net is *not* allowed to ping the firewall
    # until you set it to allow also icmp!
    #
    # Choice: leave FW_TRUSTED_NETS empty or any number of computers and/or
    # networks, seperated by a space. e.g. "172.20.1.1 172.20.0.0/16"
    # Optional, enter a protocol after a comma, e.g. "1.1.1.1,icmp"
    # Optional, enter a port after a protocol, e.g. "2.2.2.2,tcp,22"
    #
    FW_TRUSTED_NETS="192.168.10.0/24 10.1.1.0/24"

    #
    # 11.)
    # How is access allowed to high (unpriviliged [above 1023]) ports?
    #
    # You may either allow everyone from anyport access to your highports ("yes"),
    # disallow anyone ("no"), anyone who comes from a defined port (portnumber or
    # known portname) [note that this is easy to circumvent!], or just your
    # defined nameservers ("DNS").
    # Note that you can't use rpc requests (e.g. rpcinfo, showmount) as root
    # from a firewall using this script (well, you can if you include range
    # 600:1023 in FW_SERVICES_EXT_UDP ...).
    # Please note that with v2.1 "yes" is not mandatory for active FTP from
    # the firewall anymore.
    #
    # Choice: "yes", "no", "DNS", portnumber or known portname, defaults to "no"
    # if not set
    #
    # Common: "ftp-data", better is "yes" to be sure that everything else works :-(
    FW_ALLOW_INCOMING_HIGHPORTS_TCP="yes"
    # Common: "DNS" or "domain ntp", better is "yes" to be sure ...
    FW_ALLOW_INCOMING_HIGHPORTS_UDP="yes"

    #
    # 12.)
    # Are you running some of the services below?
    # They need special attention - otherwise they won´t work!
    #
    # Set services you are running to "yes", all others to "no", defaults to "no"
    # if not set.
    #
    FW_SERVICE_AUTODETECT="yes"
    # Autodetect the services below when starting
    #
    # If you are running bind/named set to yes. Remember that you have to open
    # port 53 (or "domain") as udp/tcp to allow incoming queries.
    # Also FW_ALLOW_INCOMING_HIGHPORTS_UDP needs to be "yes"
    FW_SERVICE_DNS="no"
    #
    # if you use dhclient to get an ip address you have to set this to "yes" !
    FW_SERVICE_DHCLIENT="no"
    #
    # set to "yes" if this server is a DHCP server
    FW_SERVICE_DHCPD="no"
    #
    # set to "yes" if this server is running squid. You still have to open the
    # tcp port 3128 to allow remote access to the squid proxy service.
    FW_SERVICE_SQUID="no"
    #
    # set to "yes" if this server is running a samba server. You still have to open
    # the tcp port 139 to allow remote access to SAMBA.
    FW_SERVICE_SAMBA="no"

    #
    # 13.)
    # Which services accessed from the internet should be allowed to the
    # dmz (or internal network - if it is not masqueraded)?
    # REQUIRES: FW_ROUTE
    #
    # With this option you may allow access to e.g. your mailserver. The
    # machines must have valid, non-private, IP addresses which were assigned to
    # you by your ISP. This opens a direct link to your network, so only use
    # this option for access to your dmz!!!!
    #
    # Choice: leave empty (good choice!) or use the following explained syntax
    # of forwarding rules, seperated each by a space.
    # A forwarding rule consists of 1) source IP/net and 2) destination IP
    # seperated by a comma. e.g. "1.1.1.1,2.2.2.2 3.3.3.3/16,4.4.4.4/24"
    # Optional is a protocol, seperated by a comma, e.g. "5.5.5.5,6.6.6.6,igmp"
    # Optional is a port after the protocol with a comma, e.g. "0/0,0/0,udp,514"
    #
    FW_FORWARD=""
    # Beware to use this!

    #
    # 14.)
    # Which services accessed from the internet should be allowed to masqueraded
    # servers (on the internal network or dmz)?
    # REQUIRES: FW_ROUTE
    #
    # With this option you may allow access to e.g. your mailserver. The
    # machines must be in a masqueraded segment and may not have public IP addesses!
    # Hint: if FW_DEV_MASQ is set to the external interface you have to set
    # FW_FORWARD from internal to DMZ for the service as well to allow access
    # from internal!
    #
    # Please note that this should *not* be used for security reasons! You are
    # opening a hole to your precious internal network. If e.g. the webserver there
    # is compromised - your full internal network is compromised!!
    #
    # Choice: leave empty (good choice!) or use the following explained syntax
    # of forward masquerade rules, seperated each by a space.
    # A forward masquerade rule consists of 1) source IP/net, 2) destination IP
    # (dmz/intern), 3) a protocol (tcp/udp only!) and 4) destination port,
    # seperated by a comma (","), e.g. "4.0.0.0/8,1.1.1.1,tcp,80"
    # Optional is a port after the destination port, to redirect the request to
    # a different destination port on the destination IP, e.g.
    # "4.0.0.0/8,1.1.1.1,tcp,80,81"
    #
    FW_FORWARD_MASQ="0/0,192.168.10.2,udp,60001 0/0,192.168.10.2,udp,60002 0/0,192.168.10.2,tcp,7777 0/0,192.168.10.2,udp,7777 0/0,192.168.10.2,udp,13242 0/0,192.168.10.2,udp,21000"
    # Beware to use this!

    #
    # 15.)
    # Which accesses to services should be redirected to a localport on the
    # firewall machine?
    #
    # This can be used to force all internal users to surf via your squid proxy,
    # or transparently redirect incoming webtraffic to a secure webserver.
    #
    # Choice: leave empty or use the following explained syntax of redirecting
    # rules, seperated by a space.
    # A redirecting rule consists of 1) source IP/net, 2) destination IP/net,
    # 3) protocol (tcp or udp) 3) original destination port and 4) local port to
    # redirect the traffic to, seperated by a colon. e.g.:
    # "10.0.0.0/8,0/0,tcp,80,3128 0/0,172.20.1.1,tcp,80,8080"
    #
    FW_REDIRECT=""

    #
    # 16.)
    # Which logging level should be enforced?
    # You can define to log packets which were accepted or denied.
    # You can also the set log level, the critical stuff or everything.
    # Note that logging *_ALL is only for debugging purpose ...
    #
    # Choice: "yes" or "no", FW_LOG_*_CRIT defaults to "yes",
    # FW_LOG_*_ALL defaults to "no"
    #
    FW_LOG_DROP_CRIT="yes"
    #
    FW_LOG_DROP_ALL="yes"
    #
    FW_LOG_ACCEPT_CRIT="no"
    #
    FW_LOG_ACCEPT_ALL="no"
    #
    # only change/activate this if you know what you are doing!
    FW_LOG="--log-level warning --log-tcp-options --log-ip-option --log-prefix SuSE-FW"

    #
    # 17.)
    # Do you want to enable additional kernel TCP/IP security features?
    # If set to yes, some obscure kernel options are set.
    # (icmp_ignore_bogus_error_responses, icmp_echoreply_rate,
    # icmp_destunreach_rate, icmp_paramprob_rate, icmp_timeexeed_rate,
    # ip_local_port_range, log_martians, mc_forwarding, mc_forwarding,
    # rp_filter, routing flush)
    # Tip: Set this to "no" until you have verified that you have got a
    # configuration which works for you. Then set this to "yes" and keep it
    # if everything still works. (It should!) ;-)
    #
    # Choice: "yes" or "no", defaults to "yes"
    #
    FW_KERNEL_SECURITY="yes"

    #
    # 18.)
    # Keep the routing set on, if the firewall rules are unloaded?
    # REQUIRES: FW_ROUTE
    #
    # If you are using diald, or automatic dialing via ISDN, if packets need
    # to be sent to the internet, you need to turn this on. The script will then
    # not turn off routing and masquerading when stopped.
    # You *might* also need this if you have got a DMZ.
    # Please note that this is *insecure*! If you unload the rules, but are still
    # connected, you might your internal network open to attacks!
    # The better solution is to remove "/sbin/SuSEfirewall2 stop" or
    # "/sbin/init.d/firewall stop" from the ip-down script!
    #
    #
    # Choices "yes" or "no", defaults to "no"
    #
    FW_STOP_KEEP_ROUTING_STATE="no"

    #
    # 19.)
    # Allow (or don't) ICMP echo pings on either the firewall or the dmz from
    # the internet? The internet option is for allowing the DMZ and the internal
    # network to ping the internet.
    # REQUIRES: FW_ROUTE for FW_ALLOW_PING_DMZ and FW_ALLOW_PING_EXT
    #
    # Choice: "yes" or "no", defaults to "no" if not set
    #
    FW_ALLOW_PING_FW="yes"
    #
    FW_ALLOW_PING_DMZ="yes"
    #
    FW_ALLOW_PING_EXT="yes"

    ##
    # END of rc.firewall
    ##

    # #
    #-------------------------------------------------------------------------#
    # #
    # EXPERT OPTIONS - all others please don't change these! #
    # #
    #-------------------------------------------------------------------------#
    # #

    #
    # 20.)
    # Allow (or don't) ICMP time-to-live-exceeded to be send from your firewall.
    # This is used for traceroutes to your firewall (or traceroute like tools).
    #
    # Please note that the unix traceroute only works if you say "yes" to
    # FW_ALLOW_INCOMING_HIGHPORTS_UDP, and windows traceroutes only if you say
    # additionally "yes" to FW_ALLOW_PING_FW
    #
    # Choice: "yes" or "no", defaults to "no" if not set.
    #
    FW_ALLOW_FW_TRACEROUTE="yes"

    #
    # 21.)
    # Allow ICMP sourcequench from your ISP?
    #
    # If set to yes, the firewall will notice when connection is choking, however
    # this opens yourself to a denial of service attack. Choose your poison.
    #
    # Choice: "yes" or "no", defaults to "yes"
    #
    FW_ALLOW_FW_SOURCEQUENCH="yes"

    #
    # 22.)
    # Allow/Ignore IP Broadcasts?
    #
    # If set to yes, the firewall will not filter broadcasts by default.
    # This is needed e.g. for Netbios/Samba, RIP, OSPF where the broadcast
    # option is used.
    # If you do not want to allow them however ignore the annoying log entries,
    # set FW_IGNORE_FW_BROADCAST to yes.
    #
    # Choice: "yes" or "no", defaults to "no" if not set.
    #
    FW_ALLOW_FW_BROADCAST="no"
    #
    FW_IGNORE_FW_BROADCAST="no"

    #
    # 23.)
    # Allow same class routing per default?
    # REQUIRES: FW_ROUTE
    #
    # Do you want to allow routing between interfaces of the same class
    # (e.g. between all internet interfaces, or all internal network interfaces)
    # be default (so without the need setting up FW_FORWARD definitions)?
    #
    # Choice: "yes" or "no", defaults to "no"
    #
    FW_ALLOW_CLASS_ROUTING="yes"
    # Copyright (c) 2000-2002 SuSE GmbH Nuernberg, Germany. All rights reserved.
    #
    # Author: Marc Heuse <marc@suse.de>, 2002
    # Please contact me directly if you find bugs.
    #
    # If you have problems getting this tool configures, please read this file
    # carefuly and take also a look into
    # -> /usr/share/doc/packages/SuSEfirewall2/EXAMPLES !
    # -> /usr/share/doc/packages/SuSEfirewall2/FAQ !
    # -> /usr/share/doc/packages/SuSEfirewall2/SuSEfirewall2.conf.EXAMPLE !
    #
    # /etc/sysconfig/SuSEfirewall2
    #
    # for use with /sbin/SuSEfirewall2 version 3.1 which is for 2.4 kernels!
    #
    # ------------------------------------------------------------------------ #
    # PLEASE NOTE THE FOLLOWING:
    #
    # Just by configuring these settings and using the SuSEfirewall2 you are
    # not secure per se! There is *not* such a thing you install and hence you
    # are safed from all (security) hazards.
    #
    # To ensure your security, you need also:
    #
    # * Secure all services you are offering to untrusted networks (internet)
    # You can do this by using software which has been designed with
    # security in mind (like postfix, apop3d, ssh), setting these up without
    # misconfiguration and praying, that they have got really no holes.
    # SuSEcompartment can help in most circumstances to reduce the risk.
    # * Do not run untrusted software. (philosophical question, can you trust
    # SuSE or any other software distributor?)
    # * Harden your server(s) with the harden_suse package/script
    # * Recompile your kernel with the openwall-linux kernel patch
    # (former secure-linux patch, from Solar Designer) www.openwall.com
    # * Check the security of your server(s) regulary
    # * If you are using this server as a firewall/bastion host to the internet
    # for an internal network, try to run proxy services for everything and
    # disable routing on this machine.
    # * If you run DNS on the firewall: disable untrusted zone transfers and
    # either don't allow access to it from the internet or run it split-brained.
    #
    # Good luck!
    #
    # Yours,
    # SuSE Security Team
    #
    # ------------------------------------------------------------------------
    #
    # Configuration HELP:
    #
    # If you have got any problems configuring this file, take a look at
    # /usr/share/doc/packages/SuSEfirewall2/EXAMPLES for an example.
    #
    #
    # All types have to set enable SuSEfirewall2 in the runlevel editor
    #
    # If you are a end-user who is NOT connected to two networks (read: you have
    # got a single user system and are using a dialup to the internet) you just
    # have to configure (all other settings are OK): 2) and maybe 9).
    #
    # If this server is a firewall, which should act like a proxy (no direct
    # routing between both networks), or you are an end-user connected to the
    # internet and to an internal network, you have to setup your proxys and
    # reconfigure (all other settings are OK): 2), 3), 9) and maybe 7), 11), 14)
    #
    # If this server is a firewall, and should do routing/masquerading between
    # the untrusted and the trusted network, you have to reconfigure (all other
    # settings are OK): 2), 3), 5), 6), 9), and maybe 7), 10), 11), 12), 13),
    # 14), 20)
    #
    # If you want to run a DMZ in either of the above three standard setups, you
    # just have to configure *additionally* 4), 9), 12), 13), 17), 19).
    #
    # If you know what you are doing, you may also change 8), 11), 15), 16)
    # and the expert options 19), 20), 21), 22) and 23) at the far end, but you
    # should NOT.
    #
    # If you use diald or ISDN autodialing, you might want to set 17).
    #
    # To get programs like traceroutes to your firewall to work is a bit tricky,
    # you have to set the following options to "yes" : 11 (UDP only), 18 and 19.
    #
    # Please note that if you use service names, that they exist in /etc/services.
    # There is no service "dns", it's called "domain"; email is called "smtp" etc.
    #
    # *Any* routing between interfaces except masquerading requires to set FW_ROUTE
    # to "yes" and use FW_FORWARD or FW_ALLOW_CLASS_ROUTING !
    #
    # If you just want to do masquerading without filtering, ignore this script
    # and run this line (exchange "ippp0" "ppp0" if you use a modem, not isdn):
    # iptables -A POSTROUTING -t nat -j MASQUERADE -o ippp0
    # echo 1 > /proc/sys/net/ipv4/ip_forward
    # and additionally the following lines to get at least a minimum of security:
    # iptables -A INPUT -j DROP -m state --state NEW,INVALID -i ippp0
    # iptables -A FORWARD -j DROP -m state --state NEW,INVALID -i ippp0
    # ------------------------------------------------------------------------

    #
    # 1.)
    # Should the Firewall run in quickmode?
    #
    # "Quickmode" means that only the interfaces pointing to external networks
    # are secured, and no other. all interfaces not in the list of FW_DEV_EXT
    # are allowed full network access! Additionally, masquerading is
    # automatically activated for FW_MASQ_DEV devices. and last but not least:
    # all incoming connection via external interfaces are REJECTED.
    # You will only need to configure 2.) and FW_MASQ_DEV in 6.)
    # Optionally, you may add entries to section 9a.)
    #
    # Choice: "yes" or "no", if not set defaults to "no"
    #
    FW_QUICKMODE="no"

    # 9a.)
    # External services in QUICKMODE.
    # This is only used for QUICKMODE (see 1.)!
    # (The settings here are similar to section 9.)
    # Which services ON THE FIREWALL should be accessible from either the
    # internet (or other untrusted networks), i.e. the external interface(s)
    # $FW_DEV_EXT
    #
    # Enter all ports or known portnames below, seperated by a space.
    # TCP services (e.g. SMTP, WWW) must be set in FW_SERVICES_QUICK_TCP, and
    # UDP services (e.g. syslog) must be set in FW_SERVICES_QUICK_UDP.
    # e.g. if a secure shell daemon on the firewall should be accessible from
    # the internet:
    # FW_SERVICES_QUICK_TCP="ssh"
    # e.g. if the firewall should receive isakmp (IPsec) internet:
    # FW_SERVICES_QUICK_UDP="isakmp"
    # For IP protocols (like IPsec) you need to set
    # FW_SERVICES_QUICK_IP="50"
    #
    # Choice: leave empty or any number of ports, known portnames (from
    # /etc/services) and port ranges seperated by a space. Port ranges are
    # written like this: allow port 1 to 10 -> "1:10"
    # e.g. "", "smtp", "123 514", "3200:3299", "ftp 22 telnet 512:514"
    # For FW_SERVICES_*_IP enter the protocol name (like "igmp") or number ("2")
    #
    # QUICKMODE: TCP services open to external networks (InterNet)
    # (Common: ssh smtp)
    FW_SERVICES_QUICK_TCP=""

    # QUICKMODE: UDP services open to external networks (InterNet)
    # (Common: isakmp)
    FW_SERVICES_QUICK_UDP=""

    # QUICKMODE: IP protocols unconditionally open to external networks (InterNet)
    # (For VPN firewall that is VPN gateway: 50)
    FW_SERVICES_QUICK_IP=""

    #
    # 25.)
    # Do you want to load customary rules from a file?
    #
    # This is really an expert option. NO HELP WILL BE GIVEN FOR THIS!
    # READ THE EXAMPLE CUSTOMARY FILE AT /etc/sysconfig/SuSEfirewall2-custom
    #
    #FW_CUSTOMRULES="/etc/sysconfig/SuSEfirewall2-custom"
    FW_CUSTOMRULES=""

    #
    # 26.)
    # Do you want to REJECT packets instead of DROPing?
    #
    # DROPing (which is the default) will make portscans and attacks much
    # slower, as no replies to the packets will be sent. REJECTing means, that
    # for every illegal packet, a connection reject packet is sent to the
    # sender.
    #
    # Choice: "yes" or "no", if not set defaults to "no"
    #
    FW_REJECT="no"


    thx


  2. #2
    Registrierter Benutzer Avatar von real-challo
    Registriert seit
    Aug 2002
    Ort
    Hamburg
    Beiträge
    424
    Ein Tipp :

    Vergiss das vorgegebene Script, damit hatte ich auch mal Probleme. Nun schreib ich meine Regeln selber , und da weiss ich was ich mache - und es funktioniert.

    Schick doch mal kurz dein Log File (einige Zeilen) Da kann man sicherlich mehr daraus sehen, was los ist
    Wenn du immer tust, was du schon immer getan hast,
    wirst du immer bekommen, was du schon immer bekommen hast.
    ==========================
    http://www.admin-hilf-mir.de

  3. #3
    Registrierter Benutzer
    Registriert seit
    Oct 2002
    Beiträge
    21
    hier mal ein paar zeilen:

    Jan 2 18:34:40 server kernel: SuSE-FW-DROP-DEFAULT IN=eth1 OUT=ipsec0 SRC=192.168.10.2 DST=10.1.1.10 LEN=92 TOS=0x00 PREC=0x00 TTL=4 ID=45267 PROTO=ICMP TYPE=8 CODE=0 ID=512 SEQ=20481
    Jan 2 18:34:44 server kernel: SuSE-FW-DROP-DEFAULT IN=eth1 OUT=ipsec0 SRC=192.168.10.2 DST=10.1.1.10 LEN=92 TOS=0x00 PREC=0x00 TTL=5 ID=45271 PROTO=ICMP TYPE=8 CODE=0 ID=512 SEQ=20737
    Jan 2 18:34:49 server kernel: SuSE-FW-DROP-DEFAULT IN=eth1 OUT=ipsec0 SRC=192.168.10.2 DST=10.1.1.10 LEN=92 TOS=0x00 PREC=0x00 TTL=5 ID=45274 PROTO=ICMP TYPE=8 CODE=0 ID=512 SEQ=20993
    Jan 2 18:34:53 server kernel: SuSE-FW-DROP-DEFAULT IN=eth1 OUT=ipsec0 SRC=192.168.10.2 DST=10.1.1.10 LEN=92 TOS=0x00 PREC=0x00 TTL=5 ID=45276 PROTO=ICMP TYPE=8 CODE=0 ID=512 SEQ=21249
    Jan 2 18:34:58 server kernel: SuSE-FW-DROP-DEFAULT IN=eth1 OUT=ipsec0 SRC=192.168.10.2 DST=10.1.1.10 LEN=92 TOS=0x00 PREC=0x00 TTL=6 ID=45279 PROTO=ICMP TYPE=8 CODE=0 ID=512 SEQ=21505
    Jan 2 18:35:02 server kernel: SuSE-FW-DROP-DEFAULT IN=eth1 OUT=ipsec0 SRC=192.168.10.2 DST=10.1.1.10 LEN=92 TOS=0x00 PREC=0x00 TTL=6 ID=45281 PROTO=ICMP TYPE=8 CODE=0 ID=512 SEQ=21761


    Generelle Frage:

    Ist das ipsec ein internes oder externes Device???


    thx

  4. #4
    Registrierter Benutzer Avatar von real-challo
    Registriert seit
    Aug 2002
    Ort
    Hamburg
    Beiträge
    424
    Hi !

    Kannst Du bitte die Ausgabe von

    iptables -L -n -v

    nochmal posten !
    Wenn du immer tust, was du schon immer getan hast,
    wirst du immer bekommen, was du schon immer bekommen hast.
    ==========================
    http://www.admin-hilf-mir.de

  5. #5
    Registrierter Benutzer
    Registriert seit
    Oct 2002
    Beiträge
    21
    Chain INPUT (policy DROP 11 packets, 2234 bytes)
    pkts bytes target prot opt in out source destination
    46 3944 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
    63 7715 ACCEPT udp -- eth1 * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED udp dpts:137:138
    0 0 LOG all -- * * 127.0.0.0/8 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ANTI-SPOOFING '
    0 0 LOG all -- * * 0.0.0.0/0 127.0.0.0/8 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ANTI-SPOOFING '
    0 0 DROP all -- * * 127.0.0.0/8 0.0.0.0/0
    0 0 DROP all -- * * 0.0.0.0/0 127.0.0.0/8
    0 0 LOG all -- * * 192.168.10.1 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ANTI-SPOOFING '
    0 0 DROP all -- * * 192.168.10.1 0.0.0.0/0
    0 0 LOG all -- * * 212.202.221.15 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ANTI-SPOOFING '
    0 0 DROP all -- * * 212.202.221.15 0.0.0.0/0
    0 0 LOG all -- * * 212.202.221.15 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ANTI-SPOOFING '
    0 0 DROP all -- * * 212.202.221.15 0.0.0.0/0
    5 420 input_ext all -- ipsec0 * 0.0.0.0/0 212.202.221.15
    0 0 input_ext all -- ipsec0 * 0.0.0.0/0 212.202.221.15
    133K 28M input_ext all -- ppp0 * 0.0.0.0/0 212.202.221.15
    19 3411 input_ext all -- ppp0 * 0.0.0.0/0 212.202.221.15
    12316 1656K input_int all -- eth1 * 0.0.0.0/0 192.168.10.1
    0 0 LOG all -- eth1 * 0.0.0.0/0 212.202.221.15 LOG flags 6 level 4 prefix `SuSE-FW-ACCESS_DENIED_INT '
    0 0 DROP all -- eth1 * 0.0.0.0/0 212.202.221.15
    0 0 LOG all -- eth1 * 0.0.0.0/0 212.202.221.15 LOG flags 6 level 4 prefix `SuSE-FW-ACCESS_DENIED_INT '
    0 0 DROP all -- eth1 * 0.0.0.0/0 212.202.221.15
    36 4781 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-ILLEGAL-TARGET '
    36 4781 DROP all -- * * 0.0.0.0/0 0.0.0.0/0

    Chain FORWARD (policy DROP 0 packets, 0 bytes)
    pkts bytes target prot opt in out source destination
    58 2732 TCPMSS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
    0 0 ACCEPT all -- eth1 eth1 0.0.0.0/0 0.0.0.0/0
    0 0 ACCEPT all -- ipsec0 ipsec0 0.0.0.0/0 0.0.0.0/0
    0 0 ACCEPT all -- ppp0 ppp0 0.0.0.0/0 0.0.0.0/0
    1 84 forward_ext all -- ipsec0 * 0.0.0.0/0 0.0.0.0/0
    575 222K forward_ext all -- ppp0 * 0.0.0.0/0 0.0.0.0/0
    521 32771 forward_int all -- eth1 * 0.0.0.0/0 0.0.0.0/0
    0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-ILLEGAL-ROUTING '
    0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
    0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
    0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-FORWARD-ERROR '

    Chain OUTPUT (policy ACCEPT 75 packets, 17560 bytes)
    pkts bytes target prot opt in out source destination
    46 3944 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
    0 0 LOG icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 11 LOG flags 6 level 4 prefix `SuSE-FW-TRACEROUTE-ATTEMPT '
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 11
    15 1130 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 3 code 3
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 3 code 4
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 3 code 9
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 3 code 10
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 3 code 13
    0 0 DROP icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 3
    194K 44M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
    0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-OUTPUT-ERROR '

    Chain forward_dmz (0 references)
    pkts bytes target prot opt in out source destination
    0 0 LOG all -- * * 212.202.221.15 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ANTI-SPOOF '
    0 0 DROP all -- * * 212.202.221.15 0.0.0.0/0
    0 0 LOG all -- * * 212.202.221.15 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ANTI-SPOOF '
    0 0 DROP all -- * * 212.202.221.15 0.0.0.0/0
    0 0 LOG all -- * * 192.168.10.0/24 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ANTI-SPOOF '
    0 0 DROP all -- * * 192.168.10.0/24 0.0.0.0/0
    0 0 LOG all -- * * 0.0.0.0/0 192.168.10.1 LOG flags 6 level 4 prefix `SuSE-FW-DROP-CIRCUMVENTION '
    0 0 DROP all -- * * 0.0.0.0/0 192.168.10.1
    0 0 LOG all -- * * 0.0.0.0/0 212.202.221.15 LOG flags 6 level 4 prefix `SuSE-FW-DROP-CIRCUMVENTION '
    0 0 DROP all -- * * 0.0.0.0/0 212.202.221.15
    0 0 LOG all -- * * 0.0.0.0/0 212.202.221.15 LOG flags 6 level 4 prefix `SuSE-FW-DROP-CIRCUMVENTION '
    0 0 DROP all -- * * 0.0.0.0/0 212.202.221.15
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state ESTABLISHED icmp type 0
    0 0 ACCEPT icmp -- * ipsec0 0.0.0.0/0 0.0.0.0/0 state NEW icmp type 8
    0 0 ACCEPT icmp -- * ppp0 0.0.0.0/0 0.0.0.0/0 state NEW icmp type 8
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED icmp type 3
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED icmp type 0
    0 0 ACCEPT all -- * ppp0 192.168.10.0/24 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
    0 0 ACCEPT all -- ppp0 * 0.0.0.0/0 192.168.10.0/24 state RELATED,ESTABLISHED
    0 0 ACCEPT all -- * ppp0 10.1.1.0/24 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
    0 0 ACCEPT all -- ppp0 * 0.0.0.0/0 10.1.1.0/24 state RELATED,ESTABLISHED
    0 0 ACCEPT udp -- ppp0 * 0.0.0.0/0 192.168.10.2 state NEW,RELATED,ESTABLISHED udp dpt:60001
    0 0 ACCEPT udp -- ppp0 * 0.0.0.0/0 192.168.10.2 state NEW,RELATED,ESTABLISHED udp dpt:60002
    0 0 ACCEPT tcp -- ppp0 * 0.0.0.0/0 192.168.10.2 state NEW,RELATED,ESTABLISHED tcp dpt:7777
    0 0 ACCEPT udp -- ppp0 * 0.0.0.0/0 192.168.10.2 state NEW,RELATED,ESTABLISHED udp dpt:7777
    0 0 ACCEPT udp -- ppp0 * 0.0.0.0/0 192.168.10.2 state NEW,RELATED,ESTABLISHED udp dpt:13242
    0 0 ACCEPT udp -- ppp0 * 0.0.0.0/0 192.168.10.2 state NEW,RELATED,ESTABLISHED udp dpt:21000
    0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-DEFAULT '
    0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0

    Chain forward_ext (2 references)
    pkts bytes target prot opt in out source destination
    0 0 LOG all -- * * 192.168.10.0/24 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ANTI-SPOOF '
    0 0 DROP all -- * * 192.168.10.0/24 0.0.0.0/0
    0 0 LOG all -- * * 192.168.10.0/24 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ANTI-SPOOF '
    0 0 DROP all -- * * 192.168.10.0/24 0.0.0.0/0
    0 0 LOG all -- * * 10.1.1.0/24 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ANTI-SPOOF '
    0 0 DROP all -- * * 10.1.1.0/24 0.0.0.0/0
    0 0 LOG all -- * * 0.0.0.0/0 192.168.10.1 LOG flags 6 level 4 prefix `SuSE-FW-DROP-CIRCUMVENTION '
    0 0 DROP all -- * * 0.0.0.0/0 192.168.10.1
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state ESTABLISHED icmp type 0
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED icmp type 3
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED icmp type 0
    0 0 ACCEPT all -- ipsec0 ppp0 0.0.0.0/0 0.0.0.0/0
    0 0 ACCEPT all -- ppp0 ipsec0 0.0.0.0/0 0.0.0.0/0
    0 0 ACCEPT all -- * ppp0 192.168.10.0/24 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
    575 222K ACCEPT all -- ppp0 * 0.0.0.0/0 192.168.10.0/24 state RELATED,ESTABLISHED
    0 0 ACCEPT all -- * ppp0 10.1.1.0/24 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
    0 0 ACCEPT all -- ppp0 * 0.0.0.0/0 10.1.1.0/24 state RELATED,ESTABLISHED
    0 0 ACCEPT udp -- ppp0 * 0.0.0.0/0 192.168.10.2 state NEW,RELATED,ESTABLISHED udp dpt:60001
    0 0 ACCEPT udp -- ppp0 * 0.0.0.0/0 192.168.10.2 state NEW,RELATED,ESTABLISHED udp dpt:60002
    0 0 ACCEPT tcp -- ppp0 * 0.0.0.0/0 192.168.10.2 state NEW,RELATED,ESTABLISHED tcp dpt:7777
    0 0 ACCEPT udp -- ppp0 * 0.0.0.0/0 192.168.10.2 state NEW,RELATED,ESTABLISHED udp dpt:7777
    0 0 ACCEPT udp -- ppp0 * 0.0.0.0/0 192.168.10.2 state NEW,RELATED,ESTABLISHED udp dpt:13242
    0 0 ACCEPT udp -- ppp0 * 0.0.0.0/0 192.168.10.2 state NEW,RELATED,ESTABLISHED udp dpt:21000
    1 84 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-DEFAULT '
    1 84 DROP all -- * * 0.0.0.0/0 0.0.0.0/0

    Chain forward_int (1 references)
    pkts bytes target prot opt in out source destination
    0 0 LOG all -- * * 212.202.221.15 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ANTI-SPOOF '
    0 0 DROP all -- * * 212.202.221.15 0.0.0.0/0
    0 0 LOG all -- * * 212.202.221.15 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ANTI-SPOOF '
    0 0 DROP all -- * * 212.202.221.15 0.0.0.0/0
    0 0 LOG all -- * * 0.0.0.0/0 212.202.221.15 LOG flags 6 level 4 prefix `SuSE-FW-DROP-CIRCUMVENTION '
    0 0 DROP all -- * * 0.0.0.0/0 212.202.221.15
    0 0 LOG all -- * * 0.0.0.0/0 212.202.221.15 LOG flags 6 level 4 prefix `SuSE-FW-DROP-CIRCUMVENTION '
    0 0 DROP all -- * * 0.0.0.0/0 212.202.221.15
    0 0 ACCEPT icmp -- * ipsec0 0.0.0.0/0 0.0.0.0/0 state NEW icmp type 8
    0 0 ACCEPT icmp -- * ppp0 0.0.0.0/0 0.0.0.0/0 state NEW icmp type 8
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED icmp type 3
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED icmp type 0
    521 32771 ACCEPT all -- * ppp0 192.168.10.0/24 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
    0 0 ACCEPT all -- ppp0 * 0.0.0.0/0 192.168.10.0/24 state RELATED,ESTABLISHED
    0 0 ACCEPT all -- * ppp0 10.1.1.0/24 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
    0 0 ACCEPT all -- ppp0 * 0.0.0.0/0 10.1.1.0/24 state RELATED,ESTABLISHED
    0 0 ACCEPT udp -- ppp0 * 0.0.0.0/0 192.168.10.2 state NEW,RELATED,ESTABLISHED udp dpt:60001
    0 0 ACCEPT udp -- ppp0 * 0.0.0.0/0 192.168.10.2 state NEW,RELATED,ESTABLISHED udp dpt:60002
    0 0 ACCEPT tcp -- ppp0 * 0.0.0.0/0 192.168.10.2 state NEW,RELATED,ESTABLISHED tcp dpt:7777
    0 0 ACCEPT udp -- ppp0 * 0.0.0.0/0 192.168.10.2 state NEW,RELATED,ESTABLISHED udp dpt:7777
    0 0 ACCEPT udp -- ppp0 * 0.0.0.0/0 192.168.10.2 state NEW,RELATED,ESTABLISHED udp dpt:13242
    0 0 ACCEPT udp -- ppp0 * 0.0.0.0/0 192.168.10.2 state NEW,RELATED,ESTABLISHED udp dpt:21000
    0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-DEFAULT '
    0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0

    Chain input_dmz (0 references)
    pkts bytes target prot opt in out source destination
    0 0 LOG all -- * * 212.202.221.15 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ANTI-SPOOF '
    0 0 DROP all -- * * 212.202.221.15 0.0.0.0/0
    0 0 LOG all -- * * 212.202.221.15 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ANTI-SPOOF '
    0 0 DROP all -- * * 212.202.221.15 0.0.0.0/0
    0 0 LOG all -- * * 192.168.10.0/24 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ANTI-SPOOF '
    0 0 DROP all -- * * 192.168.10.0/24 0.0.0.0/0
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED icmp type 0
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED icmp type 3
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED icmp type 11
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED icmp type 12
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED icmp type 14
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED icmp type 18
    0 0 ACCEPT all -- * * 192.168.10.0/24 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
    0 0 ACCEPT all -- * * 10.1.1.0/24 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
    0 0 LOG icmp -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ICMP '
    0 0 DROP icmp -- * * 0.0.0.0/0 0.0.0.0/0
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:113 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-REJECT '
    0 0 reject_func tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:113 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:111 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:111 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:139 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:139 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:3128 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:3128 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4000 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4000 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4001 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4001 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4002 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4002 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4080 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4080 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4278 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4278 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:5365 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:5365 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:10000 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:10000 flags:0x16/0x02
    0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED tcp dpts:1024:65535
    0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state ESTABLISHED tcp dpts:600:65535 flags:!0x16/0x02
    0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state ESTABLISHED tcp dpt:20 flags:!0x16/0x02
    0 0 ACCEPT udp -- * * 213.148.129.10 0.0.0.0/0 state NEW,RELATED,ESTABLISHED udp spt:53 dpts:1024:65535
    0 0 ACCEPT udp -- * * 213.148.130.10 0.0.0.0/0 state NEW,RELATED,ESTABLISHED udp spt:53 dpts:1024:65535
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:21
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:22
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:80
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:111
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:111
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:137
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:138
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:139
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:3128
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:4000
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:4001
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:4002
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:4080
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:4278
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:4282
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:5365
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:5365
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:10000
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:10000
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:32769
    0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED udp dpts:1024:65535
    0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-DEFAULT '
    0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0

    Chain input_ext (4 references)
    pkts bytes target prot opt in out source destination
    0 0 LOG all -- * * 192.168.10.0/24 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ANTI-SPOOF '
    0 0 DROP all -- * * 192.168.10.0/24 0.0.0.0/0
    0 0 LOG all -- * * 192.168.10.0/24 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ANTI-SPOOF '
    0 0 DROP all -- * * 192.168.10.0/24 0.0.0.0/0
    5 420 LOG all -- * * 10.1.1.0/24 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ANTI-SPOOF '
    5 420 DROP all -- * * 10.1.1.0/24 0.0.0.0/0
    0 0 ACCEPT icmp -- * * 212.202.221.15 0.0.0.0/0 icmp type 4
    0 0 ACCEPT icmp -- * * 212.202.221.15 0.0.0.0/0 icmp type 4
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED icmp type 0
    2787 174K ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED icmp type 3
    48 2688 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED icmp type 11
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED icmp type 12
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED icmp type 14
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED icmp type 18
    0 0 ACCEPT all -- * * 192.168.10.0/24 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
    0 0 ACCEPT all -- * * 10.1.1.0/24 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
    265 15714 LOG icmp -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ICMP '
    265 15714 DROP icmp -- * * 0.0.0.0/0 0.0.0.0/0
    24 3168 ACCEPT esp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
    0 0 ACCEPT ah -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
    0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED tcp dpt:21
    6 586 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED tcp dpt:80
    38680 9614K ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED tcp dpt:4278
    483 32015 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED tcp dpt:5365
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:113 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-REJECT '
    0 0 reject_func tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:113 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:111 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:111 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:139 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:139 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:3128 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:3128 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4000 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4000 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4001 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4001 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4002 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4002 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4080 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4080 flags:0x16/0x02
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:10000 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-DROP '
    0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:10000 flags:0x16/0x02
    74860 16M ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED tcp dpts:1024:65535
    0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state ESTABLISHED tcp dpts:600:65535 flags:!0x16/0x02
    0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state ESTABLISHED tcp dpt:20 flags:!0x16/0x02
    0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED udp dpt:21
    0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED udp dpt:80
    16 3736 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED udp dpt:500
    0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED udp dpt:4278
    387 20637 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED udp dpt:4282
    11545 1482K ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED udp dpt:5365
    4242 662K ACCEPT udp -- * * 213.148.129.10 0.0.0.0/0 state NEW,RELATED,ESTABLISHED udp spt:53 dpts:1024:65535
    3 734 ACCEPT udp -- * * 213.148.130.10 0.0.0.0/0 state NEW,RELATED,ESTABLISHED udp spt:53 dpts:1024:65535
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:22
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:111
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:111
    61 4758 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:137
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:138
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:139
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:3128
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:4000
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:4001
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:4002
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:4080
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:10000
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:10000
    0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:32769
    15 710 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED udp dpts:1024:65535
    0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state ESTABLISHED udp dpts:61000:65095
    0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-DEFAULT '
    0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0

    Chain input_int (1 references)
    pkts bytes target prot opt in out source destination
    0 0 LOG all -- * * 212.202.221.15 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ANTI-SPOOF '
    0 0 DROP all -- * * 212.202.221.15 0.0.0.0/0
    0 0 LOG all -- * * 212.202.221.15 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ANTI-SPOOF '
    0 0 DROP all -- * * 212.202.221.15 0.0.0.0/0
    12316 1656K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED icmp type 0
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED icmp type 3
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED icmp type 11
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED icmp type 12
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED icmp type 14
    0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED icmp type 18
    0 0 ACCEPT all -- * * 192.168.10.0/24 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
    0 0 ACCEPT all -- * * 10.1.1.0/24 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
    0 0 LOG icmp -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-ICMP '
    0 0 DROP icmp -- * * 0.0.0.0/0 0.0.0.0/0
    0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:113 flags:0x16/0x02 LOG flags 6 level 4 prefix `SuSE-FW-REJECT '
    0 0 reject_func tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:113 flags:0x16/0x02
    0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED tcp dpts:1024:65535
    0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state ESTABLISHED tcp dpts:600:65535 flags:!0x16/0x02
    0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state ESTABLISHED tcp dpt:20 flags:!0x16/0x02
    0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED udp dpt:3130
    0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED udp dpt:3401
    0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED udp dpt:32768
    0 0 ACCEPT udp -- * * 213.148.129.10 0.0.0.0/0 state NEW,RELATED,ESTABLISHED udp spt:53 dpts:1024:65535
    0 0 ACCEPT udp -- * * 213.148.130.10 0.0.0.0/0 state NEW,RELATED,ESTABLISHED udp spt:53 dpts:1024:65535
    0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED udp dpts:1024:65535
    0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 6 level 4 prefix `SuSE-FW-DROP-DEFAULT '
    0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0

    Chain reject_func (3 references)
    pkts bytes target prot opt in out source destination
    0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset
    0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
    0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-proto-unreachable

  6. #6
    Registrierter Benutzer
    Registriert seit
    May 2002
    Ort
    Sarstedt
    Beiträge
    104
    Hallo,
    die folgenden Einträge müssen gleich sein.

    FW_DEV_EXT="ppp0 ipsec0"
    FW_MASQ_DEV="ppp0 ipsec0" oder "$FW_DEV_WORLD"
    letzteres ist standard.

    Gruss Klaus

  7. #7
    Registrierter Benutzer
    Registriert seit
    Oct 2002
    Beiträge
    21
    Hat leider so nichts gebracht, kann jetzt weder opingen noch sonstirgendetwas.

    Die VPN kommt jedoch zustande

    thx

  8. #8
    Registrierter Benutzer
    Registriert seit
    May 2002
    Ort
    Sarstedt
    Beiträge
    104
    Hallo,
    ich lege mal eine Beispielkonfiguration bei.
    Damit sollte es nach entsprechender Anpassung laufen.
    Es sind keine Dienste vom Internet her (ausser VPN) freigegeben.


    FW_QUICKMODE="no"
    FW_DEV_EXT="ppp0 ipsec0" #zum Internet eth1?
    FW_DEV_INT="eth0"
    FW_DEV_DMZ=""
    FW_ROUTE="yes"
    FW_MASQUERADE="yes"
    FW_MASQ_DEV="ppp0 ipsec0"
    FW_MASQ_NETS="192.168.10.0/24" #z.B.dein intranet
    FW_PROTECT_FROM_INTERNAL="yes"
    FW_AUTOPROTECT_SERVICES="yes"
    FW_SERVICES_EXT_TCP=""
    FW_SERVICES_EXT_UDP="500"
    FW_SERVICES_EXT_IP="50 51"
    FW_SERVICES_DMZ_TCP=""
    FW_SERVICES_DMZ_UDP=""
    FW_SERVICES_DMZ_IP=""
    FW_SERVICES_INT_TCP="http https smtp imap2 pop3 ftp-data" #deine Dienste von innen
    FW_SERVICES_INT_UDP="domain ftp-data" #deine Dienste von innen
    FW_SERVICES_INT_IP=""
    FW_SERVICES_QUICK_TCP=""
    FW_SERVICES_QUICK_UDP=""
    FW_SERVICES_QUICK_IP=""
    FW_TRUSTED_NETS=""
    FW_ALLOW_INCOMING_HIGHPORTS_TCP="no"
    FW_ALLOW_INCOMING_HIGHPORTS_UDP="DNS"
    FW_SERVICE_AUTODETECT="no"
    FW_SERVICE_DNS="no"
    FW_SERVICE_DHCLIENT="no"
    FW_SERVICE_DHCPD="no"
    FW_SERVICE_SQUID="no"
    FW_SERVICE_SAMBA="no" #Samba nur intern
    FW_FORWARD=""
    FW_FORWARD_MASQ=""
    FW_REDIRECT=""
    FW_LOG_DROP_CRIT="yes"
    FW_LOG_DROP_ALL="no"
    FW_LOG_ACCEPT_CRIT="yes"
    FW_LOG_ACCEPT_ALL="no"
    FW_LOG="--log-level warning --log-tcp-options --log-ip-option --log-prefix SuSE-FW"
    FW_KERNEL_SECURITY="yes"
    FW_STOP_KEEP_ROUTING_STATE="no"
    FW_ALLOW_PING_FW="yes"
    FW_ALLOW_PING_DMZ="no"
    FW_ALLOW_PING_EXT="no"
    FW_ALLOW_FW_TRACEROUTE="no"
    FW_ALLOW_FW_SOURCEQUENCH="no"
    FW_ALLOW_FW_BROADCAST="no"
    FW_IGNORE_FW_BROADCAST="yes"
    FW_ALLOW_CLASS_ROUTING="no"
    FW_CUSTOMRULES=""
    FW_REJECT="no"

    Gruss Klaus

  9. #9
    Registrierter Benutzer Avatar von Newbie2001
    Registriert seit
    Jan 2002
    Ort
    Nürnberg
    Beiträge
    1.294
    kleiner fehler:
    FW_DEV_INT="eth1" und nicht FW_DEV_INT="eth0"
    ICQ: 102300224
    Tyan Tiger MPX S2466N-4M | AMD-760MPX chipset | 2 x 1800 mhz Athlon MP | 2,0 gb infineon registered ddr | 2 x 80 gb western digital als raid1 (hpt372) | 2 x 80 gb ibm als raid1 (hpt370) | 2 x 60 gb western digital als raid1 (hpt370) | 3C905C | 3C905B-TX

  10. #10
    Registrierter Benutzer
    Registriert seit
    May 2002
    Ort
    Sarstedt
    Beiträge
    104
    Richtig.
    Ist ja auch nur ein Beispiel das mit den eigenen Daten angepasst werden muss.
    Sollte aber nach entsprechenden Änderungen laufen.

    Klaus

Lesezeichen

Berechtigungen

  • Neue Themen erstellen: Nein
  • Themen beantworten: Nein
  • Anhänge hochladen: Nein
  • Beiträge bearbeiten: Nein
  •