Re: Add route from laptop through workstation...
On Wednesday 10 December 2003 18:35, Kjetil Kjernsmo wrote:
> > And 'iptables -L '?
> Chain FORWARD (policy DROP)
> target prot opt source destination
>
> That's it, is it...?
It wasn't... Here's the full output from iptables -L on the workstation:
Chain INPUT (policy DROP)
target prot opt source destination
ACCEPT all -- anywhere anywhere
badflags tcp -- anywhere anywhere tcp
flags:FIN,SYN,RST,PSH,ACK,URG/FIN,PSH,URG
badflags tcp -- anywhere anywhere tcp
flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,PSH,ACK,URG
badflags tcp -- anywhere anywhere tcp
flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,ACK,URG
badflags tcp -- anywhere anywhere tcp
flags:FIN,SYN,RST,PSH,ACK,URG/NONE
badflags tcp -- anywhere anywhere tcp
flags:SYN,RST/SYN,RST
badflags tcp -- anywhere anywhere tcp
flags:FIN,SYN/FIN,SYN
ACCEPT tcp -- anywhere anywhere tcp dpt:ssh
ACCEPT tcp -- anywhere anywhere tcp dpt:ipp
ACCEPT all -- anywhere anywhere state
RELATED,ESTABLISHED
ACCEPT all -- anywhere anywhere state
RELATED,ESTABLISHED
DROP tcp -- anywhere anywhere tcp
dpt:cvspserver
DROP tcp -- anywhere anywhere tcp
dpt:1008
ACCEPT icmp -- anywhere anywhere icmp
echo-reply
ACCEPT icmp -- anywhere anywhere icmp
destination-unreachable
ACCEPT icmp -- anywhere anywhere icmp
time-exceeded
ACCEPT icmp -- anywhere anywhere icmp
echo-request limit: avg 1/sec burst 5
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain badflags (6 references)
target prot opt source destination
LOG all -- anywhere anywhere limit: avg
15/min burst 5 LOG level warning prefix `Badflags:'
DROP all -- anywhere anywhere
But then, masqing, that is something that must be done explicitly,
perhaps...?
Best,
Kjetil
--
Kjetil Kjernsmo
Astrophysicist/IT Consultant/Skeptic/Ski-orienteer/Orienteer/Mountaineer
kjetil@kjernsmo.net webmaster@skepsis.no editor@learn-orienteering.org
Homepage: http://www.kjetil.kjernsmo.net/ OpenPGP KeyID: 6A6A0BBC
Reply to: