![]() ![]() Kerberos 5 Username contain strange caracters.i want to make a splash page capable of sending messages to zeroshell.VPN HTTP/S connection through zeroshell.Pkts bytes target prot opt in out source root> Pkts bytes target prot opt in out source destinationĢ539 248K SYS_INPUT all - any any anywhere anywhereĠ 0 SYS_HTTPS tcp - any any anywhere anywhere tcp dpt:httpĨ21 95124 SYS_HTTPS tcp - any any anywhere anywhere tcp dpt:httpsĥ6 5000 SYS_SSH tcp - any any anywhere anywhere tcp dpt:sshĠ 0 ACCEPT tcp - BRIDGE00 any anywhere anywhere tcp spt:https dpt:httpsĠ 0 ACCEPT tcp - BRIDGE00 any anywhere anywhere tcp spt:ssh dpt:sshĠ 0 ACCEPT tcp - any any anywhere anywhere tcp spt:https dpt:httpsĬhain FORWARD (policy DROP 12542 packets, 721K bytes)Ģ208K 264M ACCEPT all - BRIDGE00 any anywhere anywhereģ234K 3196M ACCEPT all - any any anywhere anywhere state RELATED,ESTABLISHEDĬhain OUTPUT (policy ACCEPT 2894 packets, 1104K bytes)ģ246 1133K SYS_OUTPUT all - any any anywhere anywhereġ50 9900 DROP all - any ppp0 anywhere anywhereĠ 0 ACCEPT all - lo any anywhere anywhereĤ057 376K ACCEPT all - BRIDGE00 any 192.168.1.0/24 anywhereĠ 0 ACCEPT all - BRIDGE00 any 192.168.1.44 anywhereĢ 96 DROP all - any any anywhere anywhereġ011 115K ACCEPT all - lo any anywhere anywhereĢ23 58755 ACCEPT udp - any any anywhere anywhere udp spt:domain state ESTABLISHEDĤ0 35390 ACCEPT tcp - any any anywhere anywhere tcp spt:http state ESTABLISHEDĤ00 48000 ACCEPT tcp - any any anywhere anywhere tcp spt:8245 state ESTABLISHEDģ399 258K ACCEPT udp - any any anywhere anywhere udp spt:ntp state ESTABLISHEDĢ3952 2117K RETURN all - any any anywhere anywhereġ011 115K ACCEPT all - any lo anywhere anywhereģ33 23664 ACCEPT udp - any any anywhere anywhere udp dpt:domainĤ0 2626 ACCEPT tcp - any any anywhere anywhere tcp dpt:httpĥ01 37852 ACCEPT tcp - any any anywhere anywhere tcp dpt:8245ģ606 274K ACCEPT udp - any any anywhere anywhere udp dpt:ntpġ2212 3493K RETURN all - any any anywhere anywhereĥ3 4832 ACCEPT all - BRIDGE00 any 192.168.1.44 anywhereĨ 444 DROP all - any any anywhere root> iptables -t nat -L -vĬhain PREROUTING (policy ACCEPT 45557 packets, 3349K bytes)ġ2247 664K DNAT tcp - ppp0 any anywhere anywhere tcp dpt:lotusnote to:192.168.1.44:1352Ġ 0 DNAT udp - ppp0 any anywhere anywhere udp dpt:sip-tls to:192.168.1.9:5061Ġ 0 DNAT udp - ppp0 any anywhere anywhere udp dpt:sip to:192.168.1.7:5060Ĥ30 63541 DNAT udp - ppp0 any anywhere anywhere udp dpts:ndmp:dnp to:192.168.1.7:10000-20000Ĭhain POSTROUTING (policy ACCEPT 2228 packets, 347K bytes)ģ1734 2139K SNATVS all - any any anywhere anywhereĢ9506 1793K MASQUERADE all - any ppp0 anywhere anywhereĬhain OUTPUT (policy ACCEPT 6135 packets, 439K bytes) failed: Connection timed out.Ĭhain INPUT (policy DROP 1474 packets, 126K bytes) (My current firewall rules are shown in here: ) 17:30:22 WAN IP=MY.IP.ADD.RESSġ7:30:22 Dynamic DNS updating. I’ve tried a few rules in the Firewall to get this working again (it was working before I set up Firewall) but nothing has worked so far. My problem now is that automatic updates to OpenDNS are not working. It’s an excellent distributution – thanks Fulvio! Thanks to the help from ppalias I’ve now got zeroshell set up and working pretty much how I hoped. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |