Bienvenido(a) a Alcance Libre 30/01/2023, 13:14
|
![]() |
Índice del foro > Todo acerca de Linux > Redes y Servidores |
![]() ![]() |
![]() |
Omar Orozco |
|
|||||||
![]() ![]() ![]() ![]() ![]() Participa poco ![]() Estado: desconectado ![]() Identificado: 09/16/14 Mensajes: 19 Localización:Panama |
gente ayudenme con algo...
tengo un server en centos en el cual la red interna no puede hacer ping hacia IP's externas si puedo hacer ping a IP's dentro de a red, como creen uds. q puedo verificar eso? me fije en el firewall y no veo ninguna regla para icmp... (estoy tratando de conectar 2 SQLserver, pero al parecer algun puerto tengo bloqueado q no es el 1433, pero quiero al menos q el de mi red interna pueda hacerle a ping al de la nube) gracias Omar |
|||||||
|
||||||||
Joel Barrios Dueñas |
|
|||||||
![]() ![]() ![]() ![]() ![]() Admin ![]() Estado: desconectado ![]() Identificado: 02/17/07 Mensajes: 1761 Localización:Mexico |
Publica la configuración de tu cortafuegos para verificar. Es posible tengas al inicio una regla que cierre todas las conexiones.
|
|||||||
|
||||||||
Omar Orozco |
|
|||||||
![]() ![]() ![]() ![]() ![]() Participa poco ![]() Estado: desconectado ![]() Identificado: 09/16/14 Mensajes: 19 Localización:Panama |
Gracias Joel, publico iptables:
el 192.168.0.6 es el server q les mencione # Generated by iptables-save v1.3.5 on Mon May 25 18:37:59 2015 *nat ![]() ![]() :OUTPUT ACCEPT [13109329:1000199561] -A PREROUTING -i eth2 -p tcp -m tcp --dport 3389 -j DNAT --to-destination 192.168.0.6 -A PREROUTING -i eth2 -p tcp -m tcp --dport 80 -j DNAT --to-destination 192.168.0.6 -A PREROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -i eth1 -p tcp -m tcp --dport 80 -j REDIRECT --to-ports 3128 -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 80 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 465 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 110 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 5060:5070 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1863 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 10000 -j MASQUERADE -A POSTROUTING -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 3389 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 587 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 990 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1024 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1025 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1026 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1027 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1028 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1029 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1030 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1031 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1032 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1033 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1034 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1035 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1036 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1037 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1038 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1039 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1040 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1041 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1042 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1043 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1044 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1045 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1046 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1047 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1048 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 21 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 20 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 995 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 993 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 143 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p udp -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1433 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 1723 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 443 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 2083 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 2210 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 2211 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 8443 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 8080 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 17500 -j MASQUERADE -A POSTROUTING -o eth2 -p tcp -m tcp --dport 22 -j MASQUERADE -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 3389 -j MASQUERADE # -A POSTROUTING -s 192.168.0.0/255.255.255.0 -d ! 192.168.0.0/255.255.0.0 -o eth2 -p tcp -m tcp --dport 5900 -j MASQUERADE COMMIT # Completed on Mon May 25 18:37:59 2015 # Generated by iptables-save v1.3.5 on Mon May 25 18:37:59 2015 *mangle ![]() :INPUT ACCEPT [99460857:13155731635] :FORWARD ACCEPT [3708218:1890296687] :OUTPUT ACCEPT [111144838:134554869397] ![]() -A FORWARD -d 69.89.31.245 -p tcp -m tcp --dport 25 -j ACCEPT COMMIT # Completed on Mon May 25 18:37:59 2015 # Generated by iptables-save v1.3.5 on Mon May 25 18:37:59 2015 *filter :INPUT ACCEPT [99460785:13155727099] :FORWARD ACCEPT [3708218:1890296687] :OUTPUT ACCEPT [111144527:134554836246] -A INPUT -s 85.95.224.51 -j DROP # -A INPUT -s 13.107.4.50 -j DROP -A INPUT -s 31.184.245.52 -j REJECT --reject-with icmp-port-unreachable COMMIT # Completed on Mon May 25 18:37:59 2015 Omar |
|||||||
|
||||||||
Contenido generado en: 0.12 segundos |
![]() ![]() |
Todas las horas son CST. Hora actual 01:14 PM. |
|
|