博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
在NETBSD上配置ADSL+IPF+IPNAT(转)
阅读量:2503 次
发布时间:2019-05-11

本文共 5128 字,大约阅读时间需要 17 分钟。

在NETBSD上配置ADSL+IPF+IPNAT(转)[@more@]

  OS: 2.x

  配置网卡的IP地址:

  # vi /etc/ifconfig.rtk0

  inet 192.168.0.1 netmask 255.255.255.0

  # vi /etc/ifconfig.tlp0

  inet 192.168.1.2 netmask 255.255.255.0

  配置主机名:

  # vi /etc/myname

  netbsd

  # vi /etc/hosts

  127.0.0.1    localhost    netbsd

  配置DNS解析:

  # vi /etc/resolv.conf

  nameserver 202.99.160.68

  nameserver 202.99.168.8

  配置网关:

  # vi /etc/mygate

  192.168.0.10

  配置主机本地解析:

  # vi /etc/hosts

  192.168.0.10    win2k

  配置SSHD服务:

  # vi /etc/defaults/rc.conf

  sshd=YES

  # vi /etc/ssh/sshd_config

  PermitRootLogin yes

  安装配置ADSL:

  # pkg_add rp-pppoe-3.5.tgz

  # mkdir /etc/ppp

  # cp /usr/pkg/share/examples/rp-pppoe/pppoe.conf /etc/ppp/pppoe.conf

  # adsl-start

  配置防火墙代理上网:

  # vi /etc/ipf.conf

  =================================/etc/ipf.conf==============================

  # +-----------+  +------------------------------+  +------------------+

  # | ADSL-Modem|---| ppp0 tlp0 NAT+IPF  rtk0 |---| Internal Network |

  # +-----------+  +------------------------------+  +------------------+

  #

  # +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

  # Interface: all

  # Block all incoming and outgoing packets unless they're allowed later.

  # +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

  block in all

  block out all

  # Possibly dangerous: packets with ip-options, short and fragmented packets

  block in log quick on ppp0 proto icmp from any to any

  block in log quick all with short

  block in log quick all with ipopts

  block in log quick all with frag

  block in log quick all with opt lsrr

  block in log quick all with opt ssrr

  # Local network traffic is allowed

  pass out quick on lo0

  pass in quick on lo0

  pass out quick on rtk0

  pass in quick on rtk0

  # Block faked or unlikely "local" addresses

  block in log body quick on ppp0 from 192.168.0.0/16 to any

  block in log body quick on ppp0 from 172.16.0.0/12 to any

  block in log body quick on ppp0 from 10.0.0.0/8 to any

  block in log body quick on ppp0 from 192.0.2.0/24 to any

  block in log body quick on ppp0 from 0.0.0.0/8 to any

  block in log body quick on ppp0 from 127.0.0.0/8 to any

  block in log body quick on ppp0 from 169.254.0.0/16 to any

  block in log body quick on ppp0 from 224.0.0.0/3 to any

  block in log body quick on ppp0 from 204.152.64.0/23 to any

  # Blocking of outgoing faked or unlikely "internal" addresses

  block out log body quick on ppp0 from any to 192.168.0.0/16

  block out log body quick on ppp0 from any to 172.16.0.0/12

  block out log body quick on ppp0 from any to 10.0.0.0/8

  block out log body quick on ppp0 from any to 127.0.0.0/8

  block out log body quick on ppp0 from any to 0.0.0.0/8

  block out log body quick on ppp0 from any to 169.254.0.0/16

  block out log body quick on ppp0 from any to 192.0.2.0/24

  block out log body quick on ppp0 from any to 204.152.64.0/23

  block out log body quick on ppp0 from any to 224.0.0.0/3

  # The pass rules to enable Services

  pass in on ppp0 proto tcp from any to any port = 20 flags S keep state

  pass in on ppp0 proto tcp from any to any port = 21 flags S keep state

  pass in on ppp0 proto tcp from any to any port = 22 flags S keep state

  pass in on ppp0 proto tcp from any to any port = 25 flags S keep state

  pass in on ppp0 proto tcp from any to any port = 80 flags S keep state

  pass in on ppp0 proto tcp from any to any port = 110 flags S keep state

  pass in on ppp0 proto tcp from any to any port = 443 flags S keep state

  pass in on ppp0 proto tcp from any to any port 55000 >;< 56000 flags S keep state

  # The general pass rules.

  pass out quick on ppp0 proto tcp from any to any flags S/SAFR keep state keep frags

  pass out quick on ppp0 proto udp from any to any keep state keep frags

  pass out quick on ppp0 proto icmp from any to any keep state keep frags

  =================================/etc/ipf.conf==============================

  # vi /etc/sysctl.conf

  net.inet.ip.forwarding=1

  net.inet.tcp.mss_ifmtu=1

  # vi /etc/ipnat.conf

  map ppp0 192.168.0.0/24 ->; 0/32 proxy port ftp ftp/tcp mssclamp 1440

  map ppp0 192.168.0.0/24 ->; 0/32 portmap tcp/udp auto mssclamp 1440

  map ppp0 192.168.0.0/24 ->; 0/32 mssclamp 1440

  启用防火墙设置:

  # vi /etc/defaults/rc.conf

  ipfilter=YES                            # uses /etc/ipf.conf

  ipnat=YES                                # uses /etc/ipnat.conf

  ipfs=YES        ipfs_flags=""        # save/load ipnat and ipf states

  ifwatchd=YES

  配置动态域名更新:

  # wget http://www.3322.org/dyndnspage/ez-ipupdate-3.0.10.tgz

  # tar zxvf ez-ipupdate-3.0.10.tgz

  # cd ez-ipupdate-3.0.10

  # vi conf_file.c

  增加一行:

  #include ;

  # vi ez-ipupdate.c

  注释掉下面几行(4515行):

  //else

  // {

  //  fprintf(stderr, "no update needed at this time ";

  // }

  # ./configure

  # make

  # make install

  设置拨号后自动运行:

  # vi /etc/ppp/ip-up

  #!/bin/sh

  /usr/local/bin/ez-ipupdate -i ppp0 -h nero.3322.org -S qdns -u llzqq:9335333

  # chmod 700 /etc/ppp/ip-up

来自 “ ITPUB博客 ” ,链接:http://blog.itpub.net/10748419/viewspace-944307/,如需转载,请注明出处,否则将追究法律责任。

转载于:http://blog.itpub.net/10748419/viewspace-944307/

你可能感兴趣的文章
reRender属性的使用
查看>>
href="javascript:void(0)"
查看>>
h:panelGrid、h:panelGroup标签学习
查看>>
f:facet标签 的用法
查看>>
<h:panelgroup>相当于span元素
查看>>
java中append()的方法
查看>>
必学高级SQL语句
查看>>
经典SQL语句大全
查看>>
log日志记录是什么
查看>>
<rich:modelPanel>标签的使用
查看>>
<h:commandLink>和<h:inputLink>的区别
查看>>
<a4j:keeyAlive>的英文介绍
查看>>
关于list对象的转化问题
查看>>
VOPO对象介绍
查看>>
suse创建的虚拟机,修改ip地址
查看>>
linux的挂载的问题,重启后就挂载就没有了
查看>>
docker原始镜像启动容器并创建Apache服务器实现反向代理
查看>>
docker容器秒死的解决办法
查看>>
管理网&业务网的一些笔记
查看>>
openstack报错解决一
查看>>