亚洲乱码中文字幕综合,中国熟女仑乱hd,亚洲精品乱拍国产一区二区三区,一本大道卡一卡二卡三乱码全集资源,又粗又黄又硬又爽的免费视频

FreeBSD6.1Release下利用route和ipfilter架設(shè)路由的方法

 更新時(shí)間:2007年05月22日 00:00:00   作者:  
架設(shè)此服務(wù)器,使內(nèi)網(wǎng)用戶通過本服務(wù)器與外界通訊;基本原理為內(nèi)網(wǎng)用戶通過FreeBSD內(nèi)自帶的網(wǎng)關(guān)路由功能(route)與外網(wǎng)進(jìn)行通訊,服務(wù)器的安全性及病毒的防護(hù)控制通過FreeBSD的ipfilter來完成。初步架設(shè)過程如下:

網(wǎng)卡接口說明:
vr0:外網(wǎng)網(wǎng)卡接口
vr1:內(nèi)網(wǎng)網(wǎng)卡接口

1、    最小化安裝FreeBSD6.1Release
從ftp://ftp.FreeBSD.org/pub/FreeBSD/下載FreeBSD6.1Release鏡像文件,然后刻成光盤,將服務(wù)器設(shè)置成從光驅(qū)啟動(dòng),開始安裝,安裝時(shí)我選擇最小化安裝,開通ftp及ssh。其它的默認(rèn)安裝就可以。具體可參考這篇文章。安裝完后重啟機(jī)器。

2、    安裝內(nèi)核
將安裝光盤放入光驅(qū),然后:
# /usr/sbin/sysinstall
然后選擇Configure --> Distributions -> src -> sys,點(diǎn)install,安裝完成后重啟機(jī)器。

3、    基本的配置
配置/etc/rc.conf
# cd /etc
# ee rc.conf
內(nèi)容如下:
hostname="gatewall.wxic.edu.cn"
defaultrouter="172.16.252.17"
ifconfig_vr0="inet 172.16.252.x netmask 255.255.255.252"
ifconfig_vr1="inet 58.193.11x.25x netmask 255.255.248.0"
inetd_enable="YES"
linux_enable="YES"
sshd_enable="YES"
usbd_enable="YES"
sendmail_enable="NONE"

配置/etc/resolv.conf
# ee /etc/rc.conf
內(nèi)容如下:
nameserver 58.193.112.1

4
、    配置內(nèi)核,加入對ipfilter的支持
# cd /usr/src/sys/i386/conf
# cp GENERIC funpower
# ee funpower
然后開始編輯內(nèi)核文件,機(jī)器和應(yīng)用方面的不同會(huì)有不同的內(nèi)核文件,因?yàn)樾枰玫絠pfilter,我們加入對ipfilter的支持。在內(nèi)核中加入如下內(nèi)容:
options   IPFILTER
options   IPFILTER_LOG
options   IPFILTER_DEFAULT_BLOCK
其它選項(xiàng)可以參考這篇文章,然后自己定制。編輯完后保存退出。然后進(jìn)行如下操作:
# /usr/sbin/config funpower
# cd ../compile/funpower
# make cleandepend
# make depend
# make
# make install
編譯完后重啟服務(wù)器(因?yàn)閕pfilter默認(rèn)是阻止所有通訊,所以確保你是在服務(wù)器前操作)。

5、    在/etc/rc.conf中加入路由選項(xiàng)
# cd /etc
# ee rc.conf
在最后加入如下幾行:
gateway_enable="YES"
static_routes="static1"
route_static1="-net 58.193.11x.0/21 172.16.252.x/30" //
說明第一個(gè)IP為內(nèi)網(wǎng)IP范圍;第二個(gè)IP為外網(wǎng)網(wǎng)卡的網(wǎng)關(guān)地址

6、    配置ipfilter
在/etc/rc.conf中加入:

ipfilter_enable="YES"
ipfilter_rules="/etc/ipf.conf"
然后編輯/etc/ipf.conf文件
# cd /etc/
# ee ipf.conf
內(nèi)容如下:
#環(huán)路網(wǎng)卡lo0 
#out in 全部通過

pass in quick on lo0 all
pass out quick on lo0 all

#
外網(wǎng)網(wǎng)卡vr0
#out 只讓開通的IP通訊

block out quick on vr0 from any to 192.168.0.0/16
block out quick on vr0 from any to 0.0.0.0/8
block out quick on vr0 from any to 169.254.0.0/8
block out quick on vr0 from any to 10.0.0.0/8
block out quick on vr0 from any to 127.16.0.0/12
block out quick on vr0 from any to 127.0.0.0/8
block out quick on vr0 from any to 192.0.2.0/24
block out quick on vr0 from any to 204.152.64.0/23
block out quick on vr0 from any to 224.0.0.0/3

#
開通58.193.112.1
pass out quick on vr0 proto tcp/udp from 58.193.112.1/32 to any keep state
pass out quick on vr0 proto icmp from 58.193.112.1/32 to any keep state

#開通
58.193.112.3
pass out quick on vr0 proto tcp/udp from 58.193.112.3/32 to any keep state
pass out quick on vr0 proto icmp from 58.193.112.3/32 to any keep state

#開通
58.193.113.1
pass out quick on vr0 proto tcp/udp from 58.193.113.1/32 to any keep state
pass out quick on vr0 proto icmp from 58.193.113.1/32 to any keep state

#開通
58.193.113.2
pass out quick on vr0 proto tcp/udp from 58.193.113.2/32 to any keep state
pass out quick on vr0 proto icmp from 58.193.113.2/32 to any keep state

block out on vr0 all

#in 阻止一些IP(比如私有IP)和一些病毒攻擊端口(如138139445等
)
block in quick on vr0 from 192.168.0.0/16 to any
block in quick on vr0 from 172.16.0.0/12 to any
block in quick on vr0 from 10.0.0.0/8 to any
block in quick on vr0 from 127.0.0.0/8 to any
block in quick on vr0 from 0.0.0.0/8 to any
block in quick on vr0 from 169.254.0.0/16 to any
block in quick on vr0 from 192.0.2.0/24 to any
block in quick on vr0 from 204.152.64.0/23 to any
block in quick on vr0 from 224.0.0.0/3 to any
block in quick on vr0 from 58.193.112.0/21 to any

block in quick on vr0 proto udp from any to any port = 69
block in quick on vr0 proto tcp/udp from any to any port = 135
block in quick on vr0 proto udp from any to any port = 137
block in quick on vr0 proto udp from any to any port = 138
block in quick on vr0 proto tcp/udp from any to any port = 139
block in quick on vr0 proto tcp/udp from any to any port = 445
block in quick on vr0 proto tcp/udp from any to any port = 593
block in quick on vr0 proto tcp from any to any port = 1022
block in quick on vr0 proto tcp from any to any port = 1023
block in quick on vr0 proto tcp from any to any port = 1025
block in quick on vr0 proto tcp from any port = 1034 to any port = 80
block in quick on vr0 proto tcp from any to any port = 1068
block in quick on vr0 proto tcp from any to any port = 1433
block in quick on vr0 proto udp from any to any port = 1434
block in quick on vr0 proto tcp from any to any port = 1871
block in quick on vr0 proto tcp from any to any port = 2745
block in quick on vr0 proto tcp from any to any port = 3208
block in quick on vr0 proto tcp from any to any port = 3127
block in quick on vr0 proto tcp from any to any port = 4331
block in quick on vr0 proto tcp from any to any port = 4334
block in quick on vr0 proto tcp from any to any port = 4444
block in quick on vr0 proto tcp from any port = 4444 to any
block in quick on vr0 proto tcp from any to any port = 4510
block in quick on vr0 proto tcp from any to any port = 4557
block in quick on vr0 proto tcp from any to any port = 5554
block in quick on vr0 proto tcp from any to any port = 5800
block in quick on vr0 proto tcp from any to any port = 5900
block in quick on vr0 proto tcp from any to any port = 6129
block in quick on vr0 proto tcp from any to any port = 6667
block in quick on vr0 proto tcp from any to any port = 9995
block in quick on vr0 proto tcp from any to any port = 9996
block in quick on vr0 proto tcp from any to any port = 10080

block in quick on vr0 all with frags
block in quick on vr0 proto tcp all with short
block in quick on vr0 all with opt lsrr
block in quick on vr0 all with opt ssrr
block in log first quick on vr0 proto tcp from any to any flags FUP
block in quick on vr0 all with ipopts

pass in quick on vr0 proto tcp from any to any port = 80 flags S keep state
pass in quick on vr0 proto tcp from any to any port = 23 flags S keep state
pass in quick on vr0 proto tcp from any to any port = 22 flags S keep state
pass in quick on vr0 proto tcp from any to any port = ftp flags S/SA keep state
pass in quick on vr0 proto tcp from any to any port = ftp-data flags S/SA keep state
pass in quick on vr0 proto tcp from any to any port 30000 >< 50001 flags S/SA keep state

pass in quick on vr0 proto icmp from any to any icmp-type 0
pass in quick on vr0 proto icmp from any to any icmp-type 11
block in log quick on vr0 proto icmp from any to any

block in log on vr0 all


#內(nèi)網(wǎng)網(wǎng)卡
vr1
#out 全部通過

pass out on vr1 all
#in
全部通過
pass in on vr1 all

配置完后重啟服務(wù)器。

找一臺(tái)客戶機(jī)測試,首先使用ipf.conf中開通的IP,然后ping edu.cn,可以ping通,說明可以連接外網(wǎng)了。
然后將IP設(shè)置為不是開通列表中的IP,如果ping不通,則說明ipf.conf的設(shè)置生效了。

相關(guān)文章

最新評論