Jump to content

Redhat 5.3 Iptables & Squid 2.6


BoloM
 Share

Recommended Posts

Witam serdecznie,

Mam REDHAT 5.3 IPTABLES & SQUID 2.6. I niby działa wszystko ok. Strony sie ładują i nie było jakiś większych problemów z Internetem. Do czasu. Uzywamy aplikacji bankowych poprzez strony WWW opartych na JAVA. Przestały działać. Konfig Squida jest tak zrobiony by tylko cache'ował. Nic nie powinien blokować. Na IPTABLES także mam ustawione że ma wszsytko być przepuszczane choć już sam nie jestem pewien. Okazuje sie oprócz tego przestały działaś Radia Internetowe oraz GG.

Czy koledzy i koleżanki z forum pomoga mi w rozwiązaniu problemu?

Poniżej przedstawie konfig firewala oraz Squida.

 

Firewall:

*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [107401:68361863]
:RH-Firewall-1-INPUT - [0:0]
-A INPUT -p tcp -m tcp --dport 3128 -j ACCEPT
-A INPUT -j RH-Firewall-1-INPUT
-A FORWARD -j RH-Firewall-1-INPUT
-A RH-Firewall-1-INPUT -i lo -j ACCEPT
-A RH-Firewall-1-INPUT -p icmp -m icmp --icmp-type any -j ACCEPT
-A RH-Firewall-1-INPUT -p esp -j ACCEPT
-A RH-Firewall-1-INPUT -p ah -j ACCEPT
-A RH-Firewall-1-INPUT -d 224.0.0.251 -p udp -m udp --dport 5353 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m tcp --dport 631 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 3128 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 80 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 443 -j ACCEPT
-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
COMMIT
# Completed on Thu Oct 22 16:10:05 2009
# Generated by iptables-save v1.3.5 on Thu Oct 22 16:10:05 2009
*nat
:PREROUTING ACCEPT [2918:155618]
:POSTROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [2239:134399]
-A PREROUTING -s 10.10.0.0/255.255.0.0 -p tcp -m tcp --dport 80 -j REDIRECT --to-ports 3128
-A POSTROUTING -j MASQUERADE
COMMIT

 

Squid:

acl all src 0.0.0.0/0.0.0.0
acl manager proto cache_object
acl localhost src 127.0.0.1/255.255.255.255
acl to_localhost dst 127.0.0.0/8
acl SSL_ports port 443
acl Safe_ports port 80          # http
acl Safe_ports port 21          # ftp
acl Safe_ports port 443         # https
acl Safe_ports port 70          # gopher
acl Safe_ports port 210         # wais
acl Safe_ports port 1025-65535  # unregistered ports
acl Safe_ports port 280         # http-mgmt
acl Safe_ports port 488         # gss-http
acl Safe_ports port 591         # filemaker
acl Safe_ports port 777         # multiling http
acl CONNECT method CONNECT

http_access allow manager localhost
http_access deny manager

http_access deny !Safe_ports
http_access deny CONNECT !SSL_ports

http_access deny to_localhost

http_access allow all

icp_access allow all

http_port 3128 transparent

hierarchy_stoplist cgi-bin ?

cache_dir ufs /var/spool/squid 60000 16 256

maximum_object_size 800000 KB

client_netmask 255.255.255.255

acl QUERY urlpath_regex cgi-bin \?
cache deny QUERY

refresh_pattern ^ftp:           1440    20%     10080
refresh_pattern ^gopher:        1440    0%      1440
refresh_pattern .               0       20%     4320

negative_dns_ttl 1 minute

negative_ttl 5 minutes

via off

client_persistent_connections off
forwarded_for off

Link to comment
Share on other sites

  • 5 weeks later...
  • 3 months later...

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

×
×
  • Create New...