Dang stupid gmail and your not replying to the list!

------------------------------
------------------------------------------------------------------------------------------------
iptables -L:
------------------------------------------------------------------------------------------------------------------------------
Chain INPUT (policy ACCEPT)
target     prot opt source               destination
ACCEPT     all  --  anywhere             anywhere            state
RELATED,ESTABLISHED
ACCEPT     all  --  anywhere             anywhere
syn_flood  tcp  --  anywhere             anywhere            tcp
flags:FIN,SYN,RST,ACK/SYN
input_rule  all  --  anywhere             anywhere
input      all  --  anywhere             anywhere

Chain FORWARD (policy DROP)
target     prot opt source               destination
zone_wan_MSSFIX  all  --  anywhere             anywhere
ACCEPT     all  --  anywhere             anywhere            state
RELATED,ESTABLISHED
forwarding_rule  all  --  anywhere             anywhere
forward    all  --  anywhere             anywhere
reject     all  --  anywhere             anywhere

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination
ACCEPT     all  --  anywhere             anywhere            state
RELATED,ESTABLISHED
ACCEPT     all  --  anywhere             anywhere
output_rule  all  --  anywhere             anywhere
output     all  --  anywhere             anywhere

Chain forward (1 references)
target     prot opt source               destination
zone_lan_forward  all  --  anywhere             anywhere
zone_wan_forward  all  --  anywhere             anywhere

Chain forwarding_lan (1 references)
target     prot opt source               destination

Chain forwarding_rule (1 references)
target     prot opt source               destination

Chain forwarding_wan (1 references)
target     prot opt source               destination

Chain input (1 references)
target     prot opt source               destination
zone_lan   all  --  anywhere             anywhere
zone_wan   all  --  anywhere             anywhere

Chain input_lan (1 references)
target     prot opt source               destination

Chain input_rule (1 references)
target     prot opt source               destination

Chain input_wan (1 references)
target     prot opt source               destination

Chain output (1 references)
target     prot opt source               destination
zone_lan_ACCEPT  all  --  anywhere             anywhere
zone_wan_ACCEPT  all  --  anywhere             anywhere

Chain output_rule (1 references)
target     prot opt source               destination

Chain reject (5 references)
target     prot opt source               destination
REJECT     tcp  --  anywhere             anywhere            reject-with
tcp-reset
REJECT     all  --  anywhere             anywhere            reject-with
icmp-port-unreachable

Chain syn_flood (1 references)
target     prot opt source               destination
RETURN     tcp  --  anywhere             anywhere            tcp
flags:FIN,SYN,RST,ACK/SYN limit: avg 25/sec burst 50
DROP       all  --  anywhere             anywhere

Chain zone_lan (1 references)
target     prot opt source               destination
input_lan  all  --  anywhere             anywhere
zone_lan_ACCEPT  all  --  anywhere             anywhere

Chain zone_lan_ACCEPT (2 references)
target     prot opt source               destination
ACCEPT     all  --  anywhere             anywhere
ACCEPT     all  --  anywhere             anywhere

Chain zone_lan_DROP (0 references)
target     prot opt source               destination
DROP       all  --  anywhere             anywhere
DROP       all  --  anywhere             anywhere

Chain zone_lan_MSSFIX (0 references)
target     prot opt source               destination
TCPMSS     tcp  --  anywhere             anywhere            tcp
flags:SYN,RST/SYN TCPMSS clamp to PMTU

Chain zone_lan_REJECT (1 references)
target     prot opt source               destination
reject     all  --  anywhere             anywhere
reject     all  --  anywhere             anywhere

Chain zone_lan_forward (1 references)
target     prot opt source               destination
zone_wan_ACCEPT  all  --  anywhere             anywhere
forwarding_lan  all  --  anywhere             anywhere
zone_lan_REJECT  all  --  anywhere             anywhere

Chain zone_wan (1 references)
target     prot opt source               destination
ACCEPT     udp  --  anywhere             anywhere            udp dpt:68
ACCEPT     icmp --  anywhere             anywhere            icmp
echo-request
input_wan  all  --  anywhere             anywhere
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:1221
zone_wan_REJECT  all  --  anywhere             anywhere

Chain zone_wan_ACCEPT (2 references)
target     prot opt source               destination
ACCEPT     all  --  anywhere             anywhere
ACCEPT     all  --  anywhere             anywhere

Chain zone_wan_DROP (0 references)
target     prot opt source               destination
DROP       all  --  anywhere             anywhere
DROP       all  --  anywhere             anywhere

Chain zone_wan_MSSFIX (1 references)
target     prot opt source               destination
TCPMSS     tcp  --  anywhere             anywhere            tcp
flags:SYN,RST/SYN TCPMSS clamp to PMTU

Chain zone_wan_REJECT (2 references)
target     prot opt source               destination
reject     all  --  anywhere             anywhere
reject     all  --  anywhere             anywhere

Chain zone_wan_forward (1 references)
target     prot opt source               destination
forwarding_wan  all  --  anywhere             anywhere
zone_wan_REJECT  all  --  anywhere             anywhere
------------------------------------------------------------------------------------------------------------------------------
iptables -t nat -L:
------------------------------------------------------------------------------------------------------------------------------
Chain PREROUTING (policy ACCEPT)
target     prot opt source               destination
zone_wan_prerouting  all  --  anywhere             anywhere
zone_lan_prerouting  all  --  anywhere             anywhere
prerouting_rule  all  --  anywhere             anywhere

Chain POSTROUTING (policy ACCEPT)
target     prot opt source               destination
postrouting_rule  all  --  anywhere             anywhere
zone_wan_nat  all  --  anywhere             anywhere

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination

Chain postrouting_rule (1 references)
target     prot opt source               destination

Chain prerouting_lan (1 references)
target     prot opt source               destination

Chain prerouting_rule (1 references)
target     prot opt source               destination

Chain prerouting_wan (1 references)
target     prot opt source               destination

Chain zone_lan_nat (0 references)
target     prot opt source               destination
MASQUERADE  all  --  anywhere             anywhere

Chain zone_lan_prerouting (1 references)
target     prot opt source               destination
prerouting_lan  all  --  anywhere             anywhere

Chain zone_wan_nat (1 references)
target     prot opt source               destination
MASQUERADE  all  --  anywhere             anywhere

Chain zone_wan_prerouting (1 references)
target     prot opt source               destination
prerouting_wan  all  --  anywhere             anywhere

On Thu, May 12, 2011 at 2:43 PM, Gene Cronk <[email protected]> wrote:
>
>> The outputs of
>> "iptables -L "
>> and
>> "iptables -t nat -L"
>> would likely help here.
>>
>> On Thu, May 12, 2011 at 2:31 PM, Paul Spicer <[email protected]>
>> wrote:
>> > Alright, I _THOUGHT_ I had it setup where I could access both SSH and
>> luci
>> > from WAN, but evidently I was wrong...
>> >
>> > Here's how I tested it. I set the WAN port with a static address
>> > (192.168.20.1) and set my machine up with a static address
>> (192.168.20.100)
>> > and plugged my machine into the WAN port. I wasn't able to connect
>> through
>> > HTTP, but I was able to SSH into the router.
>> >
>> > So then I took the router to work, set the WAN port for DHCP, and
>> plugged it
>> > into the network. It got an address of 192.168.1.40. From my
>> workstation, I
>> > was able to connect to the router with SSH, but still no HTTP.
>> >
>> > With the router disconnected from any WAN, I plugged my machine into one
>> of
>> > the LAN ports, got a DHCP address from the router and was able to
>> connect to
>> > it with SSH from both the internal address (192.168.77.9) and the
>> external
>> > WAN address it was still holding onto from the previous test
>> (192.168.1.40).
>> > I was also able to access the HTTP side with the internal address, but
>> not
>> > the external.
>> >
>> > Last night, I hooked this router up to my DSL at home and was unable to
>> > connect with SSH or HTTP from the external address. (It should be noted
>> that
>> > I have made no changes to the settings in the router, aside from setting
>> the
>> > WAN address to static and back to DHCP today.)
>> >
>> > The router I'm using right now is presently setup to forward requests on
>> > port 1221 to port 22 of my linux server. Given that THAT is working, I
>> don't
>> > believe my DSL gateway is blocking the traffic. (I changed the default
>> SSH
>> > port on the router to 1221 rather than 22 and I'm able to connect on
>> that
>> > port here at work while I'm testing it.)
>> >
>> > So I was thinking I need to setup a firewall rule to forward requests
>> from
>> > port 80 to the router's internal IP address, but that doesn't work,
>> either.
>> > Can anyone suggest what I'm doing wrong here? I'll gladly supply more
>> info
>> > as needed.
>> >
>>
>
>

Reply via email to