|
Hi,
I wanted to thank every one helping me on this.
With H323 patch Netmeeting worked very well, I didn't have any
problem.
I downloaded the 2.4.18 kernel and check out
the latest CVS source from netfilter. applied the base ( newnat-13) and
extra patch.
then I followed this link
I used this script.
#!/bin/bash
set -xv
EXT="eth0"
INT="eth1" LO="lo"
INTIP="192.168.1.49"
ANY="Any/0" PRIVP="0:1023" UNPRI="1024:65535"
echo 1 >
/proc/sys/net/ipv4/tcp_syncookies
for f in /proc/sys/net/ipv4/conf/*/rp_filter; do echo 1 > f done echo 1 >
/proc/sys/net/ipv4/ip_forward
iptables -P INPUT DROP
iptables -P OUTPUT DROP iptables -P FORWARD DROP
iptables -X iptables -F iptables -t nat -F iptables -t nat -X iptables -A INPUT -i $INT -j
ACCEPT
iptables -P OUTPUT DROP iptables -P FORWARD DROP
iptables -X iptables -F iptables -t nat -F iptables -t nat -X iptables -A INPUT -i $INT -j
ACCEPT
iptables -A OUTPUT -o $INT -j ACCEPT iptables -A FORWARD -i $INT -j ACCEPT iptables -A FORWARD -o $INT -j ACCEPT iptables -A INPUT -i $LO -j
ACCEPT
iptables -A OUTPUT -o $LO -j ACCEPT iptables -t nat -A POSTROUTING -o $EXT -j
MASQUERADE
iptables -A FORWARD -i $EXT -m state --state ESTABLISHED,RELATED -j ACCEPT iptables -A FORWARD -i $EXT -m state --state NEW -j ACCEPT iptables -A OUTPUT -o $EXT -p udp --sport
1024:65535 --dport 53 -j ACCEPT
iptables -A INPUT -i $EXT -p udp --sport 53 --dport 1024:65535 -j ACCEPT iptables -A OUTPUT -o $EXT -p tcp --sport $UNPRI --dport 53 -j ACCEPT iptables -A INPUT -i $EXT -p tcp --sport 53 --dport $UNPRI -j ACCEPT iptables -A FORWARD -i $EXT -p tcp --dport 113
--syn -j REJECT
iptables -A INPUT -j LOG --log-prefix "input
"
iptables -A OUTPUT -j LOG --log-prefix "output " iptables -A FORWARD -j LOG --log-prefix "forward " Thanks
-SR
|
- RE: H323, Netmeeting Success Sundaram Ramasamy
- RE: H323, Netmeeting Success Sebastian Wolfgarten
- Re: H323, Netmeeting Success Derrik Pates
