Hi, 
 
I wanted to thank every one helping me on this. With H323 patch Netmeeting worked very well, I didn't have any problem.
 
 
I downloaded the 2.4.18 kernel and  check out the latest CVS source from netfilter. applied the base ( newnat-13) and extra patch.
 
then  I followed this link 
 
 
 
I used this script.
 
#!/bin/bash
set -xv
 
EXT="eth0"
INT="eth1"
 
LO="lo"
 
INTIP="192.168.1.49"
ANY="Any/0"
PRIVP="0:1023"
 
UNPRI="1024:65535"
 
echo 1 > /proc/sys/net/ipv4/tcp_syncookies
for f in /proc/sys/net/ipv4/conf/*/rp_filter; do
        echo 1 > f
done
 
echo 1 > /proc/sys/net/ipv4/ip_forward
 
iptables -P INPUT DROP
iptables -P OUTPUT DROP
 
iptables -P FORWARD DROP
iptables -X
iptables -F
iptables -t nat -F
iptables -t nat -X
 
iptables -A INPUT   -i $INT -j ACCEPT
iptables -P OUTPUT DROP
 
iptables -P FORWARD DROP
iptables -X
iptables -F
iptables -t nat -F
iptables -t nat -X
 
iptables -A INPUT   -i $INT -j ACCEPT
iptables -A OUTPUT  -o $INT -j ACCEPT
iptables -A FORWARD -i $INT -j ACCEPT
iptables -A FORWARD -o $INT -j ACCEPT
 
iptables -A INPUT  -i $LO -j ACCEPT
iptables -A OUTPUT -o $LO -j ACCEPT
 
iptables -t nat -A POSTROUTING -o $EXT -j MASQUERADE
iptables -A FORWARD -i $EXT -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A FORWARD -i $EXT -m state --state NEW -j ACCEPT
 
iptables -A OUTPUT -o $EXT -p udp --sport 1024:65535 --dport 53 -j ACCEPT
iptables -A INPUT  -i $EXT -p udp --sport 53 --dport 1024:65535 -j ACCEPT
iptables -A OUTPUT -o $EXT -p tcp --sport $UNPRI --dport 53 -j ACCEPT
iptables -A INPUT  -i $EXT -p tcp --sport 53 --dport $UNPRI -j ACCEPT
 
iptables -A FORWARD -i $EXT -p tcp --dport 113 --syn -j REJECT
 
iptables -A INPUT -j LOG --log-prefix "input "
iptables -A OUTPUT -j LOG --log-prefix "output "
iptables -A FORWARD -j LOG --log-prefix "forward "
 
 
 
 
 
 
Thanks
-SR

Reply via email to