linux 内网域名访问,内网用户通过域名访问内网服务器

[root@router sysconfig]# iptables-save

# Generated by iptables-save v1.2.11 on Thu Feb  5 10:57:35 2009

*filter

:INPUT ACCEPT [0:0]

:FORWARD ACCEPT [0:0]

:OUTPUT ACCEPT [1891:283703]

:RH-Firewall-1-INPUT - [0:0]

-A INPUT -p tcp -m tcp --dport 1723 -j ACCEPT

-A INPUT -p tcp -m tcp --dport 47 -j ACCEPT

-A INPUT -p gre -j ACCEPT

-A INPUT -j RH-Firewall-1-INPUT

-A FORWARD -j RH-Firewall-1-INPUT

-A RH-Firewall-1-INPUT -i ppp0 -j ACCEPT

-A RH-Firewall-1-INPUT -i ppp1 -j ACCEPT

-A RH-Firewall-1-INPUT -i ppp2 -j ACCEPT

-A RH-Firewall-1-INPUT -i ppp3 -j ACCEPT

-A RH-Firewall-1-INPUT -i ppp4 -j ACCEPT

-A RH-Firewall-1-INPUT -i ppp5 -j ACCEPT

-A RH-Firewall-1-INPUT -i ppp6 -j ACCEPT

-A RH-Firewall-1-INPUT -i ppp7 -j ACCEPT

-A RH-Firewall-1-INPUT -i ppp8 -j ACCEPT

-A RH-Firewall-1-INPUT -i ppp9 -j ACCEPT

-A RH-Firewall-1-INPUT -i ppp10 -j ACCEPT

-A RH-Firewall-1-INPUT -i eth1 -j ACCEPT

-A RH-Firewall-1-INPUT -i lo -j ACCEPT

-A RH-Firewall-1-INPUT -p icmp -m icmp --icmp-type any -j ACCEPT

-A RH-Firewall-1-INPUT -p ipv6-crypt -j ACCEPT

-A RH-Firewall-1-INPUT -p ipv6-auth -j ACCEPT

-A RH-Firewall-1-INPUT -d 224.0.0.251 -p udp -m udp --dport 5353 -j ACCEPT

-A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT

-A RH-Firewall-1-INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT

-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT

-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 8088 -j ACCEPT

-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 8080 -j ACCEPT

-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 25 -j ACCEPT

-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 110 -j ACCEPT

-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 80 -j ACCEPT

-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 7000 -j ACCEPT

-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited

COMMIT

# Completed on Thu Feb  5 10:57:35 2009

# Generated by iptables-save v1.2.11 on Thu Feb  5 10:57:35 2009

*nat

:PREROUTING ACCEPT [5466:394183]

:POSTROUTING ACCEPT [6:380]

:OUTPUT ACCEPT [1:76]

-A PREROUTING -d 218.80.193.59 -i eth0 -p udp -m udp --dport 5060 -j DNAT --to-destination 192.168.1.192

-A PREROUTING -d 218.80.193.59 -i eth0 -p udp -m udp --dport 15000:50000 -j DNAT --to-destination 192.168.1.192

-A PREROUTING -d 218.80.193.59 -i eth0 -p tcp -m tcp --dport 2222 -j DNAT --to-destination 192.168.1.168:22

-A PREROUTING -d 218.80.193.59 -i eth0 -p tcp -m tcp --dport 8822 -j DNAT --to-destination 192.168.1.18:22

-A PREROUTING -d 218.80.193.59 -i eth0 -p tcp -m tcp --dport 8088 -j DNAT --to-destination 192.168.1.172:8088

-A PREROUTING -d 218.80.193.59 -i eth0 -p tcp -m tcp --dport 7000 -j DNAT --to-destination 192.168.1.168:7000

-A PREROUTING -d 218.80.193.59 -i eth0 -p tcp -m tcp --dport 8080 -j DNAT --to-destination 192.168.1.168:8080

-A PREROUTING -d 218.80.193.59 -i eth0 -p tcp -m tcp --dport 25 -j DNAT --to-destination 192.168.1.18:25

-A PREROUTING -d 218.80.193.59 -i eth0 -p tcp -m tcp --dport 110 -j DNAT --to-destination 192.168.1.18:110

-A PREROUTING -d 218.80.193.59 -i eth0 -p tcp -m tcp --dport 80 -j DNAT --to-destination 192.168.1.18:80

-A PREROUTING -d 218.80.193.59 -i eth1 -p tcp -m tcp --dport 8080 -j DNAT --to-destination 192.168.1.168:8080

-A PREROUTING -d 218.80.193.59 -i eth1 -p tcp -m tcp --dport 80 -j DNAT --to-destination 192.168.1.18:80

-A PREROUTING -d 218.80.193.59 -i eth1 -p tcp -m tcp --dport 25 -j DNAT --to-destination 192.168.1.18:25

-A PREROUTING -d 218.80.193.59 -i eth1 -p tcp -m tcp --dport 110 -j DNAT --to-destination 192.168.1.18:110

-A POSTROUTING -s 192.168.0.0/255.255.0.0 -j SNAT --to-source 218.80.193.59

COMMIT

# Completed on Thu Feb  5 10:57:35 2009

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值