rsx windows XP - Mandrake 10 - Windows & Software
Marsh Posté le 04-03-2005 à 17:42:30
j'utilise shorwall comme firewall linux, est ce qu'il est fiable ?
Je me demande si c'est pas lui qui est la cause de mes soucis
Marsh Posté le 04-03-2005 à 17:44:47
le linux partage la connexion internet ou pas ?
si non, pourquoi mettre un firewall ?
Marsh Posté le 04-03-2005 à 00:56:25
bonjour,
j'ai installé un serveur linux mandrake 10 et 2 machine sous windows XP en rsx.
Déjà je n'arrive pas à voir mon linux sur les windows alors que j'ai configuré et lancé samba.
De plus, lorsque je transfert des données entre mes deux windows, c'est lents et fini par planter.
Avant j'arriver a voir mon linux mais j'ai du touché un paramètre par erreur.
Le plus étrange est que lors de transfert entre machine mes machine windows "perdent" les pédales et surtout le rsx -> plus de net, et plus de rsx.
Voila mes différentes config, n'hésitez pas a me demander d'autres infos qui pourrez vous aidez (et donc m'aider ) à résoudre mon problème.
A savoir, c'est mon linux qui partage le net (et ca marche).
Il est connecté au net sur eth0 et sur le rsx avec eth1.
Idem pour le ssh de linux qui ne marche pas alors que tout semble lancé
paramètres iptable ----------------
# Generated by iptables-save v1.2.9 on Fri Mar 4 01:52:13 2005
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
UTPUT DROP [0:0]
:all2all - [0:0]
:common - [0:0]
ynamic - [0:0]
:eth0_fwd - [0:0]
:eth0_in - [0:0]
:eth1_fwd - [0:0]
:eth1_in - [0:0]
:fw2net - [0:0]
:icmpdef - [0:0]
:loc2fw - [0:0]
:loc2net - [0:0]
:net2all - [0:0]
:net2fw - [0:0]
:newnotsyn - [0:0]
:reject - [0:0]
:shorewall - [0:0]
-A INPUT -i lo -j ACCEPT
-A INPUT -p ! icmp -m state --state INVALID -j DROP
-A INPUT -i eth0 -j eth0_in
-A INPUT -i eth1 -j eth1_in
-A INPUT -j common
-A INPUT -j LOG --log-prefix "Shorewall:INPUT:REJECT:" --log-level 6
-A INPUT -j reject
-A FORWARD -p ! icmp -m state --state INVALID -j DROP
-A FORWARD -i eth0 -j eth0_fwd
-A FORWARD -i eth1 -j eth1_fwd
-A FORWARD -j common
-A FORWARD -j LOG --log-prefix "Shorewall:FORWARD:REJECT:" --log-level 6
-A FORWARD -j reject
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -p ! icmp -m state --state INVALID -j DROP
-A OUTPUT -o eth0 -j fw2net
-A OUTPUT -o eth1 -j all2all
-A OUTPUT -j common
-A OUTPUT -j LOG --log-prefix "Shorewall:OUTPUT:REJECT:" --log-level 6
-A OUTPUT -j reject
-A all2all -m state --state RELATED,ESTABLISHED -j ACCEPT
-A all2all -p tcp -m state --state NEW -m tcp ! --tcp-flags SYN,RST,ACK SYN -j newnotsyn
-A all2all -j common
-A all2all -j LOG --log-prefix "Shorewall:all2all:REJECT:" --log-level 6
-A all2all -j reject
-A common -p icmp -j icmpdef
-A common -p udp -m udp --dport 135 -j reject
-A common -p udp -m udp --dport 137:139 -j reject
-A common -p udp -m udp --dport 445 -j reject
-A common -p tcp -m tcp --dport 139 -j reject
-A common -p tcp -m tcp --dport 445 -j reject
-A common -p tcp -m tcp --dport 135 -j reject
-A common -p udp -m udp --dport 1900 -j DROP
-A common -d 255.255.255.255 -j DROP
-A common -d 224.0.0.0/240.0.0.0 -j DROP
-A common -p tcp -m tcp --dport 113 -j reject
-A common -p udp -m udp --sport 53 -m state --state NEW -j DROP
-A eth0_fwd -m state --state NEW -j dynamic
-A eth0_fwd -o eth1 -j net2all
-A eth0_in -m state --state NEW -j dynamic
-A eth0_in -j net2fw
-A eth1_fwd -m state --state NEW -j dynamic
-A eth1_fwd -o eth0 -j loc2net
-A eth1_in -m state --state NEW -j dynamic
-A eth1_in -j loc2fw
-A fw2net -m state --state RELATED,ESTABLISHED -j ACCEPT
-A fw2net -p tcp -m state --state NEW -m tcp ! --tcp-flags SYN,RST,ACK SYN -j newnotsyn
-A fw2net -p tcp -m state --state NEW -m tcp --dport 80 -j ACCEPT
-A fw2net -j ACCEPT
-A loc2fw -m state --state RELATED,ESTABLISHED -j ACCEPT
-A loc2fw -p tcp -m state --state NEW -m tcp ! --tcp-flags SYN,RST,ACK SYN -j newnotsyn
-A loc2fw -p udp -m multiport --dports 137,138,139 -m state --state NEW -j ACCEPT
-A loc2fw -p tcp -m multiport --dports 80,443,22,20,21,23,137,138,139 -m state --state NEW -j ACCEPT
-A loc2fw -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A loc2fw -p tcp -m state --state NEW -m tcp --dport 3128 -j ACCEPT
-A loc2fw -j all2all
-A loc2net -m state --state RELATED,ESTABLISHED -j ACCEPT
-A loc2net -p tcp -m state --state NEW -m tcp ! --tcp-flags SYN,RST,ACK SYN -j newnotsyn
-A loc2net -j ACCEPT
-A net2all -m state --state RELATED,ESTABLISHED -j ACCEPT
-A net2all -p tcp -m state --state NEW -m tcp ! --tcp-flags SYN,RST,ACK SYN -j newnotsyn
-A net2all -j common
-A net2all -j LOG --log-prefix "Shorewall:net2all:DROP:" --log-level 6
-A net2all -j DROP
-A net2fw -m state --state RELATED,ESTABLISHED -j ACCEPT
-A net2fw -p tcp -m state --state NEW -m tcp ! --tcp-flags SYN,RST,ACK SYN -j newnotsyn
-A net2fw -p udp -m multiport --dports 137,138,139 -m state --state NEW -j ACCEPT
-A net2fw -p tcp -m multiport --dports 80,443,22,20,21,23,137,138,139 -m state --state NEW -j ACCEPT
-A net2fw -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A net2fw -j net2all
-A newnotsyn -j LOG --log-prefix "Shorewall:newnotsyn:DROP:" --log-level 6
-A newnotsyn -j DROP
-A reject -p tcp -j REJECT --reject-with tcp-reset
-A reject -p udp -j REJECT --reject-with icmp-port-unreachable
-A reject -p icmp -j REJECT --reject-with icmp-host-unreachable
-A reject -j REJECT --reject-with icmp-host-prohibited
COMMIT
# Completed on Fri Mar 4 01:52:13 2005
# Generated by iptables-save v1.2.9 on Fri Mar 4 01:52:13 2005
*mangle
REROUTING ACCEPT [24210:9040344]
:INPUT ACCEPT [23687:8865815]
:FORWARD ACCEPT [502:172266]
UTPUT ACCEPT [24952:8429822]
OSTROUTING ACCEPT [25451:8608304]
uttos - [0:0]
retos - [0:0]
-A PREROUTING -j pretos
-A OUTPUT -j outtos
-A outtos -p tcp -m tcp --dport 22 -j TOS --set-tos 0x10
-A outtos -p tcp -m tcp --sport 22 -j TOS --set-tos 0x10
-A outtos -p tcp -m tcp --dport 21 -j TOS --set-tos 0x10
-A outtos -p tcp -m tcp --sport 21 -j TOS --set-tos 0x10
-A outtos -p tcp -m tcp --sport 20 -j TOS --set-tos 0x08
-A outtos -p tcp -m tcp --dport 20 -j TOS --set-tos 0x08
-A pretos -p tcp -m tcp --dport 22 -j TOS --set-tos 0x10
-A pretos -p tcp -m tcp --sport 22 -j TOS --set-tos 0x10
-A pretos -p tcp -m tcp --dport 21 -j TOS --set-tos 0x10
-A pretos -p tcp -m tcp --sport 21 -j TOS --set-tos 0x10
-A pretos -p tcp -m tcp --sport 20 -j TOS --set-tos 0x08
-A pretos -p tcp -m tcp --dport 20 -j TOS --set-tos 0x08
COMMIT
# Completed on Fri Mar 4 01:52:13 2005
# Generated by iptables-save v1.2.9 on Fri Mar 4 01:52:13 2005
*nat
REROUTING ACCEPT [5020:362046]
OSTROUTING ACCEPT [4545:209426]
UTPUT ACCEPT [993:77490]
:eth0_masq - [0:0]
:loc_dnat - [0:0]
-A PREROUTING -i eth1 -j loc_dnat
-A POSTROUTING -o eth0 -j eth0_masq
-A eth0_masq -s 192.168.0.0/255.255.255.0 -j MASQUERADE
-A loc_dnat -p tcp -m tcp --dport 80 -j REDIRECT --to-ports 3128
COMMIT
# Completed on Fri Mar 4 01:52:13 2005
mon smb.conf
[global]
dns proxy = no
log file = /var/log/samba/log.%m
load printers = yes
smb passwd file = /etc/samba/smbpasswd
printing = cups
server string = Samba Server %v
socket options = TCP_NODELAY SO_RCVBUF=8192 SO_SNDBUF=8192
workgroup = MSHOME
map to guest = bad user
printcap name = cups
encrypt passwords = yes
security = user
printer admin = @adm
max log size = 50
hosts allow = 192.168.0. 127.
username map = /etc/samba/smbusers
[homes]
comment = Home Directories
browseable =no
writable = yes
valid users = phanou
[tmp]
comment = Phanou home
valid users = phanou
path = /home/phanou
writable = yes
configuration des carte rsx
eth0: negotiated 10baseT-FD, link ok
eth1: no autonegotiation,, link ok
merci de votre aide