Re: Не могу пробиться к серверу
Добавлено: 24 окт 2014, 14:23
покажите выхлоп
iptables -L -vn
то что вы его отключили, не значит что правила не остались
iptables -L -vn
то что вы его отключили, не значит что правила не остались
Код: Выделить всё
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
93542 112M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
638 349K ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
4597 619K INPUT_direct all -- * * 0.0.0.0/0 0.0.0.0/0
4597 619K INPUT_ZONES_SOURCE all -- * * 0.0.0.0/0 0.0.0.0/0
4597 619K INPUT_ZONES all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
4597 619K REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 FORWARD_direct all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FORWARD_IN_ZONES_SOURCE all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FORWARD_IN_ZONES all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FORWARD_OUT_ZONES_SOURCE all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FORWARD_OUT_ZONES all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
Chain OUTPUT (policy ACCEPT 17848 packets, 2098K bytes)
pkts bytes target prot opt in out source destination
65146 6369K OUTPUT_direct all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD_IN_ZONES (1 references)
pkts bytes target prot opt in out source destination
0 0 FWDI_public all -- wlp2s0 * 0.0.0.0/0 0.0.0.0/0 [goto]
0 0 FWDI_public all -- + * 0.0.0.0/0 0.0.0.0/0 [goto]
Chain FORWARD_IN_ZONES_SOURCE (1 references)
pkts bytes target prot opt in out source destination
Chain FORWARD_OUT_ZONES (1 references)
pkts bytes target prot opt in out source destination
0 0 FWDO_public all -- * wlp2s0 0.0.0.0/0 0.0.0.0/0 [goto]
0 0 FWDO_public all -- * + 0.0.0.0/0 0.0.0.0/0 [goto]
Chain FORWARD_OUT_ZONES_SOURCE (1 references)
pkts bytes target prot opt in out source destination
Chain FORWARD_direct (1 references)
pkts bytes target prot opt in out source destination
Chain FWDI_public (2 references)
pkts bytes target prot opt in out source destination
0 0 FWDI_public_log all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FWDI_public_deny all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FWDI_public_allow all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FWDI_public_allow (1 references)
pkts bytes target prot opt in out source destination
Chain FWDI_public_deny (1 references)
pkts bytes target prot opt in out source destination
Chain FWDI_public_log (1 references)
pkts bytes target prot opt in out source destination
Chain FWDO_public (2 references)
pkts bytes target prot opt in out source destination
0 0 FWDO_public_log all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FWDO_public_deny all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FWDO_public_allow all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FWDO_public_allow (1 references)
pkts bytes target prot opt in out source destination
Chain FWDO_public_deny (1 references)
pkts bytes target prot opt in out source destination
Chain FWDO_public_log (1 references)
pkts bytes target prot opt in out source destination
Chain INPUT_ZONES (1 references)
pkts bytes target prot opt in out source destination
2729 379K IN_public all -- wlp2s0 * 0.0.0.0/0 0.0.0.0/0 [goto]
0 0 IN_public all -- + * 0.0.0.0/0 0.0.0.0/0 [goto]
Chain INPUT_ZONES_SOURCE (1 references)
pkts bytes target prot opt in out source destination
Chain INPUT_direct (1 references)
pkts bytes target prot opt in out source destination
Chain IN_public (2 references)
pkts bytes target prot opt in out source destination
4597 619K IN_public_log all -- * * 0.0.0.0/0 0.0.0.0/0
4597 619K IN_public_deny all -- * * 0.0.0.0/0 0.0.0.0/0
4597 619K IN_public_allow all -- * * 0.0.0.0/0 0.0.0.0/0
Chain IN_public_allow (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW
Chain IN_public_deny (1 references)
pkts bytes target prot opt in out source destination
Chain IN_public_log (1 references)
pkts bytes target prot opt in out source destination
Chain OUTPUT_direct (1 references)
pkts bytes target prot opt in out source destination
Так вот и разбирайтесь в том почему он не отвечает. Выполняйте траблшут по шагам, читайте о том "как это работает" и все получится.khorn7sk писал(а):а вот астерикс не одного в ответ так и не отослал
Таких постов тут сотни, в Инете миллионы, но кого бы это трогало... ведь проще снова спросить вместо того чтобы поискать.khorn7sk писал(а):нашел ответ как делать tcpdump в вашем же посте в другой темке
Код: Выделить всё
iptables -I INPUT 3 -p udp --dport 5060 -s 192.168.0.0/24 -j ACCEPT
Код: Выделить всё
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
2036 1663K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
3 204 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
139 23297 INPUT_direct all -- * * 0.0.0.0/0 0.0.0.0/0
139 23297 INPUT_ZONES_SOURCE all -- * * 0.0.0.0/0 0.0.0.0/0
139 23297 INPUT_ZONES all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
139 23297 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
0 0 ACCEPT udp -- * * 192.168.0.0/24 0.0.0.0/0 udp dpt:5060
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 FORWARD_direct all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FORWARD_IN_ZONES_SOURCE all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FORWARD_IN_ZONES all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FORWARD_OUT_ZONES_SOURCE all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FORWARD_OUT_ZONES all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
Chain OUTPUT (policy ACCEPT 18 packets, 992 bytes)
pkts bytes target prot opt in out source destination
2012 261K OUTPUT_direct all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD_IN_ZONES (1 references)
pkts bytes target prot opt in out source destination
0 0 FWDI_public all -- wlp2s0 * 0.0.0.0/0 0.0.0.0/0 [goto]
0 0 FWDI_public all -- + * 0.0.0.0/0 0.0.0.0/0 [goto]
Chain FORWARD_IN_ZONES_SOURCE (1 references)
pkts bytes target prot opt in out source destination
Chain FORWARD_OUT_ZONES (1 references)
pkts bytes target prot opt in out source destination
0 0 FWDO_public all -- * wlp2s0 0.0.0.0/0 0.0.0.0/0 [goto]
0 0 FWDO_public all -- * + 0.0.0.0/0 0.0.0.0/0 [goto]
Chain FORWARD_OUT_ZONES_SOURCE (1 references)
pkts bytes target prot opt in out source destination
Chain FORWARD_direct (1 references)
pkts bytes target prot opt in out source destination
Chain FWDI_public (2 references)
pkts bytes target prot opt in out source destination
0 0 FWDI_public_log all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FWDI_public_deny all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FWDI_public_allow all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FWDI_public_allow (1 references)
pkts bytes target prot opt in out source destination
Chain FWDI_public_deny (1 references)
pkts bytes target prot opt in out source destination
Chain FWDI_public_log (1 references)
pkts bytes target prot opt in out source destination
Chain FWDO_public (2 references)
pkts bytes target prot opt in out source destination
0 0 FWDO_public_log all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FWDO_public_deny all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FWDO_public_allow all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FWDO_public_allow (1 references)
pkts bytes target prot opt in out source destination
Chain FWDO_public_deny (1 references)
pkts bytes target prot opt in out source destination
Chain FWDO_public_log (1 references)
pkts bytes target prot opt in out source destination
Chain INPUT_ZONES (1 references)
pkts bytes target prot opt in out source destination
139 23297 IN_public all -- wlp2s0 * 0.0.0.0/0 0.0.0.0/0 [goto]
0 0 IN_public all -- + * 0.0.0.0/0 0.0.0.0/0 [goto]
Chain INPUT_ZONES_SOURCE (1 references)
pkts bytes target prot opt in out source destination
Chain INPUT_direct (1 references)
pkts bytes target prot opt in out source destination
Chain IN_public (2 references)
pkts bytes target prot opt in out source destination
139 23297 IN_public_log all -- * * 0.0.0.0/0 0.0.0.0/0
139 23297 IN_public_deny all -- * * 0.0.0.0/0 0.0.0.0/0
139 23297 IN_public_allow all -- * * 0.0.0.0/0 0.0.0.0/0
Chain IN_public_allow (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW
Chain IN_public_deny (1 references)
pkts bytes target prot opt in out source destination
Chain IN_public_log (1 references)
pkts bytes target prot opt in out source destination
Chain OUTPUT_direct (1 references)
pkts bytes target prot opt in out source destination
Код: Выделить всё
16:45:55.414831 IP (tos 0x0, ttl 128, id 24245, offset 0, flags [none], proto UDP (17), length 562)
192.168.0.66.63438 > 192.168.0.132.sip: SIP, length: 534
REGISTER sip:192.168.0.132 SIP/2.0
Via: SIP/2.0/UDP 192.168.0.66:63438;branch=z9hG4bK-d8754z-2cc2c7471595025a-1---d8754z-;rport
Max-Forwards: 70
Contact: <sip:100@192.168.0.66:63438;rinstance=eaf4185d80a45fa7>
To: "100"<sip:100@192.168.0.132>
From: "100"<sip:100@192.168.0.132>;tag=f975063f
Call-ID: MDhjYjIyOTJjYTAyMDU3Njk0MDkwYmU1ODk5MGE5ZDM
CSeq: 1 REGISTER
Expires: 3600
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO
User-Agent: X-Lite 4.7.1 74247-f080bb91-W6.1
Content-Length: 0
16:45:55.931879 IP (tos 0x0, ttl 128, id 24246, offset 0, flags [none], proto UDP (17), length 562)
192.168.0.66.63438 > 192.168.0.132.sip: SIP, length: 534
REGISTER sip:192.168.0.132 SIP/2.0
Via: SIP/2.0/UDP 192.168.0.66:63438;branch=z9hG4bK-d8754z-2cc2c7471595025a-1---d8754z-;rport
Max-Forwards: 70
Contact: <sip:100@192.168.0.66:63438;rinstance=eaf4185d80a45fa7>
To: "100"<sip:100@192.168.0.132>
From: "100"<sip:100@192.168.0.132>;tag=f975063f
Call-ID: MDhjYjIyOTJjYTAyMDU3Njk0MDkwYmU1ODk5MGE5ZDM
CSeq: 1 REGISTER
Expires: 3600
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO
User-Agent: X-Lite 4.7.1 74247-f080bb91-W6.1
Content-Length: 0
16:45:56.911892 IP (tos 0x0, ttl 128, id 24248, offset 0, flags [none], proto UDP (17), length 562)
192.168.0.66.63438 > 192.168.0.132.sip: SIP, length: 534
REGISTER sip:192.168.0.132 SIP/2.0
Via: SIP/2.0/UDP 192.168.0.66:63438;branch=z9hG4bK-d8754z-2cc2c7471595025a-1---d8754z-;rport
Max-Forwards: 70
Contact: <sip:100@192.168.0.66:63438;rinstance=eaf4185d80a45fa7>
To: "100"<sip:100@192.168.0.132>
From: "100"<sip:100@192.168.0.132>;tag=f975063f
Call-ID: MDhjYjIyOTJjYTAyMDU3Njk0MDkwYmU1ODk5MGE5ZDM
CSeq: 1 REGISTER
Expires: 3600
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO
User-Agent: X-Lite 4.7.1 74247-f080bb91-W6.1
Content-Length: 0
16:45:58.914408 IP (tos 0x0, ttl 128, id 24249, offset 0, flags [none], proto UDP (17), length 562)
192.168.0.66.63438 > 192.168.0.132.sip: SIP, length: 534
REGISTER sip:192.168.0.132 SIP/2.0
Via: SIP/2.0/UDP 192.168.0.66:63438;branch=z9hG4bK-d8754z-2cc2c7471595025a-1---d8754z-;rport
Max-Forwards: 70
Contact: <sip:100@192.168.0.66:63438;rinstance=eaf4185d80a45fa7>
To: "100"<sip:100@192.168.0.132>
From: "100"<sip:100@192.168.0.132>;tag=f975063f
Call-ID: MDhjYjIyOTJjYTAyMDU3Njk0MDkwYmU1ODk5MGE5ZDM
CSeq: 1 REGISTER
Expires: 3600
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO
User-Agent: X-Lite 4.7.1 74247-f080bb91-W6.1
Content-Length: 0
16:46:02.913472 IP (tos 0x0, ttl 128, id 24250, offset 0, flags [none], proto UDP (17), length 562)
192.168.0.66.63438 > 192.168.0.132.sip: SIP, length: 534
REGISTER sip:192.168.0.132 SIP/2.0
Via: SIP/2.0/UDP 192.168.0.66:63438;branch=z9hG4bK-d8754z-2cc2c7471595025a-1---d8754z-;rport
Max-Forwards: 70
Contact: <sip:100@192.168.0.66:63438;rinstance=eaf4185d80a45fa7>
To: "100"<sip:100@192.168.0.132>
From: "100"<sip:100@192.168.0.132>;tag=f975063f
Call-ID: MDhjYjIyOTJjYTAyMDU3Njk0MDkwYmU1ODk5MGE5ZDM
CSeq: 1 REGISTER
Expires: 3600
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO
User-Agent: X-Lite 4.7.1 74247-f080bb91-W6.1
Content-Length: 0
16:46:06.914100 IP (tos 0x0, ttl 128, id 24253, offset 0, flags [none], proto UDP (17), length 562)
192.168.0.66.63438 > 192.168.0.132.sip: SIP, length: 534
REGISTER sip:192.168.0.132 SIP/2.0
Via: SIP/2.0/UDP 192.168.0.66:63438;branch=z9hG4bK-d8754z-2cc2c7471595025a-1---d8754z-;rport
Max-Forwards: 70
Contact: <sip:100@192.168.0.66:63438;rinstance=eaf4185d80a45fa7>
To: "100"<sip:100@192.168.0.132>
From: "100"<sip:100@192.168.0.132>;tag=f975063f
Call-ID: MDhjYjIyOTJjYTAyMDU3Njk0MDkwYmU1ODk5MGE5ZDM
CSeq: 1 REGISTER
Expires: 3600
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO
User-Agent: X-Lite 4.7.1 74247-f080bb91-W6.1
Content-Length: 0
16:46:10.922468 IP (tos 0x0, ttl 128, id 24254, offset 0, flags [none], proto UDP (17), length 562)
192.168.0.66.63438 > 192.168.0.132.sip: SIP, length: 534
REGISTER sip:192.168.0.132 SIP/2.0
Via: SIP/2.0/UDP 192.168.0.66:63438;branch=z9hG4bK-d8754z-2cc2c7471595025a-1---d8754z-;rport
Max-Forwards: 70
Contact: <sip:100@192.168.0.66:63438;rinstance=eaf4185d80a45fa7>
To: "100"<sip:100@192.168.0.132>
From: "100"<sip:100@192.168.0.132>;tag=f975063f
Call-ID: MDhjYjIyOTJjYTAyMDU3Njk0MDkwYmU1ODk5MGE5ZDM
CSeq: 1 REGISTER
Expires: 3600
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO
User-Agent: X-Lite 4.7.1 74247-f080bb91-W6.1
Content-Length: 0
16:46:14.915848 IP (tos 0x0, ttl 128, id 24255, offset 0, flags [none], proto UDP (17), length 562)
192.168.0.66.63438 > 192.168.0.132.sip: SIP, length: 534
REGISTER sip:192.168.0.132 SIP/2.0
Via: SIP/2.0/UDP 192.168.0.66:63438;branch=z9hG4bK-d8754z-2cc2c7471595025a-1---d8754z-;rport
Max-Forwards: 70
Contact: <sip:100@192.168.0.66:63438;rinstance=eaf4185d80a45fa7>
To: "100"<sip:100@192.168.0.132>
From: "100"<sip:100@192.168.0.132>;tag=f975063f
Call-ID: MDhjYjIyOTJjYTAyMDU3Njk0MDkwYmU1ODk5MGE5ZDM
CSeq: 1 REGISTER
Expires: 3600
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO
User-Agent: X-Lite 4.7.1 74247-f080bb91-W6.1
Content-Length: 0
16:46:18.913600 IP (tos 0x0, ttl 128, id 24314, offset 0, flags [none], proto UDP (17), length 562)
192.168.0.66.63438 > 192.168.0.132.sip: SIP, length: 534
REGISTER sip:192.168.0.132 SIP/2.0
Via: SIP/2.0/UDP 192.168.0.66:63438;branch=z9hG4bK-d8754z-2cc2c7471595025a-1---d8754z-;rport
Max-Forwards: 70
Contact: <sip:100@192.168.0.66:63438;rinstance=eaf4185d80a45fa7>
To: "100"<sip:100@192.168.0.132>
From: "100"<sip:100@192.168.0.132>;tag=f975063f
Call-ID: MDhjYjIyOTJjYTAyMDU3Njk0MDkwYmU1ODk5MGE5ZDM
CSeq: 1 REGISTER
Expires: 3600
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO
User-Agent: X-Lite 4.7.1 74247-f080bb91-W6.1
Content-Length: 0
16:46:22.918235 IP (tos 0x0, ttl 128, id 24322, offset 0, flags [none], proto UDP (17), length 562)
192.168.0.66.63438 > 192.168.0.132.sip: SIP, length: 534
REGISTER sip:192.168.0.132 SIP/2.0
Via: SIP/2.0/UDP 192.168.0.66:63438;branch=z9hG4bK-d8754z-2cc2c7471595025a-1---d8754z-;rport
Max-Forwards: 70
Contact: <sip:100@192.168.0.66:63438;rinstance=eaf4185d80a45fa7>
To: "100"<sip:100@192.168.0.132>
From: "100"<sip:100@192.168.0.132>;tag=f975063f
Call-ID: MDhjYjIyOTJjYTAyMDU3Njk0MDkwYmU1ODk5MGE5ZDM
CSeq: 1 REGISTER
Expires: 3600
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO
User-Agent: X-Lite 4.7.1 74247-f080bb91-W6.1
Content-Length: 0
16:46:26.928704 IP (tos 0x0, ttl 128, id 24325, offset 0, flags [none], proto UDP (17), length 562)
192.168.0.66.63438 > 192.168.0.132.sip: SIP, length: 534
REGISTER sip:192.168.0.132 SIP/2.0
Via: SIP/2.0/UDP 192.168.0.66:63438;branch=z9hG4bK-d8754z-2cc2c7471595025a-1---d8754z-;rport
Max-Forwards: 70
Contact: <sip:100@192.168.0.66:63438;rinstance=eaf4185d80a45fa7>
To: "100"<sip:100@192.168.0.132>
From: "100"<sip:100@192.168.0.132>;tag=f975063f
Call-ID: MDhjYjIyOTJjYTAyMDU3Njk0MDkwYmU1ODk5MGE5ZDM
CSeq: 1 REGISTER
Expires: 3600
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO
User-Agent: X-Lite 4.7.1 74247-f080bb91-W6.1
Content-Length: 0
16:46:59.444991 IP (tos 0x0, ttl 128, id 24333, offset 0, flags [DF], proto TCP (6), length 52)
192.168.0.66.63439 > 192.168.0.132.sip: Flags [S], cksum 0xcdf3 (correct), seq 765511127, win 8192, options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
16:47:02.445025 IP (tos 0x0, ttl 128, id 24335, offset 0, flags [DF], proto TCP (6), length 52)
192.168.0.66.63439 > 192.168.0.132.sip: Flags [S], cksum 0xcdf3 (correct), seq 765511127, win 8192, options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
16:47:08.42
после этого ко мне по 5060 порту не проходят не какие пакеты вообщеVlad1983 писал(а):после такого выхлопа iptables -L -vn вопросы ещё есть?Код: Выделить всё
iptables -I INPUT 3 -p udp --dport 5060 -s 192.168.0.0/24 -j ACCEPT
а есть:-A, --append цепочка определение-правила
Добавить одно или несколько правил в конец указанной цепочки. Если имя источника и/или стока (назначения) соответствует нескольким адресам, правило будет добавлено для всех возможных комбинаций адресов.
-I, --insert цепочка [номер-правила]
определение-правила" В указанной цепочке вставить одно или более правил в позицию заданную номером. Так, если указан номер 1, правило или правила будут вставлены в начало цепочки. Это подразумеваемая позиция, если номер не указан.
Соответственно я бы выполнил:--line-numbers
Режим вывода номеров строк при отображении списка правил командой --list. Номер строки соответствует позиции правила в цепочке.
Код: Выделить всё
iptables -L -n -v --line-numbers
Firewall проходит по правилам сверху вниз, а раз так то при таком порядке правил до ACCEPT пакет просто не доберется, т.к. предыдущий REJECT его отбросит.139 23297 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
0 0 ACCEPT udp -- * * 192.168.0.0/24 0.0.0.0/0 udp dpt:5060