Anda di halaman 1dari 2

conn advancedTechCell

left=%defaultroute
leftsubnet=134.209.233.19/32
leftfirewall=yes
lefthostaccess=yes
right=186.3.220.228
rightsubnet=192.168.10.0/24
leftid=@ussd1
rightid=@ipfire.localdomain
type=tunnel
ike=aes256-md5-modp1024!
esp=aes256-md5-modp1024!
keyexchange=ikev2
ikelifetime=3h
keylife=1h
dpdaction=clear
dpddelay=30
dpdtimeout=120
authby=secret
auto=start

iptables -t nat -A POSTROUTING -s 192.168.10.0/24 -d 134.209.233.19/32 -j


MASQUERADE

10.100.2.200/21

Sep 17 22:15:27 ipfire vpn: client+ ussd1 10.100.2.201/32 == 134.209.233.19 --


192.168.2.19 == 192.168.10.0/24
Sep 17 22:15:27 ipfire vpn: tunnel+ 134.209.233.19 -- 192.168.2.19

Sep 17 22:16:41 ipfire vpn: client+ C=EC, O=samsung, CN=samsung 10.100.2.200/32 ==


45.236.169.232 -- 192.168.2.19 == 192.168.10.0/24
Sep 17 22:16:41 ipfire vpn: tunnel+ 45.236.169.232 -- 192.168.2.19

iptables -t nat -A POSTROUTING -s 192.168.5.0/24 -o eth0 -m policy --dir out --pol


ipsec -j ACCEPT
iptables -t nat -A POSTROUTING -s 192.168.5.0/24 -o eth0 -j MASQUERADE

route add -net 192.168.10.0/24 192.168.5.1

--list-all-zones List everything added for or enabled in all zones [P]


--list-all List everything added for or enabled in a zone [P] [Z]
--list-services List services added for a zone [P] [Z]
--list-ports List ports added for a zone [P] [Z]
--list-protocols List protocols added for a zone [P] [Z]
--list-source-ports List source ports added for a zone [P] [Z]
--list-icmp-blocks List Internet ICMP type blocks added for a zone [P] [Z]
--list-forward-ports List IPv4 forward ports added for a zone [P] [Z]
--list-rich-rules List rich language rules added for a zone [P] [Z]
--list-interfaces List interfaces that are bound to a zone [P] [Z]
--list-sources
[root@ussd1 ~]# firewall-cmd --list-all
public (active)
target: default
icmp-block-inversion: no
interfaces: eth0
sources:
services: ssh dhcpv6-client ipsec
ports: 500/udp 4500/udp 8080/tcp 3306/tcp 443/tcp 80/tcp 500/tcp 4500/tcp
protocols:
masquerade: yes
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule protocol value="esp" accept
rule protocol value="ah" accept
[root@ussd1 ~]# firewall-cmd --direct --get-all-rules
ipv4 nat POSTROUTING 0 -m policy --pol ipsec --dir out -j ACCEPT

"plink.exe" -batch -ssh -pw Kn@wc3lL01 root@134.209.233.19 "tcpdump -ni eth0 -s 0


-w -" | "D:\Program Files\Wireshark\Wireshark.exe" -k -i -
firewall-cmd --state

ip route show table 220


192.168.10.0/24 via 134.209.224.1 dev eth0 proto static src 192.168.5.1

Anda mungkin juga menyukai