# Generated by iptables-save v1.4.12 on Mon Jul 2 21:31:05 2012
*filter
:FORWARD ACCEPT [0:0]
:INPUT DROP [0:0]
:OUTPUT ACCEPT [0:0]
# Drop Hack
-A INPUT -s 66.249.73.15 -j DROP
-A INPUT -s 218.200.142.162 -j DROP
-A INPUT -s 77.247.181.0/24 -j DROP
-A INPUT -s 109.207.206.0/24 -j DROP
# Drop Error
-A INPUT -m state --state INVALID -j DROP
-A FORWARD -m state --state INVALID -j DROP
# Port Skaner
-A INPUT -p tcp -m state --tcp-flags ALL ALL --state NEW -j DROP
-A INPUT -p tcp -m state --tcp-flags ALL NONE --state NEW -j DROP
# drop netbios netbios
-A INPUT -p udp -m udp -i eth0 --dport 137:138 -j DROP
# drop MC
-A INPUT -d 224.0.0.1/32 -j DROP
-A OUTPUT -d 224.0.0.1/32 -j DROP
-A FORWARD -d 224.0.0.1/32 -j DROP
# Accept traffic from internal interfaces
-A INPUT ! -i eth0 -j ACCEPT
# Accept traffic with the ACK flag set
-A INPUT -p tcp -m tcp --tcp-flags ACK ACK -j ACCEPT
# Allow incoming data that is part of a connection we established
-A INPUT -m state --state ESTABLISHED -j ACCEPT
# Allow data that is related to existing connections
-A INPUT -m state --state RELATED -j ACCEPT
# Accept responses to DNS queries
-A INPUT -p udp -m udp --dport 1024:65535 --sport 53 -j ACCEPT
# Accept responses to our pings
-A INPUT -p icmp -m icmp --icmp-type echo-reply -j ACCEPT
# Accept notifications of unreachable hosts
-A INPUT -p icmp -m icmp --icmp-type destination-unreachable -j ACCEPT
# Accept notifications to reduce sending speed
-A INPUT -p icmp -m icmp --icmp-type source-quench -j ACCEPT
# Accept notifications of lost packets
-A INPUT -p icmp -m icmp --icmp-type time-exceeded -j ACCEPT
# Accept notifications of protocol problems
-A INPUT -p icmp -m icmp --icmp-type parameter-problem -j ACCEPT
# Hub
-A INPUT -p tcp -m tcp --dport 411 -j ACCEPT
# Allow connections to our SSH server
-A INPUT -p tcp -m tcp -s 178.150.158.0/24 --dport 22 -j ACCEPT
-A INPUT -p tcp -m tcp -s 159.224.39.0/24 --dport 22 -j ACCEPT
-A INPUT -p tcp -m tcp -s 109.87.66.0/24 --dport 22 -j ACCEPT
# Allow connections to our Webmin server
-A INPUT -p tcp -m tcp -s 159.224.39.0/24 --dport 777 -j ACCEPT
-A INPUT -p tcp -m tcp -s 178.150.158.0/24 --dport 777 -j ACCEPT
-A INPUT -p tcp -m tcp -s 109.87.66.0/24 --dport 777 -j ACCEPT
# WWW
-A INPUT -p tcp -m tcp -m multiport -j ACCEPT --dports 80,443
-A OUTPUT -p tcp -m tcp -m multiport -j ACCEPT --sports 80,443
# Max Connect
-A INPUT -p udp -m hashlimit --dport 411:420 -j ACCEPT --hashlimit 15/s --hashlimit-burst 15 --hashlimit-mode srcip --hashlimit-name HUB
-A INPUT -p udp --dport 411:420 -j DROP
-A INPUT -p udp -m hashlimit --dport 80 -j ACCEPT --hashlimit 15/s --hashlimit-burst 15 --hashlimit-mode srcip --hashlimit-name HUB
-A INPUT -p udp --dport 80 -j DROP
COMMIT
# Completed on Mon Jul 2 21:31:05 2012
# Generated by iptables-save v1.4.12 on Mon Jul 2 21:31:05 2012
*mangle
:PREROUTING ACCEPT [217:9370]
:INPUT ACCEPT [217:9370]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [233:69145]
:POSTROUTING ACCEPT [233:69145]
COMMIT
# Completed on Mon Jul 2 21:31:05 2012
# Generated by iptables-save v1.4.12 on Mon Jul 2 21:31:05 2012
*nat
:PREROUTING ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
# Redirect Hub
-A PREROUTING -p tcp -m tcp -d 178.150.158.64 --dport 412:420 -j REDIRECT --to-ports 411
COMMIT
# Completed on Mon Jul 2 21:31:05 2012