Discuz!官方免费开源建站系统

 找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索

NETBSD+ADSL+IPF+QDNS

[复制链接]
fjuser 发表于 2009-1-19 12:41:05 | 显示全部楼层 |阅读模式
配置网卡的IP地址:
# vi /etc/ifconfig.rtk0
inet 192.168.0.1 netmask 255.255.255.0
# vi /etc/ifconfig.tlp0
inet 192.168.1.2 netmask 255.255.255.0
配置主机名:
# vi /etc/myname
netbsd
# vi /etc/hosts
127.0.0.1 localhost netbsd
配置DNS解析:
# vi /etc/resolv.conf
nameserver 202.99.160.68
nameserver 202.99.168.8
配置网关:
# vi /etc/mygate
192.168.0.10
配置主机本地解析:
# vi /etc/hosts
192.168.0.10 win2k
配置SSHD服务:
# vi /etc/rc.conf
sshd=YES
# vi /etc/ssh/sshd_config
PermitRootLogin yes
安装配置ADSL:
# pkg_add rp-pppoe-3.5.tgz
# mkdir /etc/ppp
# cp /usr/pkg/share/examples/rp-pppoe/pppoe.conf /etc/ppp/pppoe.conf
# vi /etc/ppp/pppoe.conf
PEERDNS=yes
CONNECT_TIMEOUT=30
PPPOE_TIMEOUT=80
PIDFILE="/tmp/$CF_BASE-adsl.pid"
# adsl-setup
# adsl-start
配置防火墙代理上网:
# vi /etc/ipf.conf
=================================/etc/ipf.conf==============================
# +-----------+   +------------------------------+   +------------------+
# | ADSL-Modem|---| ppp0 tlp0  NAT+IPF   rtk0 |---| Internal Network |
# +-----------+   +------------------------------+   +------------------+
#
# +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
# Interface: all
# Block all incoming and outgoing packets unless they're allowed later.
# +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
block in all
block out all
# Possibly dangerous: packets with ip-options, short and fragmented packets
block in log quick on ppp0 proto icmp from any to any
block in log quick all with short
block in log quick all with ipopts
block in log quick all with frag
block in log quick all with opt lsrr
block in log quick all with opt ssrr
# Local network traffic is allowed
pass out quick on lo0
pass in quick on lo0
pass out quick on rtk0
pass in quick on rtk0
# Block faked or unlikely "local" addresses
block in log body quick on ppp0 from 192.168.0.0/16 to any
block in log body quick on ppp0 from 172.16.0.0/12 to any
block in log body quick on ppp0 from 10.0.0.0/8 to any
block in log body quick on ppp0 from 192.0.2.0/24 to any
block in log body quick on ppp0 from 0.0.0.0/8 to any
block in log body quick on ppp0 from 127.0.0.0/8 to any
block in log body quick on ppp0 from 169.254.0.0/16 to any
block in log body quick on ppp0 from 224.0.0.0/3 to any
block in log body quick on ppp0 from 204.152.64.0/23 to any
# Blocking of outgoing faked or unlikely "internal" addresses
block out log body quick on ppp0 from any to 192.168.0.0/16
block out log body quick on ppp0 from any to 172.16.0.0/12
block out log body quick on ppp0 from any to 10.0.0.0/8
block out log body quick on ppp0 from any to 127.0.0.0/8
block out log body quick on ppp0 from any to 0.0.0.0/8
block out log body quick on ppp0 from any to 169.254.0.0/16
block out log body quick on ppp0 from any to 192.0.2.0/24
block out log body quick on ppp0 from any to 204.152.64.0/23
block out log body quick on ppp0 from any to 224.0.0.0/3
# The pass rules to enable Services
pass in on ppp0 proto tcp from any to any port = 20 flags S keep state
pass in on ppp0 proto tcp from any to any port = 21 flags S keep state
pass in on ppp0 proto tcp from any to any port = 22 flags S keep state
pass in on ppp0 proto tcp from any to any port = 25 flags S keep state
pass in on ppp0 proto tcp from any to any port = 80 flags S keep state
pass in on ppp0 proto tcp from any to any port = 110 flags S keep state
pass in on ppp0 proto tcp from any to any port = 443 flags S keep state
pass in on ppp0 proto tcp from any to any port 55000 >
# The general pass rules.
pass out quick on ppp0 proto tcp from any to any flags S/SAFR keep state keep frags
pass out quick on ppp0 proto udp from any to any keep state keep frags
pass out quick on ppp0 proto icmp from any to any keep state keep frags
=================================/etc/ipf.conf==============================
# vi /etc/sysctl.conf
net.inet.ip.forwarding=1
net.inet.tcp.mss_ifmtu=1
# vi /etc/ipnat.conf
map ppp0 192.168.0.0/16 -> 0/32 proxy port ftp ftp/tcp mssclamp 1440
map ppp0 192.168.0.0/16 -> 0/32 portmap tcp/udp auto mssclamp 1440
map ppp0 192.168.0.0/16 -> 0/32 mssclamp 1440
启用防火墙设置:
# vi /etc/defaults/rc.conf
ipfilter=YES       # uses /etc/ipf.conf
ipnat=YES        # uses /etc/ipnat.conf
ipfs=YES                ipfs_flags=""  # save/load ipnat and ipf states
ifwatchd=YES
配置动态域名更新:
# wget
http://www.3322.org/dyndnspage/ez-ipupdate-3.0.10.tgz
# tar zxvf ez-ipupdate-3.0.10.tgz
# cd ez-ipupdate-3.0.10
# vi conf_file.c
增加一行:
#include
# vi ez-ipupdate.c
注释掉下面几行(4515行):
//else
//  {
//   fprintf(stderr, "no update needed at this time\n");
//  }
# ./configure
# make
# make install
设置拨号后自动运行:
# vi /etc/ppp/ip-up
#!/bin/sh
/usr/local/bin/ez-ipupdate -i ppp0 -h nero.3322.org -S qdns -u llzqq:9335333
# chmod 700 /etc/ppp/ip-up


本文来自ChinaUnix博客,如果查看原文请点:http://blog.chinaunix.net/u/89/showart_1072216.html
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

手机版|小黑屋|Discuz! 官方站 ( 皖ICP备16010102号 )star

GMT+8, 2024-11-18 07:50 , Processed in 0.031826 second(s), 4 queries , Gzip On, Redis On.

Powered by Discuz! X3.4

Copyright © 2001-2023, Tencent Cloud.

快速回复 返回顶部 返回列表