sudo iptables -L -v -n
Chain INPUT (policy DROP 4 packets, 176 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 127.0.0.1 127.0.0.1
0 0 ACCEPT tcp -- * * [ip] 0.0.0.0/0 tcp dpt:53
1134 85077 ACCEPT udp -- * * [ip] 0.0.0.0/0 udp dpt:53
0 0 ACCEPT tcp -- * * [ip] 0.0.0.0/0 tcp dpt:23
0 0 ACCEPT udp -- * * [ip] 0.0.0.0/0 udp dpt:23
0 0 LOG all -- eth1 * 10.0.0.0/8 0.0.0.0/0 limit: avg 3/sec burst 5 LOG flags 0 level 6 prefix "FIREWALL: Spoofing - 10. --"
0 0 DROP all -- eth1 * 10.0.0.0/8 0.0.0.0/0
0 0 LOG all -- eth1 * 172.16.0.0/16 0.0.0.0/0 limit: avg 3/sec burst 5 LOG flags 0 level 6 prefix "FIREWALL: Spoofing - 172.16. "
0 0 DROP all -- eth1 * 172.16.0.0/16 0.0.0.0/0
0 0 LOG all -- eth1 * 192.168.0.0/16 0.0.0.0/0 limit: avg 3/sec burst 5 LOG flags 0 level 6 prefix "FIREWALL: Spoofing - 192.168."
0 0 DROP all -- eth1 * 192.168.0.0/16 0.0.0.0/0
75 4300 ACCEPT tcp -- eth1 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
0 0 ACCEPT udp -- eth1 * 0.0.0.0/0 0.0.0.0/0 udp dpt:80
0 0 ACCEPT tcp -- eth1 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443
0 0 ACCEPT udp -- eth1 * 0.0.0.0/0 0.0.0.0/0 udp dpt:443
0 0 ACCEPT tcp -- eth1 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:25
0 0 ACCEPT tcp -- * * [ip] 0.0.0.0/0 tcp dpt:8787
0 0 ACCEPT udp -- * * [ip] 0.0.0.0/0 udp dpt:8787
17867 2142K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
4 176 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 3 LOG flags 0 level 6 prefix "Firewall: INPUT --"
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 127.0.0.1 127.0.0.1
0 0 ACCEPT tcp -- * * [ip] 0.0.0.0/0 tcp dpt:53
0 0 ACCEPT udp -- * * [ip] 0.0.0.0/0 udp dpt:53
29 1616 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x17/0x02 limit: avg 2/sec burst 5
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 8 limit: avg 1/sec burst 5
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443
0 0 ACCEPT tcp -- * * 0.0.0.0/0 [ip] tcp dpt:25
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 3 LOG flags 0 level 6 prefix "Firewall: FORWARD --"
Chain OUTPUT (policy ACCEPT 1 packets, 40 bytes)
pkts bytes target prot opt in out source destination
3312 411K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
1 40 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 3 LOG flags 0 level 6 prefix "Firewall: OUTPUT --"
sudo iptables -t nat -L -v -n
Chain PREROUTING (policy ACCEPT 9598 packets, 851K bytes)
pkts bytes target prot opt in out source destination
17 948 DNAT tcp -- * * 0.0.0.0/0 [ip_valido] tcp dpt:80 to:[ip]:80
0 0 DNAT tcp -- * * 0.0.0.0/0 [ip_valido] tcp dpt:443 to:[ip]:443
2 96 DNAT tcp -- * * 0.0.0.0/0 [ip_valido] tcp dpt:25 to:[ip]:25
0 0 REDIRECT tcp -- * * [ip] 0.0.0.0/0 tcp dpt:80 redir ports 8787
0 0 REDIRECT udp -- * * [ip] 0.0.0.0/0 udp dpt:80 redir ports 8787
Chain INPUT (policy ACCEPT 9107 packets, 824K bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 1854 packets, 154K bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 1854 packets, 154K bytes)
pkts bytes target prot opt in out source destination
17 948 SNAT tcp -- * * 0.0.0.0/0 [ip] tcp dpt:80 to:[ip_valido]
0 0 SNAT tcp -- * * 0.0.0.0/0 [ip] tcp dpt:443 to:[ip_valido]
2 96 SNAT tcp -- * * 0.0.0.0/0 [ip] tcp dpt:25 to:[ip_valido]
0 0 MASQUERADE all -- * eth1 [ip] 0.0.0.0/0
0 0 MASQUERADE all -- * eth1 [ip] 0.0.0.0/0
0 0 MASQUERADE all -- * eth1 [ip] 0.0.0.0/0
0 0 MASQUERADE all -- * eth1 [ip] 0.0.0.0/0
0 0 MASQUERADE all -- * eth1 [ip] 0.0.0.0/0
0 0 MASQUERADE all -- * eth1 [ip] 0.0.0.0/0
0 0 MASQUERADE all -- * eth1 [ip] 0.0.0.0/0
0 0 MASQUERADE all -- * eth1 [ip] 0.0.0.0/0
0 0 MASQUERADE tcp -- * eth1 [ip] 0.0.0.0/0 tcp dpt:21
0 0 MASQUERADE udp -- * eth1 [ip] 0.0.0.0/0 udp dpt:21
0 0 MASQUERADE tcp -- * eth1 [ip] 0.0.0.0/0 tcp dpt:22
0 0 MASQUERADE udp -- * eth1 [ip] 0.0.0.0/0 udp dpt:22
0 0 MASQUERADE tcp -- * eth1 [ip] 0.0.0.0/0 tcp dpt:25
0 0 MASQUERADE udp -- * eth1 [ip] 0.0.0.0/0 udp dpt:25
0 0 MASQUERADE tcp -- * eth1 [ip] 0.0.0.0/0 tcp dpt:80
0 0 MASQUERADE udp -- * eth1 [ip] 0.0.0.0/0 udp dpt:80
0 0 MASQUERADE tcp -- * eth1 [ip] 0.0.0.0/0 tcp dpt:110
0 0 MASQUERADE udp -- * eth1 [ip] 0.0.0.0/0 udp dpt:110
0 0 MASQUERADE tcp -- * eth1 [ip] 0.0.0.0/0 tcp dpt:143
0 0 MASQUERADE udp -- * eth1 [ip] 0.0.0.0/0 udp dpt:143
0 0 MASQUERADE tcp -- * eth1 [ip] 0.0.0.0/0 tcp dpt:443
0 0 MASQUERADE udp -- * eth1 [ip] 0.0.0.0/0 udp dpt:443
0 0 MASQUERADE tcp -- * eth1 [ip] 0.0.0.0/0 tcp dpt:445
0 0 MASQUERADE udp -- * eth1 [ip] 0.0.0.0/0 udp dpt:445
0 0 MASQUERADE tcp -- * eth1 [ip] 0.0.0.0/0 tcp dpt:465
0 0 MASQUERADE udp -- * eth1 [ip] 0.0.0.0/0 udp dpt:465
0 0 MASQUERADE tcp -- * eth1 [ip] 0.0.0.0/0 tcp dpt:995
0 0 MASQUERADE udp -- * eth1 [ip] 0.0.0.0/0 udp dpt:995
0 0 MASQUERADE tcp -- * eth1 [ip] 0.0.0.0/0 tcp dpt:587
0 0 MASQUERADE udp -- * eth1 [ip] 0.0.0.0/0 udp dpt:587
0 0 MASQUERADE tcp -- * eth1 [ip] 0.0.0.0/0 tcp dpt:1863
0 0 MASQUERADE udp -- * eth1 [ip] 0.0.0.0/0 udp dpt:1863
0 0 MASQUERADE tcp -- * eth1 [ip] 0.0.0.0/0 tcp dpt:2631
0 0 MASQUERADE udp -- * eth1 [ip] 0.0.0.0/0 udp dpt:2631
0 0 MASQUERADE tcp -- * eth1 [ip] 0.0.0.0/0 tcp dpt:3389
0 0 MASQUERADE udp -- * eth1 [ip] 0.0.0.0/0 udp dpt:3389
0 0 MASQUERADE tcp -- * eth1 [ip] 0.0.0.0/0 tcp dpt:8080
0 0 MASQUERADE udp -- * eth1 [ip] 0.0.0.0/0 udp dpt:8080
0 0 MASQUERADE tcp -- * eth1 [ip] 0.0.0.0/0 tcp dpt:8787
0 0 MASQUERADE udp -- * eth1 [ip] 0.0.0.0/0 udp dpt:8787