Página 6 de 9 PrimeiroPrimeiro ... 23456789 ÚltimoÚltimo
+ Responder ao Tópico



  1. #26
    ThiagoOverseer
    #!/bin/sh
    #/sbin/rmmod ipchains
    # Inicializacao do IPTABLES
    /sbin/modprobe ipt_MASQUERADE
    /sbin/modprobe ip_conntrack_ftp
    /sbin/modprobe ip_nat_ftp
    #/sbin/modprobe ip_gre.o
    /sbin/modprobe ipip
    /sbin/iptables -F
    /sbin/iptables -t nat -F;
    /sbin/iptables -t mangle -F


    #
    #Sites proibidos
    #
    /sbin/iptables -A FORWARD -s 172.19.123.5/32 -d orkut - Login -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.3/32 -d orkut - Login -j ACCEPT
    /sbin/iptables -A FORWARD -d orkut - Login -j DROP
    /sbin/iptables -A FORWARD -d orkut.com -j DROP
    /sbin/iptables -A FORWARD -d www.meebo.com -j DROP
    /sbin/iptables -A FORWARD -d YouTube - Broadcast Yourself. -j DROP
    /sbin/iptables -A FORWARD -d .|.Dedada Digital.|. -j DROP
    /sbin/iptables -A FORWARD -d Search Results for "clubedaputaria.com" -j DROP
    /sbin/iptables -A FORWARD -d .::PLAYBLOG::.Seu Clube Diário de Putaria, Karina Bacchi,Danielle Sobreira, Flávia Alessandra na Playboy, Vivi Fernandez, Noiva Infiel, Márcia Imperator, clube dos desocupados, dedada digital, diario da putaria, daniela Cicarelli fudendo, clube da pu -j DROP
    /sbin/iptables -A FORWARD -d Diário da Putaria - www.diariodaputaria.com - Filme da Gretchen - La Conga Sex! -j DROP
    /sbin/iptables -A FORWARD -d Web Messenger ILoveIM.com -j DROP
    /sbin/iptables -A FORWARD -d mafiadospingaiadas.com -j DROP
    /sbin/iptables -A FORWARD -d : : : PLAYBOY.COM.BR : : : -j DROP
    /sbin/iptables -A FORWARD -d Online messaging with web and mobile e-messenger -j DROP
    /sbin/iptables -A FORWARD -d Web and Mobile messenger everywhere - eBuddy former e-messenger -j DROP
    /sbin/iptables -A FORWARD -d MSN2Go - Web-based MSN client, Web-based MSN Messenger client, MSN Java applet, Java MSN client -j DROP
    /sbin/iptables -A FORWARD -d MSN2Go.com.br - Seu MSN em qualquer lugar! -j DROP
    /sbin/iptables -A FORWARD -d Web Messenger - MessengerFX.com -j DROP
    /sbin/iptables -A FORWARD -d PowerScrap :: Quem manda é você! -j DROP
    /sbin/iptables -t nat -A POSTROUTING -o eth1 -j MASQUERADE
    #/sbin/iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 80 -j REDIRECT --to-port 3128

    #yahoo messenger

    /sbin/iptables -A FORWARD -p tcp -d scsa.msg.yahoo.com -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -p tcp --dport 5000:5100 -j REJECT
    /sbin/iptables -A FORWARD -p tcp -d scsa.msg.yahoo.com -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d cs.yahoo.com -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d scsa.yahoo.com -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d messenger.yahoo.com -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d http.msg.yahoo.com -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d webmessenger.msn.com -j REJECT
    #/sbin/iptables -A FORWARD -d Yahoo! Brasil -j REJECT
    /sbin/iptables -A FORWARD -d iloveim.com -j REJECT
    #/sbin/iptables -A FORWARD -d Yahoo! -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d msg.edit.yahoo.com -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d http.pager.yahoo.com -j REJECT
    /sbin/iptables -A FORWARD -d onlinemessenger.nl -j REJECT


    #Usina do som
    #
    /sbin/iptables -A INPUT -d 200.162.192.163 -j DROP
    /sbin/iptables -A FORWARD -d Sign In -j DROP

    # MSN Messenger

    /sbin/iptables -A FORWARD -s 172.19.123.3/32 -p tcp --dport 1863 -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.3/32 -d loginnet.passport.com -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.5/32 -p tcp --dport 1863 -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.5/32 -d loginnet.passport.com -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.39/32 -p tcp --dport 1863 -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.39/32 -d loginnet.passport.com -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.96/32 -p tcp --dport 1863 -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.96/32 -d loginnet.passport.com -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -p tcp --dport 1863 -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d loginnet.passport.com -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d gateway.messenger.hotmail.com -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d messenger.hotmail.com -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d login.passport.net -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d svcs.microsoft.com -j REJECT

    /sbin/iptables -A FORWARD -s 172.19.123.0/26 -d 207.46.104.20/24 -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.101/32 -d 207.46.104.20/24 -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.102/32 -d 207.46.104.20/24 -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.103/32 -d 207.46.104.20/24 -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.104/32 -d 207.46.104.20/24 -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.105/32 -d 207.46.104.20/24 -j ACCEPT

    #

    # Bloqueio de portas - KAZAA

    # /sbin/iptables -A OUTPUT -p TCP --dport 1000:5000 -j REJECT
    # /sbin/iptables -A FORWARD -d 213.248.112.0/24 -j REJECT
    # /sbin/iptables -A FORWARD -d 206.142.53.0/24 -j REJECT

    #Redirecionamento do Servidor Publico#
    /sbin/iptables -t nat -A PREROUTING -p tcp -d 200.174.28.194 --dport 80 -j DNAT --to 172.19.123.2:80
    /sbin/iptables -t nat -A PREROUTING -p tcp -d 200.174.28.194 --dport 5800 -j DNAT --to 172.19.123.11
    /sbin/iptables -t nat -A PREROUTING -p tcp -d 200.174.28.194 --dport 5900 -j DNAT --to 172.19.123.11
    /sbin/iptables -t nat -A POSTROUTING -s 172.19.123.0/24 -p tcp -d 172.19.123.1 --dport 80 -j SNAT --to 172.19.123.2
    /sbin/iptables -t nat -A PREROUTING -p tcp -d 200.174.28.194 --dport 20 -j DNAT --to 172.19.123.2
    /sbin/iptables -t nat -A PREROUTING -p tcp -d 200.174.28.194 --dport 21 -j DNAT --to 172.19.123.2


    #
    #NAT
    #
    /sbin/iptables -t nat -A POSTROUTING -s 172.19.123.0/24 -o eth0 -j SNAT --to 200.174.28.194
    /sbin/iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
    #
    # Habilita packet forwarding
    #
    echo 1 > /proc/sys/net/ipv4/ip_forward

    tai.. antes eu bloqueava tudo por iptables.. agora q to mexendo no squid..

  2. Faça assim.

    Crie um firewall para ficar aberto.

    Remova o squid e instale novamente.

    Crie acls básicas e depois vai adaptando as suas necessidades.



  3. #28
    ThiagoOverseer
    Criar um firewall pra ficar aberto? pra q? n entendi.. e eu nem sei fazer isso.. sou iniciante.. =[ vc pode me ajudar a fazer? se não for pedir muito..

  4. Bom , Primeira coisa.
    Não crie regras de firewall para bloquear sites. Assim seu firewall vai ficar grande e quanto menor seu firewall mais ele se tornará melhor.

    Para todo firewall você terá que determinar uma politica.
    Então quando um pacote estiver entrando no seu firewall ele vai ser tratado, se alguma regra permitir o acesso do pacote ele vai ser aceito e tratado dentro do firewall, caso não coincida com nenhuma regra que você criou ele será da POLITICA, ou seja, ela decidirá o que fazer.
    Para testes você está tentando configurar o squid e tem que ter um firewall nem que simples para realizar isso.
    Portanto, deixe as suas politicas abertas
    Pegue esse firewall aqui:


    #!/bin/bash
    ########################################

    echo # Realizando um Flush das Regras .

    /usr/sbin/iptables -t filter -F
    /usr/sbin/iptables -t filter -X
    /usr/sbin/iptables -t nat -F
    /usr/sbin/iptables -t nat -X
    /usr/sbin/iptables -t mangle -F
    /usr/sbin/iptables -t mangle -X

    ########################################

    ### Limpando Regras

    echo "# Limpando as Regras: "

    $IPTABLES -Z
    $IPTABLES -X
    $IPTABLES -F
    $IPTABLES -t filter -F
    $IPTABLES -t filter -X
    $IPTABLES -t filter -Z
    $IPTABLES -F INPUT
    $IPTABLES -F OUTPUT
    $IPTABLES -F FORWARD
    $IPTABLES -t nat -F
    $IPTABLES -t nat -X
    $IPTABLES -t nat -Z
    $IPTABLES -t mangle -F
    $IPTABLES -t mangle -X
    $IPTABLES -t mangle -Z

    ### Definindo Politica
    echo "# Definindo Politica: "

    $IPTABLES -t filter -P INPUT ACCEPT
    $IPTABLES -t filter -P FORWARD ACCEPT
    $IPTABLES -t filter -P OUTPUT ACCEPT
    # O CERTO É DEIXAR A POLITICA FORWARD COMO DROP E SOMENTE O OUTPUT # ACCEPT

    $IPTABLES -t nat -P PREROUTING ACCEPT
    $IPTABLES -t nat -P POSTROUTING ACCEPT
    $IPTABLES -t nat -P OUTPUT ACCEPT
    $IPTABLES -t mangle -P PREROUTING ACCEPT
    $IPTABLES -t mangle -P INPUT ACCEPT
    $IPTABLES -t mangle -P OUTPUT ACCEPT
    $IPTABLES -t mangle -P FORWARD ACCEPT

    ### Carregando Módulos

    echo "# Iniciando Firewall: "
    modprobe ip_conntrack_ftp
    modprobe ip_nat_ftp
    modprobe ipt_MASQUERADE

    echo "# Permitindo Regras ao FwL: "

    #Liberando pacotes que realmente devem estabelecer conexão.
    iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
    iptables -A OUTPUT -m state --state ESTABLISHED,RELATED,NEW -j ACCEPT
    iptables -A FORWARD -m state --state ESTABLISHED,RELATED,NEW -j ACCEPT

    echo "# Permitindo Regras ao FwL: "

    #Liberando pacotes que realmente devem estabelecer conexão.
    iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
    iptables -A OUTPUT -m state --state ESTABLISHED,RELATED,NEW -j ACCEPT
    iptables -A FORWARD -m state --state ESTABLISHED,RELATED,NEW -j ACCEPT

    /usr/sbin/iptables -A INPUT -i lo -j ACCEPT
    /usr/sbin/iptables -A INPUT -s 192.168.1.0/255.255.255.0 -j ACCEPT
    /usr/sbin/iptables -A INPUT -p tcp --dport 22 -j ACCEPT
    /usr/sbin/iptables -A INPUT -p udp --dport 53 -j ACCEPT
    /usr/sbin/iptables -A INPUT -p tcp --syn -m limit --limit 5/s -j ACCEPT

    # Redirecionando as conexões da porta 80 para a do proxy 3128
    iptables -t nat -A PREROUTING -p tcp -s 192.168.1.0/255.255.255.0 --dport 80 -j REDIRECT --to-ports 3128

    #compartilhando a web na rede interna
    iptables -t nat -A POSTROUTING -s 192.168.1.0/255.255.255.0 -o eth0 -j MASQUERADE
    echo 1 > /proc/sys/net/ipv4/ip_forward



  5. Citação Postado originalmente por ThiagoOverseer Ver Post
    #/sbin/rmmod ipchains
    # Inicializacao do IPTABLES
    /sbin/modprobe ipt_MASQUERADE
    /sbin/modprobe ip_conntrack_ftp
    /sbin/modprobe ip_nat_ftp
    #/sbin/modprobe ip_gre.o
    /sbin/modprobe ipip
    /sbin/iptables -F
    #/sbin/iptables -t nat -F;
    /sbin/iptables -t mangle -F


    #
    #Sites proibidos
    #
    /sbin/iptables -A FORWARD -s 172.19.123.5/32 -d orkut - Login -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.3/32 -d orkut - Login -j ACCEPT
    /sbin/iptables -A FORWARD -d orkut - Login -j DROP
    /sbin/iptables -A FORWARD -d orkut.com -j DROP
    /sbin/iptables -A FORWARD -d www.meebo.com -j DROP
    /sbin/iptables -A FORWARD -d YouTube - Broadcast Yourself. -j DROP
    /sbin/iptables -A FORWARD -d .|.Dedada Digital.|. -j DROP
    /sbin/iptables -A FORWARD -d Search Results for "clubedaputaria.com" -j DROP
    /sbin/iptables -A FORWARD -d .::PLAYBLOG::.Seu Clube Diário de Putaria, Karina Bacchi,Danielle Sobreira, Flávia Alessandra na Playboy, Vivi Fernandez, Noiva Infiel, Márcia Imperator, clube dos desocupados, dedada digital, diario da putaria, daniela Cicarelli fudendo, clube da pu -j DROP
    /sbin/iptables -A FORWARD -d Diário da Putaria - www.diariodaputaria.com - Filme da Gretchen - La Conga Sex! -j DROP
    /sbin/iptables -A FORWARD -d Web Messenger ILoveIM.com -j DROP
    /sbin/iptables -A FORWARD -d mafiadospingaiadas.com -j DROP
    /sbin/iptables -A FORWARD -d : : : PLAYBOY.COM.BR : : : -j DROP
    /sbin/iptables -A FORWARD -d Online messaging with web and mobile e-messenger -j DROP
    /sbin/iptables -A FORWARD -d Web and Mobile messenger everywhere - eBuddy former e-messenger -j DROP
    /sbin/iptables -A FORWARD -d MSN2Go - Web-based MSN client, Web-based MSN Messenger client, MSN Java applet, Java MSN client -j DROP
    /sbin/iptables -A FORWARD -d MSN2Go.com.br - Seu MSN em qualquer lugar! -j DROP
    /sbin/iptables -A FORWARD -d Web Messenger - MessengerFX.com -j DROP
    /sbin/iptables -A FORWARD -d PowerScrap :: Quem manda é você! -j DROP
    /sbin/iptables -t nat -A POSTROUTING -o eth1 -j MASQUERADE
    #/sbin/iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 80 -j REDIRECT --to-port 3128

    #yahoo messenger

    /sbin/iptables -A FORWARD -p tcp -d scsa.msg.yahoo.com -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -p tcp --dport 5000:5100 -j REJECT
    /sbin/iptables -A FORWARD -p tcp -d scsa.msg.yahoo.com -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d cs.yahoo.com -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d scsa.yahoo.com -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d messenger.yahoo.com -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d http.msg.yahoo.com -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d webmessenger.msn.com -j REJECT
    #/sbin/iptables -A FORWARD -d Yahoo! Brasil -j REJECT
    /sbin/iptables -A FORWARD -d iloveim.com -j REJECT
    #/sbin/iptables -A FORWARD -d Yahoo! -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d msg.edit.yahoo.com -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d http.pager.yahoo.com -j REJECT
    /sbin/iptables -A FORWARD -d onlinemessenger.nl -j REJECT


    #Usina do som
    #
    /sbin/iptables -A INPUT -d 200.162.192.163 -j DROP
    /sbin/iptables -A FORWARD -d Sign In -j DROP

    # MSN Messenger

    /sbin/iptables -A FORWARD -s 172.19.123.3/32 -p tcp --dport 1863 -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.3/32 -d loginnet.passport.com -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.5/32 -p tcp --dport 1863 -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.5/32 -d loginnet.passport.com -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.39/32 -p tcp --dport 1863 -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.39/32 -d loginnet.passport.com -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.96/32 -p tcp --dport 1863 -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.96/32 -d loginnet.passport.com -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -p tcp --dport 1863 -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d loginnet.passport.com -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d gateway.messenger.hotmail.com -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d messenger.hotmail.com -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d login.passport.net -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.0/24 -d svcs.microsoft.com -j REJECT

    /sbin/iptables -A FORWARD -s 172.19.123.0/26 -d 207.46.104.20/24 -j REJECT
    /sbin/iptables -A FORWARD -s 172.19.123.101/32 -d 207.46.104.20/24 -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.102/32 -d 207.46.104.20/24 -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.103/32 -d 207.46.104.20/24 -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.104/32 -d 207.46.104.20/24 -j ACCEPT
    /sbin/iptables -A FORWARD -s 172.19.123.105/32 -d 207.46.104.20/24 -j ACCEPT

    #

    # Bloqueio de portas - KAZAA

    # /sbin/iptables -A OUTPUT -p TCP --dport 1000:5000 -j REJECT
    # /sbin/iptables -A FORWARD -d 213.248.112.0/24 -j REJECT
    # /sbin/iptables -A FORWARD -d 206.142.53.0/24 -j REJECT

    #Redirecionamento do Servidor Publico#
    /sbin/iptables -t nat -A PREROUTING -p tcp -d 200.174.28.194 --dport 80 -j DNAT --to 172.19.123.2:80
    /sbin/iptables -t nat -A PREROUTING -p tcp -d 200.174.28.194 --dport 5800 -j DNAT --to 172.19.123.11
    /sbin/iptables -t nat -A PREROUTING -p tcp -d 200.174.28.194 --dport 5900 -j DNAT --to 172.19.123.11
    /sbin/iptables -t nat -A POSTROUTING -s 172.19.123.0/24 -p tcp -d 172.19.123.1 --dport 80 -j SNAT --to 172.19.123.2
    /sbin/iptables -t nat -A PREROUTING -p tcp -d 200.174.28.194 --dport 20 -j DNAT --to 172.19.123.2
    /sbin/iptables -t nat -A PREROUTING -p tcp -d 200.174.28.194 --dport 21 -j DNAT --to 172.19.123.2


    #
    #NAT
    #
    /sbin/iptables -t nat -A POSTROUTING -s 172.19.123.0/24 -o eth0 -j SNAT --to 200.174.28.194
    /sbin/iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
    #
    # Habilita packet forwarding
    #
    echo 1 > /proc/sys/net/ipv4/ip_forward

    tai.. antes eu bloqueava tudo por iptables.. agora q to mexendo no squid..

    Você já observou esse trecho comentado ...

    /sbin/iptables -t nat -A POSTROUTING -o eth1 -j MASQUERADE
    #/sbin/iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 80 -j REDIRECT --to-port 3128

    se sim, (foi a nível de teste)

    faça o seguinte.

    crie um script com a regra simples de mascaramento e proxy transparente.
    para ver se não tem algum problema em suas regras ...

    -------------------------------------------- Script de Nat ----------------------------------------

    #!/bin/sh

    # Carregando os modulos

    /sbin/modprobe ip_tables
    /sbin/modprobe ipt_REDIRECT
    /sbin/modprobe ipt_MASQUERADE
    /sbin/modprobe ipt_MARK
    /sbin/modprobe ipt_REJECT
    /sbin/modprobe ipt_TOS
    /sbin/modprobe ipt_LOG
    /sbin/modprobe iptable_mangle
    /sbin/modprobe iptable_filter
    /sbin/modprobe iptable_nat
    /sbin/modprobe ip_nat_ftp
    /sbin/modprobe ip_conntrack
    /sbin/modprobe ip_conntrack_ftp
    /sbin/modprobe ip_conntrack_irc
    /sbin/modprobe ip_nat_irc
    /sbin/modprobe ipt_mac
    /sbin/modprobe ipt_state
    /sbin/modprobe ipt_mark

    # limpando as regras

    /sbin/iptables -F
    /sbin/iptables -X
    /sbin/iptables -F -t nat
    /sbin/iptables -X -t nat
    /sbin/iptables -F -t mangle
    /sbin/iptables -X -t mangle

    echo "Desabilita Encaminhamento de Pacotes do Kernel - OK"

    echo 0 > /proc/sys/net/ipv4/ip_forward

    echo "Iniciando Nat - OK"

    /sbin/iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -j MASQUERADE
    /sbin/iptables -t nat -A PREROUTING -s 192.168.0.0/24 -p tcp --dport 80 -j REDIRECT --to-port 3128

    echo "Habilitando Encaminhamento de Pacotes do Kernel - OK"

    echo 1 > /proc/sys/net/ipv4/ip_forward

    #----------------------------------------------------- FIM -------------------------------------------------------


    Falow ...

    qualque resultado posta ai ...






Tópicos Similares

  1. log do sendmail nao ta funcionando
    Por mcclaudio no fórum Servidores de Rede
    Respostas: 0
    Último Post: 22-07-2004, 09:29
  2. Bloqueio por Mac/IP não tá funcionando direito no iptables
    Por gustavo_marcon no fórum Servidores de Rede
    Respostas: 7
    Último Post: 15-03-2004, 11:36
  3. autenticação squid nao esta funcionando
    Por muganga no fórum Servidores de Rede
    Respostas: 6
    Último Post: 18-02-2004, 12:50
  4. Respostas: 10
    Último Post: 11-06-2003, 07:20
  5. acl no squid não está funcionando. O que fazer ?
    Por no fórum Servidores de Rede
    Respostas: 3
    Último Post: 20-12-2002, 16:01

Visite: BR-Linux ·  VivaOLinux ·  Dicas-L