Ами абсолютно същото е като при IPCLASSIFY версията единстевенното, което съм променил е,че си пограх с тези редове в fw.init
# Local traffic is considered BG
`$ipt -t mangle -A FORWARD -i $INT_ETH -o $EXT_ETH -j BG_IN`;
`$ipt -t mangle -A FORWARD -i $EXT_ETH -o $INT_ETH -j BG_OUT`;
в момента са проемнени от
`$ipt -t mangle -A FORWARD -i $INT_ETH -o $INT_ETH -j BG_IN`;
`$ipt -t mangle -A FORWARD -i $INT_ETH -o $INT_ETH -j BG_OUT`;
и другото е, че взимам сорса с бг мрежите от
http://ipacct.com/ просто съм променил update_bgnets да взима мрежите от там, но не вярвам това да е проблем за ъплоад-а
ами...ето и изхода от iptables -nxvL
Chain INPUT (policy ACCEPT 1336 packets, 379182 bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy DROP 406 packets, 44044 bytes)
pkts bytes target prot opt in out source destination
11270 2333390 ACCEPT all -- eth1 eth1 0.0.0.0/0 0.0.0.0/0
980051 482959412 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 set FW_192_168_0_0 src
1152504 1270370619 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 set FW_192_168_0_0 dst
Chain OUTPUT (policy ACCEPT 718 packets, 118846 bytes)
pkts bytes target prot opt in out source destination
iptables -t mangle -nxvL
Chain PREROUTING (policy ACCEPT 2424957 packets, 1983024149 bytes)
pkts bytes target prot opt in out source destination
Chain INPUT (policy ACCEPT 1854 packets, 465085 bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 2423093 packets, 1982557215 bytes)
pkts bytes target prot opt in out source destination
2423091 1982557123 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK set 0x1
1111170 563846489 TRAF_OUT all -- eth1 eth0 0.0.0.0/0 0.0.0.0/0
1299002 1416034100 TRAF_IN all -- eth0 eth1 0.0.0.0/0 0.0.0.0/0
1111170 563846489 BG_IN all -- eth1 eth0 0.0.0.0/0 0.0.0.0/0
1299001 1416034060 BG_OUT all -- eth0 eth1 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 1091 packets, 180824 bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 2423699 packets, 1982686689 bytes)
pkts bytes target prot opt in out source destination
18420 895916 TCPMSS tcp -- * eth0 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
7163 346744 TCPMSS tcp -- * eth1 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
0 0 TCPMSS tcp -- * eth2 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
Chain BG_IN (2 references)
pkts bytes target prot opt in out source destination
1210149 1372019291 IPMARK all -- * * 0.0.0.0/0 192.168.0.0/24 IPMARK dst ip and 0xff or 0x10500
Chain BG_OUT (2 references)
pkts bytes target prot opt in out source destination
981942 483010166 IPMARK all -- * * 192.168.0.0/24 0.0.0.0/0 IPMARK src ip and 0xff or 0x10600
Chain INT_IN (1 references)
pkts bytes target prot opt in out source destination
88836 44011041 IPMARK all -- * * 0.0.0.0/0 192.168.0.0/24 IPMARK dst ip and 0xff or 0x10700
Chain INT_OUT (1 references)
pkts bytes target prot opt in out source destination
129185 80826592 IPMARK all -- * * 192.168.0.0/24 0.0.0.0/0 IPMARK src ip and 0xff or 0x10800
Chain TRAF_IN (1 references)
pkts bytes target prot opt in out source destination
1210150 1372019340 BG_IN all -- * * 0.0.0.0/0 0.0.0.0/0 set BG_NETS src
88837 44011090 INT_IN all -- * * 0.0.0.0/0 0.0.0.0/0 MARK match 0x1
Chain TRAF_OUT (1 references)
pkts bytes target prot opt in out source destination
981945 483010531 BG_OUT all -- * * 0.0.0.0/0 0.0.0.0/0 set BG_NETS dst
129190 80827219 INT_OUT all -- * * 0.0.0.0/0 0.0.0.0/0 MARK match 0x1