-m state --state ESTABLISHED
## BCP38 filtering. Note that addresses here are seen before NAT is applied.
-bcp38 4 ppp0 62.49.204.144/28 172.29.198.0/23
-bcp38 6 t6-he \
- 2001:470:1f08:1b98::2 2001:470:1f09:1b98::/64 \
- 2001:470:9740::/48
+bcp38 4 ppp0 81.2.113.195 81.187.238.128/28 217.169.12.64/28 172.29.198.0/23
+bcp38 6 ppp0 2001:8b0:c92::/48
## NAT for RFC1918 addresses.
for i in PREROUTING OUTPUT POSTROUTING; do
run iptables -t nat -N outbound
run iptables -t nat -A outbound -j RETURN ! -o ppp0
run iptables -t nat -A outbound -j RETURN ! -s 172.29.198.0/23
-run iptables -t nat -A outbound -j RETURN -d 62.49.204.144/28
+run iptables -t nat -A outbound -j RETURN -d 81.187.238.128/28
run iptables -t nat -A outbound -j RETURN -d 172.29.198.0/23
## An awful hack.
##run iptables -t nat -A outbound -j DNETMAP --reuse \
-## -s 172.29.199.44 --prefix 62.49.204.157
+## -s 172.29.199.44 --prefix 81.187.238.142
##run iptables -t nat -A outbound -j DNETMAP --reuse \
-## -s 172.29.198.34 --prefix 62.49.204.157
+## -s 172.29.198.34 --prefix 81.187.238.142
##run iptables -t nat -A outbound -j DNETMAP --reuse \
-## -s 172.29.198.11 --prefix 62.49.204.157
+## -s 172.29.198.11 --prefix 81.187.238.142
##run iptables -t nat -A PREROUTING -j DNETMAP
-run iptables -t nat -A outbound -j SNAT --to-source 62.49.204.158
+run iptables -t nat -A outbound -j SNAT --to-source 81.187.238.142
run iptables -t nat -A POSTROUTING -j outbound
## Set up NAT protocol helpers. In particular, SIP needs some special
## Forbid anything complicated to the NAT address. Be sure to allow ident,
## though.
-run iptables -A INPUT -d 62.49.204.158 -p tcp -j ACCEPT \
+run iptables -A INPUT -d 81.187.238.142 -p tcp -j ACCEPT \
-m multiport --destination-ports=113
-run iptables -A INPUT -d 62.49.204.158 ! -p icmp -j REJECT
+run iptables -A INPUT -d 81.187.238.142 ! -p icmp -j REJECT
m4_divert(-1)
###----- That's all, folks --------------------------------------------------