japp såhär ser det alltså ut nu då när jag skriver dom där kommandona.. kan tilläga att jag har fått igång det mesta.. förutom vissa portar som jag vill öppna lokalt på burken däribland den rangen som det står 16000:16100 på samt den forwarden med 52778.
Chain INPUT (policy DROP 1147 packets, 109K bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT 0 -- lo * 0.0.0.0/0 0.0.0.0/0
3824 566K bad_packets 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP 0 -- * * 0.0.0.0/0 224.0.0.1
2048 186K ACCEPT 0 -- eth0 * 192.168.0.0/24 0.0.0.0/0
0 0 ACCEPT 0 -- eth0 * 0.0.0.0/0 192.168.0.255
0 0 ACCEPT udp -- eth0 * 0.0.0.0/0 0.0.0.0/0 udp spt:68 dpt:67
166 31685 ACCEPT 0 -- eth1 * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
492 24912 tcp_inbound tcp -- eth1 * 0.0.0.0/0 0.0.0.0/0
854 151K udp_inbound udp -- eth1 * 0.0.0.0/0 0.0.0.0/0
2 122 icmp_packets icmp -- eth1 * 0.0.0.0/0 0.0.0.0/0
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0 PKTTYPE = broadcast
96 8789 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 3 LOG flags 0 level 4 prefix `INPUT packet died: '
Chain FORWARD (policy DROP 136 packets, 136K bytes)
pkts bytes target prot opt in out source destination
3068K 2947M bad_packets 0 -- * * 0.0.0.0/0 0.0.0.0/0
1666K 1563M tcp_outbound tcp -- eth0 * 0.0.0.0/0 0.0.0.0/0
2286 299K udp_outbound udp -- eth0 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT 0 -- eth0 * 0.0.0.0/0 0.0.0.0/0
1400K 1384M ACCEPT 0 -- eth1 * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT tcp -- eth1 * 0.0.0.0/0 192.168.0.126 tcp dpt:54
30 1480 ACCEPT tcp -- eth1 * 0.0.0.0/0 192.168.0.126 tcp dpts:6112:6119
104 5104 ACCEPT tcp -- eth1 * 0.0.0.0/0 192.168.0.126 tcp dpt:36287
0 0 ACCEPT udp -- eth1 * 0.0.0.0/0 192.168.0.126 udp dpt:36287
0 0 ACCEPT udp -- eth1 * 0.0.0.0/0 192.168.0.1 udp dpt:7025
0 0 ACCEPT udp -- eth1 * 0.0.0.0/0 192.168.0.1 udp dpt:8000
0 0 ACCEPT udp -- eth1 * 0.0.0.0/0 192.168.0.1 udp dpt:1025
0 0 ACCEPT udp -- eth1 * 0.0.0.0/0 192.168.0.1 udp dpt:22
0 0 ACCEPT tcp -- eth1 * 0.0.0.0/0 192.168.0.1 tcp dpt:52778
0 0 ACCEPT tcp -- eth1 * 0.0.0.0/0 192.168.0.1 tcp dpts

16100
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 3 LOG flags 0 level 4 prefix `FORWARD packet died: '
Chain OUTPUT (policy DROP 6 packets, 1288 bytes)
pkts bytes target prot opt in out source destination
0 0 DROP icmp -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID
0 0 ACCEPT 0 -- * * 127.0.0.1 0.0.0.0/0
0 0 ACCEPT 0 -- * lo 0.0.0.0/0 0.0.0.0/0
3840 416K ACCEPT 0 -- * * 192.168.0.1 0.0.0.0/0
33 1320 ACCEPT 0 -- * eth0 0.0.0.0/0 0.0.0.0/0
240 19847 ACCEPT 0 -- * eth1 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 3 LOG flags 0 level 4 prefix `OUTPUT packet died: '
Chain bad_packets (2 references)
pkts bytes target prot opt in out source destination
0 0 LOG 0 -- eth1 * 192.168.0.0/24 0.0.0.0/0 LOG flags 0 level 4 prefix `Illegal source: '
0 0 DROP 0 -- eth1 * 192.168.0.0/24 0.0.0.0/0
264 173K LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID LOG flags 0 level 4 prefix `Invalid packet: '
264 173K DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID
3068K 2947M bad_tcp_packets tcp -- * * 0.0.0.0/0 0.0.0.0/0
3072K 2948M RETURN 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain bad_tcp_packets (1 references)
pkts bytes target prot opt in out source destination
1668K 1563M RETURN tcp -- eth0 * 0.0.0.0/0 0.0.0.0/0
4 196 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:!0x17/0x02 state NEW LOG flags 0 level 4 prefix `New not syn: '
4 196 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:!0x17/0x02 state NEW
0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x00 LOG flags 0 level 4 prefix `Stealth scan: '
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x00
0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x3F LOG flags 0 level 4 prefix `Stealth scan: '
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x3F
0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x29 LOG flags 0 level 4 prefix `Stealth scan: '
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x29
0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x37 LOG flags 0 level 4 prefix `Stealth scan: '
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x37
0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x06 LOG flags 0 level 4 prefix `Stealth scan: '
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x06
0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x03/0x03 LOG flags 0 level 4 prefix `Stealth scan: '
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x03/0x03
1400K 1384M RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0
Chain icmp_packets (1 references)
pkts bytes target prot opt in out source destination
0 0 LOG icmp -f * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix `ICMP Fragment: '
0 0 DROP icmp -f * * 0.0.0.0/0 0.0.0.0/0
2 122 DROP icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 11
0 0 RETURN icmp -- * * 0.0.0.0/0 0.0.0.0/0
Chain tcp_inbound (1 references)
pkts bytes target prot opt in out source destination
0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:113 reject-with icmp-port-unreachable
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
0 0 ACCEPT tcp -- eth1 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:7025
492 24912 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0
Chain tcp_outbound (1 references)
pkts bytes target prot opt in out source destination
1666K 1563M ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
Chain udp_inbound (1 references)
pkts bytes target prot opt in out source destination
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:137
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:138
0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:113 reject-with icmp-port-unreachable
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:68 dpt:67
199 66722 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:67 dpt:68
655 84332 RETURN udp -- * * 0.0.0.0/0 0.0.0.0/0
Chain udp_outbound (1 references)
pkts bytes target prot opt in out source destination
2286 299K ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
Chain PREROUTING (policy ACCEPT 5902 packets, 514K bytes)
pkts bytes target prot opt in out source destination
0 0 DNAT tcp -- eth1 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:54 to:192.168.0.126
124 6088 DNAT tcp -- eth1 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:36287 to:192.168.0.126
0 0 DNAT tcp -- eth1 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:7025 to:192.168.0.1
0 0 DNAT tcp -- eth1 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:8000 to:192.168.0.1
0 0 DNAT tcp -- eth1 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:1025 to:192.168.0.1
0 0 DNAT tcp -- eth1 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 to:192.168.0.1
0 0 DNAT tcp -- eth1 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:52778 to:192.168.0.1
0 0 DNAT tcp -- eth1 * 0.0.0.0/0 0.0.0.0/0 tcp dpts

16100 to:192.168.0.1
31 1556 DNAT tcp -- eth1 * 0.0.0.0/0 0.0.0.0/0 tcp dpts:6112:6119 to:192.168.0.126
Chain POSTROUTING (policy ACCEPT 154 packets, 7568 bytes)
pkts bytes target prot opt in out source destination
4664 395K MASQUERADE 0 -- * eth1 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 12 packets, 738 bytes)
pkts bytes target prot opt in out source destination
som ni kanske ser så använde jag det där scriptet som Mekaniserad Apelsin tipsade om.. funkade väldigt bra efter lite konfiguration faktist
