Сейчас такие правила:
# Generated by iptables-save v1.4.21 on Sun Mar 22 21:57:58 2015
*mangle
:PREROUTING ACCEPT [8908:879349]
:INPUT ACCEPT [6297:589682]
:FORWARD ACCEPT [1892:228039]
:OUTPUT ACCEPT [9344:65145122]
:POSTROUTING ACCEPT [11254:65375057]
-A FORWARD -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
COMMIT
# Completed on Sun Mar 22 21:57:58 2015
# Generated by iptables-save v1.4.21 on Sun Mar 22 21:57:58 2015
*filter
:INPUT DROP [636:275682]
:FORWARD ACCEPT [1892:228039]
:OUTPUT ACCEPT [9344:65145122]
:BAD_PACKETS - [0:0]
:ICMP_PACKETS - [0:0]
:SAFETY_TRACE - [0:0]
:TCP_PACKETS - [0:0]
:UDP_PACKETS - [0:0]
-A INPUT -j SAFETY_TRACE
-A INPUT -j BAD_PACKETS
-A INPUT -p tcp -j TCP_PACKETS
-A INPUT -p udp -j UDP_PACKETS
-A INPUT -p icmp -j ICMP_PACKETS
-A BAD_PACKETS -m conntrack --ctstate INVALID -j DROP
-A BAD_PACKETS -f -j DROP
-A BAD_PACKETS -s 127.0.0.0/8 ! -i lo -j DROP
-A BAD_PACKETS -p tcp -m tcp --tcp-flags SYN,ACK SYN,ACK -m conntrack --ctstate INVALID,NEW -j LOG --log-prefix "iptabler:ip spoofing: "
-A BAD_PACKETS -p tcp -m tcp --tcp-flags SYN,ACK SYN,ACK -m conntrack --ctstate INVALID,NEW -j REJECT --reject-with tcp-reset
-A BAD_PACKETS -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -m conntrack --ctstate NEW -m limit --limit 3/min -j LOG --log-prefix "iptabler:new not syn: "
-A BAD_PACKETS -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -m conntrack --ctstate NEW -j DROP
-A BAD_PACKETS -p udp -m udp --dport 113 -m limit --limit 3/min -j LOG --log-prefix "iptabler:udp storm: "
-A BAD_PACKETS -p udp -m udp --dport 113 -j REJECT --reject-with icmp-port-unreachable
-A ICMP_PACKETS -p icmp -m icmp --icmp-type 4 -j ACCEPT
-A ICMP_PACKETS -p icmp -m icmp --icmp-type 0 -j ACCEPT
-A ICMP_PACKETS -p icmp -m icmp --icmp-type 12 -j ACCEPT
-A SAFETY_TRACE -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A SAFETY_TRACE -i lo -j ACCEPT
-A SAFETY_TRACE -s 192.168.13.0/24 -i eth0 -j ACCEPT
-A TCP_PACKETS -p tcp -m tcp --dport xxxx -j ACCEPT
-A TCP_PACKETS -p tcp -m tcp --dport xxxx -j ACCEPT
-A UDP_PACKETS -p udp -m udp --sport 53 --dport 1024:65535 -j ACCEPT
-A UDP_PACKETS -p udp -m udp --dport 123 -j ACCEPT
COMMIT
# Completed on Sun Mar 22 21:57:58 2015
# Generated by iptables-save v1.4.21 on Sun Mar 22 21:57:58 2015
*nat
:PREROUTING ACCEPT [76:12456]
:INPUT ACCEPT [1:60]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
-A OUTPUT -p tcp -m owner --uid-owner 119 -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport 80 -j REDIRECT --to-ports 8118
-A POSTROUTING -s 192.168.13.0/24 -o ppp0 -j SNAT --to-source 77.66.xxx.xx
COMMIT
# Completed on Sun Mar 22 21:57:58 2015
http трафик идет через privoxy который болтается на стандартном порту 8118.
А трафик клиентов из подсети 192.168.13.0 нет. Как и их туда завернуть?
РЕШЕНИЕ:
-A PREROUTING -s 192.168.13.0/24 -p tcp -m tcp --dport 80 -j DNAT --to-destination 192.168.13.1:8118
-A OUTPUT -p tcp -m owner --uid-owner 119 -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport 80 -j DNAT --to-destination 192.168.13.1:8118