Всем привет! Есть центос 6.2 Необходимо, чтобы с внешки 37... был виден сервак камер предприятия. Сменили провайдера(от ADSL перешли на спутник),сменился белый ip, заместо старого пишу новый, все остальное без изменений-реакции ноль. Подскажите, что не так?
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:RH-Firewall-1-INPUT - [0:0]
-A INPUT -j RH-Firewall-1-INPUT
-A FORWARD -j RH-Firewall-1-INPUT
-A RH-Firewall-1-INPUT -i lo -j ACCEPT
-A RH-Firewall-1-INPUT -p icmp --icmp-type echo-reply -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 53 -j ACCEPT
#-A RH-Firewall-1-INPUT -p tcp -m tcp --dport 16016 -j ACCEPT
#pptp
-A RH-Firewall-1-INPUT -i ppp0 -p gre -j ACCEPT
-A RH-Firewall-1-INPUT -i ppp0 -p tcp -m tcp --dport 1723 -j ACCEPT
# CLOSING PORTS
################
# PPP0
##########
-A RH-Firewall-1-INPUT -i ppp0 -p tcp -m multiport --dports 21,53,111,139,443,445 -j REJECT --reject-with tcp-reset
-A RH-Firewall-1-INPUT -i ppp0 -p udp -m multiport --dports 21,53,111,139,443,445 -j DROP
# DROP WiFi
-A RH-Firewall-1-INPUT -s 10.1.0.0/16 -d 192.168.10.0/24 -j DROP
-A RH-Firewall-1-INPUT -s 192.168.0.0/24 -d 192.168.10.0/24 -j DROP
-A RH-Firewall-1-INPUT -s 192.168.9.1 -d 192.168.10.0/24 -j DROP
-A RH-Firewall-1-INPUT -s 192.168.9.2 -d 192.168.10.0/24 -j DROP
COMMIT
*nat
:PREROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
#############
# OUTDOOR
#############
#Dominations
-A PREROUTING -p tcp -d 37.x.x.x --dport 7010 -j DNAT --to-destination 192.168.10.101:7000
-A PREROUTING -p udp -d 37.x.x.x --dport 7010 -j DNAT --to-destination 192.168.10.101:7000
-A PREROUTING -p tcp -d 37.x.x.x --dport 7020 -j DNAT --to-destination 192.168.10.103:7000
-A PREROUTING -p udp -d 37.x.x.x --dport 7020 -j DNAT --to-destination 192.168.10.103:7000
#web Cams
-A PREROUTING -p tcp -d 37.x.x.x --dport 8080 -j DNAT --to-destination 192.168.10.203:8080
-A PREROUTING -p tcp -d 37.x.x.x --dport 80 -j DNAT --to-destination 192.168.10.203:12000
##############
# Port config
###########
#-A POSTROUTING -s 192.168.10.0/255.255.255.0 -o ppp0 -p tcp -m tcp -j SNAT --to-source 89.109.34.150
#-A POSTROUTING -s 192.168.10.0/255.255.255.0 -o ppp0 -p udp -m udp -j SNAT --to-source 89.109.34.150
#-A POSTROUTING -s 192.168.10.0/255.255.255.0 -o ppp0 -p icmp -m icmp -j SNAT --to-source 89.109.34.150
-A POSTROUTING -s 192.168.10.12 -o ppp0 -p tcp -m tcp -j SNAT --to-source 37.x.x.x
-A POSTROUTING -s 192.168.10.12 -o ppp0 -p udp -m udp -j SNAT --to-source 37.x.x.x
-A POSTROUTING -s 192.168.10.12 -o ppp0 -p icmp -m icmp -j SNAT --to-source 37.x.x.x
# так далее для остальных ip
##Administrators
-A POSTROUTING -s 192.168.10.200 -o ppp0 -p tcp -m tcp -j SNAT --to-source 37.x.x.x
-A POSTROUTING -s 192.168.10.200 -o ppp0 -p udp -m udp -j SNAT --to-source 37.x.x.x
-A POSTROUTING -s 192.168.10.200 -o ppp0 -p icmp -m icmp -j SNAT --to-source 37.x.x.x
-A POSTROUTING -s 192.168.10.201 -o ppp0 -p tcp -m tcp -j SNAT --to-source 337.x.x.x
-A POSTROUTING -s 192.168.10.201 -o ppp0 -p udp -m udp -j SNAT --to-source 37.x.x.x
-A POSTROUTING -s 192.168.10.201 -o ppp0 -p icmp -m icmp -j SNAT --to-source 37.x.x.x
-A POSTROUTING -s 192.168.10.202 -o ppp0 -p tcp -m tcp -j SNAT --to-source 37.x.x.x
-A POSTROUTING -s 192.168.10.202 -o ppp0 -p udp -m udp -j SNAT --to-source 37.x.x.x
-A POSTROUTING -s 192.168.10.202 -o ppp0 -p icmp -m icmp -j SNAT --to-source 37.x.x.x
-A POSTROUTING -s 192.168.10.203 -o ppp0 -p tcp -m tcp -j SNAT --to-source 37.x.x.x
-A POSTROUTING -s 192.168.10.203 -o ppp0 -p udp -m udp -j SNAT --to-source 37.x.x.x
-A POSTROUTING -s 192.168.10.203 -o ppp0 -p icmp -m icmp -j SNAT --to-source 37.x.x.x
-A POSTROUTING -s 192.168.10.240 -o ppp0 -p tcp -m tcp -j SNAT --to-source 37.x.x.x
-A POSTROUTING -s 192.168.10.240 -o ppp0 -p udp -m udp -j SNAT --to-source 37.x.x.x
-A POSTROUTING -s 192.168.10.240 -o ppp0 -p icmp -m icmp -j SNAT --to-source 37.x.x.x
COMMIT
# Generated by webmin
*mangle
:FORWARD ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:PREROUTING ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
COMMIT