How do I force VPN user traffic to go through SOCKS5 proxy? The Next CEO of Stack Overflowiptables rules to block ssh remote forwarded portsftp tls firewalled :(FsockOpen problem with Iptables inside OpenVZ VMWorkaround for state ESTABLISHED,RELATED to allow downloads?RHEL 6 Having issues forwarding port 80 to port 8080Configuring iptables on dd-wrt routerdebian kvm server with iptables is dropping bridge packetsRouting and OpenVPN not running on the default gatewayIPtables blocking SSH only if using conntrackDouble VPN client->server->client

How to unfasten electrical subpanel attached with ramset

Which acid/base does a strong base/acid react when added to a buffer solution?

How seriously should I take size and weight limits of hand luggage?

Traveling with my 5 year old daughter (as the father) without the mother from Germany to Mexico

Small nick on power cord from an electric alarm clock, and copper wiring exposed but intact

Find the majority element, which appears more than half the time

Create custom note boxes

How to find if SQL server backup is encrypted with TDE without restoring the backup

Would a grinding machine be a simple and workable propulsion system for an interplanetary spacecraft?

Is it a bad idea to plug the other end of ESD strap to wall ground?

Raspberry pi 3 B with Ubuntu 18.04 server arm64: what pi version

Prodigo = pro + ago?

What difference does it make matching a word with/without a trailing whitespace?

Does the Idaho Potato Commission associate potato skins with healthy eating?

Can this transistor (2n2222) take 6V on emitter-base? Am I reading datasheet incorrectly?

What did the word "leisure" mean in late 18th Century usage?

What does this strange code stamp on my passport mean?

Is there a rule of thumb for determining the amount one should accept for of a settlement offer?

Read/write a pipe-delimited file line by line with some simple text manipulation

Free fall ellipse or parabola?

How do I keep Mac Emacs from trapping M-`?

How can I prove that a state of equilibrium is unstable?

Is it okay to majorly distort historical facts while writing a fiction story?

Do I need to write [sic] when including a quotation with a number less than 10 that isn't written out?



How do I force VPN user traffic to go through SOCKS5 proxy?



The Next CEO of Stack Overflowiptables rules to block ssh remote forwarded portsftp tls firewalled :(FsockOpen problem with Iptables inside OpenVZ VMWorkaround for state ESTABLISHED,RELATED to allow downloads?RHEL 6 Having issues forwarding port 80 to port 8080Configuring iptables on dd-wrt routerdebian kvm server with iptables is dropping bridge packetsRouting and OpenVPN not running on the default gatewayIPtables blocking SSH only if using conntrackDouble VPN client->server->client










1















I have a Raspberry Pi which establishes an SSH proxy to a remote server (VPS) and opens a port on the Pi so I can use it as a SOCKS proxy. This is the command I use to establish the tunnel:



ssh -D 1080 -f -C -q -N user@hostname


This shows you how it is supposed to work:



 ______________________________
| |
| Client |
|______________________________|
|
| L2TP over IPSEC
________________|_______________ __
| | |
| VPN (192.168.1.XXX) | |
|________________________________| |
________________|_______________ |-RaspberryPi
| | |
| SOCKS5 (127.0.0.1:1080) | |
|________________________________|__|
|
| SSH tunnel
________________|________________
| |
| VPS (Amazon EC2) |
|_________________________________|
|
/
/
the internet


These are my IP tables:



*nat
:PREROUTING ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
-A POSTROUTING -s 192.168.42.0/24 -o eth+ -j MASQUERADE
-A POSTROUTING -s 192.168.43.0/24 -o eth+ -m policy --dir out --pol none -j MASQUERADE
COMMIT
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
-A INPUT -p udp -m udp --dport 1701 -m policy --dir in --pol none -j DROP
-A INPUT -m conntrack --ctstate INVALID -j DROP
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A INPUT -p udp -m multiport --dports 500,4500 -j ACCEPT
-A INPUT -p udp -m udp --dport 1701 -m policy --dir in --pol ipsec -j ACCEPT
-A INPUT -p udp -m udp --dport 1701 -j DROP
-A FORWARD -m conntrack --ctstate INVALID -j DROP
-A FORWARD -i eth+ -o ppp+ -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -i ppp+ -o eth+ -j ACCEPT
-A FORWARD -s 192.168.42.0/24 -d 192.168.42.0/24 -i ppp+ -o ppp+ -j ACCEPT
-A FORWARD -d 192.168.43.0/24 -i eth+ -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -s 192.168.43.0/24 -o eth+ -j ACCEPT
-A FORWARD -j DROP
COMMIT


The script "setup-ipsec-vpn" was used to make the VPN.



So my question is: How can I change these IP tables to drop all of the VPN clients' outbound packets unless it is using the SOCKS5 proxy on the Raspberry Pi (:1080)










share|improve this question
















bumped to the homepage by Community yesterday


This question has answers that may be good or bad; the system has marked it active so that they can be reviewed.



















    1















    I have a Raspberry Pi which establishes an SSH proxy to a remote server (VPS) and opens a port on the Pi so I can use it as a SOCKS proxy. This is the command I use to establish the tunnel:



    ssh -D 1080 -f -C -q -N user@hostname


    This shows you how it is supposed to work:



     ______________________________
    | |
    | Client |
    |______________________________|
    |
    | L2TP over IPSEC
    ________________|_______________ __
    | | |
    | VPN (192.168.1.XXX) | |
    |________________________________| |
    ________________|_______________ |-RaspberryPi
    | | |
    | SOCKS5 (127.0.0.1:1080) | |
    |________________________________|__|
    |
    | SSH tunnel
    ________________|________________
    | |
    | VPS (Amazon EC2) |
    |_________________________________|
    |
    /
    /
    the internet


    These are my IP tables:



    *nat
    :PREROUTING ACCEPT [0:0]
    :INPUT ACCEPT [0:0]
    :OUTPUT ACCEPT [0:0]
    :POSTROUTING ACCEPT [0:0]
    -A POSTROUTING -s 192.168.42.0/24 -o eth+ -j MASQUERADE
    -A POSTROUTING -s 192.168.43.0/24 -o eth+ -m policy --dir out --pol none -j MASQUERADE
    COMMIT
    *filter
    :INPUT ACCEPT [0:0]
    :FORWARD ACCEPT [0:0]
    :OUTPUT ACCEPT [0:0]
    -A INPUT -p udp -m udp --dport 1701 -m policy --dir in --pol none -j DROP
    -A INPUT -m conntrack --ctstate INVALID -j DROP
    -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
    -A INPUT -p udp -m multiport --dports 500,4500 -j ACCEPT
    -A INPUT -p udp -m udp --dport 1701 -m policy --dir in --pol ipsec -j ACCEPT
    -A INPUT -p udp -m udp --dport 1701 -j DROP
    -A FORWARD -m conntrack --ctstate INVALID -j DROP
    -A FORWARD -i eth+ -o ppp+ -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
    -A FORWARD -i ppp+ -o eth+ -j ACCEPT
    -A FORWARD -s 192.168.42.0/24 -d 192.168.42.0/24 -i ppp+ -o ppp+ -j ACCEPT
    -A FORWARD -d 192.168.43.0/24 -i eth+ -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
    -A FORWARD -s 192.168.43.0/24 -o eth+ -j ACCEPT
    -A FORWARD -j DROP
    COMMIT


    The script "setup-ipsec-vpn" was used to make the VPN.



    So my question is: How can I change these IP tables to drop all of the VPN clients' outbound packets unless it is using the SOCKS5 proxy on the Raspberry Pi (:1080)










    share|improve this question
















    bumped to the homepage by Community yesterday


    This question has answers that may be good or bad; the system has marked it active so that they can be reviewed.

















      1












      1








      1


      1






      I have a Raspberry Pi which establishes an SSH proxy to a remote server (VPS) and opens a port on the Pi so I can use it as a SOCKS proxy. This is the command I use to establish the tunnel:



      ssh -D 1080 -f -C -q -N user@hostname


      This shows you how it is supposed to work:



       ______________________________
      | |
      | Client |
      |______________________________|
      |
      | L2TP over IPSEC
      ________________|_______________ __
      | | |
      | VPN (192.168.1.XXX) | |
      |________________________________| |
      ________________|_______________ |-RaspberryPi
      | | |
      | SOCKS5 (127.0.0.1:1080) | |
      |________________________________|__|
      |
      | SSH tunnel
      ________________|________________
      | |
      | VPS (Amazon EC2) |
      |_________________________________|
      |
      /
      /
      the internet


      These are my IP tables:



      *nat
      :PREROUTING ACCEPT [0:0]
      :INPUT ACCEPT [0:0]
      :OUTPUT ACCEPT [0:0]
      :POSTROUTING ACCEPT [0:0]
      -A POSTROUTING -s 192.168.42.0/24 -o eth+ -j MASQUERADE
      -A POSTROUTING -s 192.168.43.0/24 -o eth+ -m policy --dir out --pol none -j MASQUERADE
      COMMIT
      *filter
      :INPUT ACCEPT [0:0]
      :FORWARD ACCEPT [0:0]
      :OUTPUT ACCEPT [0:0]
      -A INPUT -p udp -m udp --dport 1701 -m policy --dir in --pol none -j DROP
      -A INPUT -m conntrack --ctstate INVALID -j DROP
      -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
      -A INPUT -p udp -m multiport --dports 500,4500 -j ACCEPT
      -A INPUT -p udp -m udp --dport 1701 -m policy --dir in --pol ipsec -j ACCEPT
      -A INPUT -p udp -m udp --dport 1701 -j DROP
      -A FORWARD -m conntrack --ctstate INVALID -j DROP
      -A FORWARD -i eth+ -o ppp+ -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
      -A FORWARD -i ppp+ -o eth+ -j ACCEPT
      -A FORWARD -s 192.168.42.0/24 -d 192.168.42.0/24 -i ppp+ -o ppp+ -j ACCEPT
      -A FORWARD -d 192.168.43.0/24 -i eth+ -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
      -A FORWARD -s 192.168.43.0/24 -o eth+ -j ACCEPT
      -A FORWARD -j DROP
      COMMIT


      The script "setup-ipsec-vpn" was used to make the VPN.



      So my question is: How can I change these IP tables to drop all of the VPN clients' outbound packets unless it is using the SOCKS5 proxy on the Raspberry Pi (:1080)










      share|improve this question
















      I have a Raspberry Pi which establishes an SSH proxy to a remote server (VPS) and opens a port on the Pi so I can use it as a SOCKS proxy. This is the command I use to establish the tunnel:



      ssh -D 1080 -f -C -q -N user@hostname


      This shows you how it is supposed to work:



       ______________________________
      | |
      | Client |
      |______________________________|
      |
      | L2TP over IPSEC
      ________________|_______________ __
      | | |
      | VPN (192.168.1.XXX) | |
      |________________________________| |
      ________________|_______________ |-RaspberryPi
      | | |
      | SOCKS5 (127.0.0.1:1080) | |
      |________________________________|__|
      |
      | SSH tunnel
      ________________|________________
      | |
      | VPS (Amazon EC2) |
      |_________________________________|
      |
      /
      /
      the internet


      These are my IP tables:



      *nat
      :PREROUTING ACCEPT [0:0]
      :INPUT ACCEPT [0:0]
      :OUTPUT ACCEPT [0:0]
      :POSTROUTING ACCEPT [0:0]
      -A POSTROUTING -s 192.168.42.0/24 -o eth+ -j MASQUERADE
      -A POSTROUTING -s 192.168.43.0/24 -o eth+ -m policy --dir out --pol none -j MASQUERADE
      COMMIT
      *filter
      :INPUT ACCEPT [0:0]
      :FORWARD ACCEPT [0:0]
      :OUTPUT ACCEPT [0:0]
      -A INPUT -p udp -m udp --dport 1701 -m policy --dir in --pol none -j DROP
      -A INPUT -m conntrack --ctstate INVALID -j DROP
      -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
      -A INPUT -p udp -m multiport --dports 500,4500 -j ACCEPT
      -A INPUT -p udp -m udp --dport 1701 -m policy --dir in --pol ipsec -j ACCEPT
      -A INPUT -p udp -m udp --dport 1701 -j DROP
      -A FORWARD -m conntrack --ctstate INVALID -j DROP
      -A FORWARD -i eth+ -o ppp+ -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
      -A FORWARD -i ppp+ -o eth+ -j ACCEPT
      -A FORWARD -s 192.168.42.0/24 -d 192.168.42.0/24 -i ppp+ -o ppp+ -j ACCEPT
      -A FORWARD -d 192.168.43.0/24 -i eth+ -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
      -A FORWARD -s 192.168.43.0/24 -o eth+ -j ACCEPT
      -A FORWARD -j DROP
      COMMIT


      The script "setup-ipsec-vpn" was used to make the VPN.



      So my question is: How can I change these IP tables to drop all of the VPN clients' outbound packets unless it is using the SOCKS5 proxy on the Raspberry Pi (:1080)







      ssh iptables vpn firewall proxy






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Apr 9 '17 at 12:33







      user3573987

















      asked Apr 9 '17 at 12:17









      user3573987user3573987

      63




      63





      bumped to the homepage by Community yesterday


      This question has answers that may be good or bad; the system has marked it active so that they can be reviewed.







      bumped to the homepage by Community yesterday


      This question has answers that may be good or bad; the system has marked it active so that they can be reviewed.






















          1 Answer
          1






          active

          oldest

          votes


















          0














          The answer depends in part on whether you will configure your clients.



          In other words, do you intend for the SOCKS proxy to be explicit, or transparent?



          If you can configure your client apps to use an explicit proxy, then it should be simple enough (although you may want to have your SOCKS listen on the VPN interface - or create a DNAT rule).



          -A INPUT -s 192.168.1.0/24 -d 192.168.1.1 -m tcp -p tcp --dport 1080 -j ACCEPT
          -A INPUT -s 192.168.1.0/24 -j DROP
          -A FORWARD -s 192.168.1.0/24 -j DROP


          If you wanted to have a transparent proxy, I think it may be worth considering introducing haproxy.



          This haproxy blog post provides an overview of how to setup transparent binding, which sounds like it might work for your use case.



          You may in that case find it easier to have SSH in tunnel mode rather than SOCKS (or add another VPN connection between Pi and gateway).



          The specific rule causing your 'issue' right now is, I think, this one:



          -A FORWARD -i ppp+ -o eth+ -j ACCEPT


          More generally, it seems as though you might want to rewrite your firewall rules to achieve what you want.






          share|improve this answer

























          • The SOCKS proxy is explicit and defined in the VPN profiles for the clients. However, if the proxy is down, it ignores it and just uses the RaspberryPi's connection. I want to stop that from happening. If the proxy is down, their requests should not go anywhere

            – user3573987
            Apr 9 '17 at 12:57












          Your Answer








          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "2"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: true,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          imageUploader:
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          ,
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );













          draft saved

          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f843531%2fhow-do-i-force-vpn-user-traffic-to-go-through-socks5-proxy%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown

























          1 Answer
          1






          active

          oldest

          votes








          1 Answer
          1






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes









          0














          The answer depends in part on whether you will configure your clients.



          In other words, do you intend for the SOCKS proxy to be explicit, or transparent?



          If you can configure your client apps to use an explicit proxy, then it should be simple enough (although you may want to have your SOCKS listen on the VPN interface - or create a DNAT rule).



          -A INPUT -s 192.168.1.0/24 -d 192.168.1.1 -m tcp -p tcp --dport 1080 -j ACCEPT
          -A INPUT -s 192.168.1.0/24 -j DROP
          -A FORWARD -s 192.168.1.0/24 -j DROP


          If you wanted to have a transparent proxy, I think it may be worth considering introducing haproxy.



          This haproxy blog post provides an overview of how to setup transparent binding, which sounds like it might work for your use case.



          You may in that case find it easier to have SSH in tunnel mode rather than SOCKS (or add another VPN connection between Pi and gateway).



          The specific rule causing your 'issue' right now is, I think, this one:



          -A FORWARD -i ppp+ -o eth+ -j ACCEPT


          More generally, it seems as though you might want to rewrite your firewall rules to achieve what you want.






          share|improve this answer

























          • The SOCKS proxy is explicit and defined in the VPN profiles for the clients. However, if the proxy is down, it ignores it and just uses the RaspberryPi's connection. I want to stop that from happening. If the proxy is down, their requests should not go anywhere

            – user3573987
            Apr 9 '17 at 12:57
















          0














          The answer depends in part on whether you will configure your clients.



          In other words, do you intend for the SOCKS proxy to be explicit, or transparent?



          If you can configure your client apps to use an explicit proxy, then it should be simple enough (although you may want to have your SOCKS listen on the VPN interface - or create a DNAT rule).



          -A INPUT -s 192.168.1.0/24 -d 192.168.1.1 -m tcp -p tcp --dport 1080 -j ACCEPT
          -A INPUT -s 192.168.1.0/24 -j DROP
          -A FORWARD -s 192.168.1.0/24 -j DROP


          If you wanted to have a transparent proxy, I think it may be worth considering introducing haproxy.



          This haproxy blog post provides an overview of how to setup transparent binding, which sounds like it might work for your use case.



          You may in that case find it easier to have SSH in tunnel mode rather than SOCKS (or add another VPN connection between Pi and gateway).



          The specific rule causing your 'issue' right now is, I think, this one:



          -A FORWARD -i ppp+ -o eth+ -j ACCEPT


          More generally, it seems as though you might want to rewrite your firewall rules to achieve what you want.






          share|improve this answer

























          • The SOCKS proxy is explicit and defined in the VPN profiles for the clients. However, if the proxy is down, it ignores it and just uses the RaspberryPi's connection. I want to stop that from happening. If the proxy is down, their requests should not go anywhere

            – user3573987
            Apr 9 '17 at 12:57














          0












          0








          0







          The answer depends in part on whether you will configure your clients.



          In other words, do you intend for the SOCKS proxy to be explicit, or transparent?



          If you can configure your client apps to use an explicit proxy, then it should be simple enough (although you may want to have your SOCKS listen on the VPN interface - or create a DNAT rule).



          -A INPUT -s 192.168.1.0/24 -d 192.168.1.1 -m tcp -p tcp --dport 1080 -j ACCEPT
          -A INPUT -s 192.168.1.0/24 -j DROP
          -A FORWARD -s 192.168.1.0/24 -j DROP


          If you wanted to have a transparent proxy, I think it may be worth considering introducing haproxy.



          This haproxy blog post provides an overview of how to setup transparent binding, which sounds like it might work for your use case.



          You may in that case find it easier to have SSH in tunnel mode rather than SOCKS (or add another VPN connection between Pi and gateway).



          The specific rule causing your 'issue' right now is, I think, this one:



          -A FORWARD -i ppp+ -o eth+ -j ACCEPT


          More generally, it seems as though you might want to rewrite your firewall rules to achieve what you want.






          share|improve this answer















          The answer depends in part on whether you will configure your clients.



          In other words, do you intend for the SOCKS proxy to be explicit, or transparent?



          If you can configure your client apps to use an explicit proxy, then it should be simple enough (although you may want to have your SOCKS listen on the VPN interface - or create a DNAT rule).



          -A INPUT -s 192.168.1.0/24 -d 192.168.1.1 -m tcp -p tcp --dport 1080 -j ACCEPT
          -A INPUT -s 192.168.1.0/24 -j DROP
          -A FORWARD -s 192.168.1.0/24 -j DROP


          If you wanted to have a transparent proxy, I think it may be worth considering introducing haproxy.



          This haproxy blog post provides an overview of how to setup transparent binding, which sounds like it might work for your use case.



          You may in that case find it easier to have SSH in tunnel mode rather than SOCKS (or add another VPN connection between Pi and gateway).



          The specific rule causing your 'issue' right now is, I think, this one:



          -A FORWARD -i ppp+ -o eth+ -j ACCEPT


          More generally, it seems as though you might want to rewrite your firewall rules to achieve what you want.







          share|improve this answer














          share|improve this answer



          share|improve this answer








          edited Apr 9 '17 at 13:08

























          answered Apr 9 '17 at 12:43









          iwaseatenbyagrueiwaseatenbyagrue

          3,097718




          3,097718












          • The SOCKS proxy is explicit and defined in the VPN profiles for the clients. However, if the proxy is down, it ignores it and just uses the RaspberryPi's connection. I want to stop that from happening. If the proxy is down, their requests should not go anywhere

            – user3573987
            Apr 9 '17 at 12:57


















          • The SOCKS proxy is explicit and defined in the VPN profiles for the clients. However, if the proxy is down, it ignores it and just uses the RaspberryPi's connection. I want to stop that from happening. If the proxy is down, their requests should not go anywhere

            – user3573987
            Apr 9 '17 at 12:57

















          The SOCKS proxy is explicit and defined in the VPN profiles for the clients. However, if the proxy is down, it ignores it and just uses the RaspberryPi's connection. I want to stop that from happening. If the proxy is down, their requests should not go anywhere

          – user3573987
          Apr 9 '17 at 12:57






          The SOCKS proxy is explicit and defined in the VPN profiles for the clients. However, if the proxy is down, it ignores it and just uses the RaspberryPi's connection. I want to stop that from happening. If the proxy is down, their requests should not go anywhere

          – user3573987
          Apr 9 '17 at 12:57


















          draft saved

          draft discarded
















































          Thanks for contributing an answer to Server Fault!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid


          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.

          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f843531%2fhow-do-i-force-vpn-user-traffic-to-go-through-socks5-proxy%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Club Baloncesto Breogán Índice Historia | Pavillón | Nome | O Breogán na cultura popular | Xogadores | Adestradores | Presidentes | Palmarés | Historial | Líderes | Notas | Véxase tamén | Menú de navegacióncbbreogan.galCadroGuía oficial da ACB 2009-10, páxina 201Guía oficial ACB 1992, páxina 183. Editorial DB.É de 6.500 espectadores sentados axeitándose á última normativa"Estudiantes Junior, entre as mellores canteiras"o orixinalHemeroteca El Mundo Deportivo, 16 setembro de 1970, páxina 12Historia do BreogánAlfredo Pérez, o último canoneiroHistoria C.B. BreogánHemeroteca de El Mundo DeportivoJimmy Wright, norteamericano do Breogán deixará Lugo por ameazas de morteResultados de Breogán en 1986-87Resultados de Breogán en 1990-91Ficha de Velimir Perasović en acb.comResultados de Breogán en 1994-95Breogán arrasa al Barça. "El Mundo Deportivo", 27 de setembro de 1999, páxina 58CB Breogán - FC BarcelonaA FEB invita a participar nunha nova Liga EuropeaCharlie Bell na prensa estatalMáximos anotadores 2005Tempada 2005-06 : Tódolos Xogadores da Xornada""Non quero pensar nunha man negra, mais pregúntome que está a pasar""o orixinalRaúl López, orgulloso dos xogadores, presume da boa saúde económica do BreogánJulio González confirma que cesa como presidente del BreogánHomenaxe a Lisardo GómezA tempada do rexurdimento celesteEntrevista a Lisardo GómezEl COB dinamita el Pazo para forzar el quinto (69-73)Cafés Candelas, patrocinador del CB Breogán"Suso Lázare, novo presidente do Breogán"o orixinalCafés Candelas Breogán firma el mayor triunfo de la historiaEl Breogán realizará 17 homenajes por su cincuenta aniversario"O Breogán honra ao seu fundador e primeiro presidente"o orixinalMiguel Giao recibiu a homenaxe do PazoHomenaxe aos primeiros gladiadores celestesO home que nos amosa como ver o Breo co corazónTita Franco será homenaxeada polos #50anosdeBreoJulio Vila recibirá unha homenaxe in memoriam polos #50anosdeBreo"O Breogán homenaxeará aos seus aboados máis veteráns"Pechada ovación a «Capi» Sanmartín e Ricardo «Corazón de González»Homenaxe por décadas de informaciónPaco García volve ao Pazo con motivo do 50 aniversario"Resultados y clasificaciones""O Cafés Candelas Breogán, campión da Copa Princesa""O Cafés Candelas Breogán, equipo ACB"C.B. Breogán"Proxecto social"o orixinal"Centros asociados"o orixinalFicha en imdb.comMario Camus trata la recuperación del amor en 'La vieja música', su última película"Páxina web oficial""Club Baloncesto Breogán""C. B. Breogán S.A.D."eehttp://www.fegaba.com

          Vilaño, A Laracha Índice Patrimonio | Lugares e parroquias | Véxase tamén | Menú de navegación43°14′52″N 8°36′03″O / 43.24775, -8.60070

          Cegueira Índice Epidemioloxía | Deficiencia visual | Tipos de cegueira | Principais causas de cegueira | Tratamento | Técnicas de adaptación e axudas | Vida dos cegos | Primeiros auxilios | Crenzas respecto das persoas cegas | Crenzas das persoas cegas | O neno deficiente visual | Aspectos psicolóxicos da cegueira | Notas | Véxase tamén | Menú de navegación54.054.154.436928256blindnessDicionario da Real Academia GalegaPortal das Palabras"International Standards: Visual Standards — Aspects and Ranges of Vision Loss with Emphasis on Population Surveys.""Visual impairment and blindness""Presentan un plan para previr a cegueira"o orixinalACCDV Associació Catalana de Cecs i Disminuïts Visuals - PMFTrachoma"Effect of gene therapy on visual function in Leber's congenital amaurosis"1844137110.1056/NEJMoa0802268Cans guía - os mellores amigos dos cegosArquivadoEscola de cans guía para cegos en Mortágua, PortugalArquivado"Tecnología para ciegos y deficientes visuales. Recopilación de recursos gratuitos en la Red""Colorino""‘COL.diesis’, escuchar los sonidos del color""COL.diesis: Transforming Colour into Melody and Implementing the Result in a Colour Sensor Device"o orixinal"Sistema de desarrollo de sinestesia color-sonido para invidentes utilizando un protocolo de audio""Enseñanza táctil - geometría y color. Juegos didácticos para niños ciegos y videntes""Sistema Constanz"L'ocupació laboral dels cecs a l'Estat espanyol està pràcticament equiparada a la de les persones amb visió, entrevista amb Pedro ZuritaONCE (Organización Nacional de Cegos de España)Prevención da cegueiraDescrición de deficiencias visuais (Disc@pnet)Braillín, un boneco atractivo para calquera neno, con ou sen discapacidade, que permite familiarizarse co sistema de escritura e lectura brailleAxudas Técnicas36838ID00897494007150-90057129528256DOID:1432HP:0000618D001766C10.597.751.941.162C97109C0155020