On Wed, Aug 22, 2001 at 11:04:16AM -0400, Jeremy Rumpf wrote:

> Hello all, 

Hi,


> My main question is, can I do something like this:
> 
> iptables -t filter -I FOWARD -s 128.146.105.13/32 -i eth0 -o eth1 -j ALLOW
> iptables -t filter -I FOWARD -d 128.146.105.13/32 -i eth1 -o eth0 -j ALLOW

Provided s/ALLOW/ACCEPT/, yes, no problem.

You should take care to protect against IP spoofing ('borrowing') in such a
setup though. A nonauthenticated box could borrow the IP of an authenticated
box and get unauthorised access that way. I would advise you combine this
with MAC address filtering on the bridge, and MAC address filtering on your
switches.


> FYI, The ip address 128.146.105.13 is passed to the bridge manager when 
> authentication takes place. I do this by transparent proxying any web request
> of any non-authenticated user back to an apache server running on the local 
> bridge. The apache/PHP interacts to the bridge manager over a local unix 
> domain socket. Should be pretty cool, if all the peices work :).

I think it should.. :)


cheers,
Lennert
_______________________________________________
Bridge mailing list
[EMAIL PROTECTED]
http://www.math.leidenuniv.nl/mailman/listinfo/bridge

Reply via email to