-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I am not all that familiar with Smoothwall, but I have been very happy
with the openVPN addon for IPCop.  Likely your smoothwall documentation
will be your best bet, along with their forums.

Evan Brown wrote:
> I was just wondering about that myself, I haven't done any VPN'ing 
> myself ever and I would have to look at it but I know that smoothwall 
> has the capability. That may be the easiest thing to do or hardest...:) 
> I will definately look into that thanx for the idea.
> 
> Evan
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>>
>> Why not use a VPN?  This way the client always uses the internal IP?
>>
>> Just a thought.
>>
>> Cheers,
>>
>>
>> Evan Brown wrote:
>>   
>>> There is no orange zone, we have 1 windows server that handles dhcp, 
>>> source safe ( source code control ) and dev databases. When we are all 
>>> in the office this isn't a big deal but when we have to go out of the 
>>> province or whatever to install software or whatever we have to use 
>>> source offsite which interacts with our source safe install. Before we 
>>> can go offsite you have to do a get on all the source you will be 
>>> working on thru source offsite because we've discovered that it causes 
>>> problems if we use source safe's client and just try to switch to source 
>>> offsite's client. They play together but they don't like to be swapped 
>>> around. Source offsite was originally registered to a certain ip and it 
>>> uses that to create some ID that is used when it locks code for check 
>>> out or whatever. If we check things out locally with offsite and hit the 
>>> server from 192.168.xxx.xxx then the ID is different when we hit it from 
>>> the red zone 205.xxx.xxx.xxx  sooo we need to be able to hit that red 
>>> zone ip from the green to get around these problems. I know next to 
>>> nothing about configuring iptables and need a fairly hand holding 
>>> experiance. I've been cruising around the forum form smoothwall and 
>>> google and I came up with that example but I'm not sure about it does or 
>>> where in the file I insert it.
>>>
>>> Evan
>>>
>>>     
>>>> -----BEGIN PGP SIGNED MESSAGE-----
>>>> Hash: SHA1
>>>>
>>>> Its funny I am having the same issue with one of my clients (only they
>>>> have an expensive Sonicwall appliance).  The solution for them was to
>>>> have a host entry on the proxy server point to the internal IP, which
>>>> worked fine as theirs was a web app.
>>>>
>>>> For you, the iptables code below looks like it might work, but iptables
>>>>  can mangle the packets which may still break your application (if there
>>>> is some sort of encryption or authentication key, NAT may be of no
>>>> help), I would need more information about your specific needs to be
>>>> able to help.  Do you have an Orange (DMZ) network set up?  This might
>>>> not be a bad approach, if this app resides in the DMZ, then everyone
>>>> sees the same IP.  Actually this is the point of a DMZ.
>>>>
>>>> On another, mostly unrelated note, I have been impressed with pfsense
>>>> (http://www.pfsense.org) a fork of MoNoWall, but pf is a different beast
>>>> from iptables altogether (it is the BSD equivalent to netfilter aka
>>>> iptables).
>>>>
>>>> Evan Brown wrote:
>>>>   
>>>>       
>>>>> I found this on the smoothwall site in the forums and since I know 
>>>>> nothing about iptables, does this look like it will work?
>>>>>
>>>>> /Hi, i download and install Smoothwall 2 Express , only test the smooth. 
>>>>> with
>>>>> a green and orange configuration ISDN and DSL is disable , via web 
>>>>> administration put forwardings from GREEN to ORANGE zone and these rules 
>>>>> not working , via ssh execute iptables -t nat -L and i dont view my 
>>>>> rule.... but if i edit
>>>>> the rc.firewall.up and put manually the rules
>>>>>
>>>>> "/sbin/iptables -t nat -A PREROUTING -p tcp -i $GREEN_DEV -d 10.1.1.229 
>>>>> --dport 23 -j DNAT --to 192.168.77.2:23 "
>>>>> "/sbin/iptables -A FORWARD -p tcp -i $ORANGE_DEV -d 192.168.77.2 --dport 
>>>>> 23 -j ACCEPT"
>>>>>
>>>>> /Evan
>>>>>
>>>>> the forward work and when execute iptables -t nat -L i view my rule, and 
>>>>> Then
>>>>>     
>>>>>         
>>>>>> Thats the nature of the beast. I've seen this happen on a number of 
>>>>>> systems, including mine -- m0n0wall.
>>>>>> I don't think IPCop has this flaw though.
>>>>>>
>>>>>> AFAIK, there is no way around it; of course, I could just be blowing 
>>>>>> smoke.
>>>>>>
>>>>>> Out of curiosity, why can't you just use the local IP? Why do you need 
>>>>>> to use the remote one?
>>>>>>
>>>>>> On 9/20/06, *Evan Brown* < [EMAIL PROTECTED] 
>>>>>> <mailto:[EMAIL PROTECTED]>> wrote:
>>>>>>
>>>>>>     Hi
>>>>>>
>>>>>>     I'm not sure if anyone is experienced with the Smoothwall fire
>>>>>>     wall but
>>>>>>     I have one setup and running well although I have a small problem
>>>>>>     from a
>>>>>>     usability stand point. I need to connect from my green zone to the 
>>>>>> red
>>>>>>     zone using the red zone IP address. We are currently port forwarding
>>>>>>     from red to green and that works fine outside of the lan but when
>>>>>>     we on
>>>>>>     the lan we can't hit the red zone ip. Any help would be appreciated.
>>>>>>
>>>>>>     Evan Brown
>>>>>>
>>>>>>           
> 
> 
> _______________________________________________
> clug-talk mailing list
> [email protected]
> http://clug.ca/mailman/listinfo/clug-talk_clug.ca
> Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
> **Please remove these lines when replying
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFFEbxUwRXgH3rKGfMRAtU8AJ9hiyplm++/+z6vRPSAh43/VNG2MgCcDJN5
Xo6BQKYjB3/y5RhVs6dYaX4=
=+gIA
-----END PGP SIGNATURE-----

_______________________________________________
clug-talk mailing list
[email protected]
http://clug.ca/mailman/listinfo/clug-talk_clug.ca
Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
**Please remove these lines when replying

Reply via email to