hummm.

either he NATs clients source addresses, and follow Bens words, in
whih case, everything will work,
or he doesn't NAT clients source addresses, and then as I said before,
it can't work.

having 2 addresses, 2 ports, ... on the webserver changes nothing. It's a
routing problem, so it doesn't depend on what addresses and ports are 
configured
on the server itself, but on what addresses are to send replies to.


At 22:09 24/10/00 +0900, horio shoichi wrote:

>Thanks. Your reply clarified how your firewalls are working.
>
>
>Back to the point:
>
>Last time I proposed a solution based on two one to one NAT entries which you
>seem to have some difficulty with. So this time I broke it down to potential
>problem area and possible workarounds.
>
>Following is the list of potential problems I currently think of. If this list
>is off your problem, please post it here.
>
>         <OT> Having two address is an essential requirement to find through
>         which interface the request came in to determine what source address
>         should be given to the responding packet. The other technique may be
>         changing port address depending on passing router/firewall, but this
>         technique will be outside of routing decision which bases sorely on
>         destination address so it needs assistance of linux box because
>         normal routing techniques don't work.
>         </OT>
>
>1 Server software doesn't support two ip addresses
>
>   If so, the software must be able to listen to two ports at the same time;
>   if it is also impossible, then there is no way to color the packets to
>   distinguish packet routes; the remaining chance is using replicating 
> server.
>
>2 Operating System doesn't support ip alias
>
>   Situation looks similar to above, but isn't. First, Operating Systems 
> definitely
>   supports more than two ports. And second, seriously, adding a NIC which 
> takes
>   different path from firewall guarantees the packets to have different ip
>   address. Note responding packets are still dispatched to default route, 
> not to
>   the coming firewall directly.
>
>3 NAT doesn't allow two one to one static entries
>
>   You are lucky, since you have linux box on the route. There are a few ways
>   to overcome this problem using linux. I'll describe only a few here.
>
>   o Stop NAT functions on firewall boxes. Instead, let IPMasquerade do NAT.
>     It may be sufficient to replace one firewall NAT with IPMasquerade, 
> though.
>
>   o (This requires firewalls and linux box are not hub dispatched. In 
> other words,
>     linux box must have two heads each of which is directly connected to 
> respective
>     firewall. My knowledge on ipchains, ipfwadm, etc are absolutely nil. 
> So I am not
>     sure if this paragraph makes sense, or better alternative exists.) 
> Depending on
>     source address, linux determines outgoing interface, and submit the 
> packet
>     to the interface, thus to the firewall accordingly. Note that linux 
> box must not
>     modify the packet; it's the task of outer entity.
>
>4 ISP doesn't allow "spoofed" packets
>
>   (Since it's not clear where the responce packets are lost, i.e., at 
> NAT, ISP, or
>   at client machine/firewall, this paragraph may not make sense depending 
> on the
>   situation.)
>
>   From ISP's standpoint, outgoing packet that doesn' hold client's source 
> address
>   looks like a malicious activity. OTO, this sort of thing occurs commonly on
>   network relocations. Contact ISP. if you can't persuade them, then 
> contact the
>   other ISP, and switch default route.
>
>   If you still have problem here, then you may be able to resort to the 
> second
>   paragraph of above 3.
>
>If unfortunately you have to use different port, then you have to use the 
>second
>paragraph of above 3, reading "source address" as "source port".
>
>
>
>horio shoichi
>-
>[To unsubscribe, send mail to [EMAIL PROTECTED] with
>"unsubscribe firewalls" in the body of the message.]

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to