I'm not sure I understand how proxy ARP can help me?  All the docs talk about this applying as a 
routing tool.  I DO NOT WANT TO ROUTE PACKETS through the gateway host.  I just want to be able to 
establish a stream (say ssh) from the "main" interface without responses going out the 
"spoofed" interfaces.  That is the behavior I observe via snoop - packets come in on 
interfaceB from the REAL netA, response packets are sent out the SPOOFED NetA interface.

NetA (intranet cloud) interfaceB [gateway server] SPOOFED NetA interface

A packet traveling from NetA on the left, through the intranet cloud to 
interfaceB on the gateway box makes it just fine, but the gateway sees the 
spoofed NetA on an alternate interface as the shortest return path and sends 
response packets out the SPOOFED NetA interface.  I don't want this.

Every diagram I've seen describe ipnat as rewriting addresses BEFORE packets reach the 
kernel, so I thought what I want to do is rewrite the source address of incoming packets 
on interfaceB to ANYTHING besides "NetA", so that responses bounce back out 
interfaceB vs. getting sent to the spoofed NetA interface on the gateway machine.

I don't see how to apply proxy ARP to this situation, and further, I'm not clear that plumbing up 
an alternate "NetA" ipaddress on interfaceB will help either?  I can see that if I 
combine "interfaceB" and SPOOFED NetA on the same interface I might get the results I'm 
looking for, but I'm not entirely happy combining both networks into the same broadcast domain..  
That's what your second suggestion really is, right?  That really only addresses ONE case - there 
could be, for instance, cases where I want to get traffic from one of the other real networks that 
are being spoofed on the other side of the gateway machine.  Hmn..  I suppose I could simply put 
ALL networks on the same physical interface - I don't plan on there being lots of machines out 
there, this is just a DMZ like situation for temporary access to machines that would otherwise be 
inaccessible....

Thanks for the input - I'm sure telling dumbass folks how to do their job 
looses it's thrill after a time..  ;-)


Darren Reed wrote, On 5/19/07 2:43 AM:
I think what you really needs is to use proxy ARP.

It would be better if you could give the 192.129.119.2 interface an
additional
address as an alias in the 10 network.

Darren


ORIGINAL thread:
Eric Timberlake wrote, On 5/18/07 10:41 PM:
I'm trying to create a set of NAT rules to deal with a situation I'm having.

I have a "spoofed" network to support moving large systems between a private network and a shared intranet. The issue is when I want to get from a system on the REAL network 10.1.1.0 to the gateway machine at 192.29.113.2, response traffic is directed out this "spoofed" 10.1.1.0 network vs. back through the intranet cloud.

(SIMPLE block, the dashes represent host with 4 interfaces)

                                      --- 10.1.0.0
10.1.1.0 (Intranet cloud)192.29.113.2 --- 10.1.1.0
                                      --- 10.1.2.0


I believe that I should be able to NAT at the 192.29.113.2 interface before the packet reaches the kernel, so that it maps to something OTHER than coming from 10.1.1.0 so responses go back OUT the 192.29.113.2 interface like I desire.

So far I haven't been able to do much but create configs that have no effect, or simply won't stand up to rule check.

Some people say I should use RDR, some suggest MAP - but nothing I have done so far is helping at all..

Reply via email to