Charles Steinkuehler wrote:

> 
> You *DO* need to have your DMZ system setup correctly, however.  It needs an
> IP in the 291.268.10.0/24 subnet, and it needs to use the DMZ interface of
> the firewall (192.168.10.254) as it's default gateway.

I assume that you meant 192.168.1.0/24. Here is the output from route on
the host:

$ /sbin/route
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use
Iface
192.168.10.0    *               255.255.255.0   U     0      0        0
eth0
127.0.0.0       *               255.0.0.0       U     0      0        0
lo
default         192.168.10.254  0.0.0.0         UG    0      0        0
eth0 

But I still can't browse. In fact I really don't seem to be able to get
past the firewall 
at all. We know pings don't get out. FTP will work between the subnets
but I can't resolve
names outside the firewall. 

> > The DMZ_SERVER settings are going to be a problem though if I can't use
> > a range of addresses. The game servers I am using seem to want udp 27910
> > to 27961
> > and tcp 27950 to 27952. Any suggestions?
> 
> You can do this with the autoforward command, but there are no hooks for
> this in network.conf, so you'll have to manually add the necessary commands.
> The easiest (and most logical) place to put them is probably the
> /etc/ipchains.forward file.  Try getting a simple service (like web or ssh)
> working with the existing network.conf hooks, then add the autoforward rules
> once everything else is working OK.
> 
> NOTE:  You will also need to add some IP Masquerade rules if you want to use
> the public IP of the gameserver from the internal network...these rules can
> go in the ipchains.forward file as well.
> 
> I don't recall off-hand exactly what you'll need for the autoforward and
> masquerade rules, and don't have time to dig into it right now...you can use
> the rules created for the simple service (www/ssh) as an example.  Note that
> you *CAN* use port-ranges in the ipchains masquerade rules, just not when
> doing port-forwarding.  If memory serves, you'll wind up with a port-forward
> rule for each service (auto-forward for your game-server range), and a
> reverse-masquerade rule to the internal network for each service or
> port-range.

OK Here is what I thought would work:
$IPCHAINS -A input -s 0/0 -d $EXTERN_IP/32 4242 -p tcp -j ACCEPT
$IPCHAINS -A input -s 0/0 -d $EXTERN_IP/32 27901 -p tcp -j ACCEPT
$IPCHAINS -A input -s 0/0 -d $EXTERN_IP/32 27901 -p udp -j ACCEPT
$IPCHAINS -A input -s 0/0 -d $EXTERN_IP/32 27910:27961 -p udp -j ACCEPT
$IPCHAINS -A input -s 0/0 -d $EXTERN_IP/32 27950:27952 -p tcp -j ACCEPT

$IPMASQADM portfw -a -P tcp -L $EXTERN_IP 4242 -R 192.168.10.1 4242
$IPMASQADM portfw -a -P tcp -L $EXTERN_IP 27901 -R 192.168.10.1 27901
$IPMASQADM portfw -a -P udp -L $EXTERN_IP 27901 -R 192.168.10.1 27901
$IPMASQADM autofw -A -r udp 27910 27961 -h 192.168.10.1
$IPMASQADM autofw -A -r tcp 27950 27952 -h 192.168.10.1

But I get :
Starting Network: [IP Always Defrag: ENABLED]
   IP filters: 1: not found
1: not found
1: not found
1: not found
1: not found
firewall [IP Forwarding: ENABLED]
   Loopback interface: lo
   Starting interface: eth1 eth2
   Hostname: markii
   Static NS: 4 hosts

I don't see where this is coming from at all.



> Good luck, if you have problems, post details...if no one else can help, I
> hope to be around some Tuesday.
Thanks,
I hope to finish this up soon,

Kory


_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user

Reply via email to