Hello all,

Well, I was all ready to send the message below when I discovered 
what the real problem is... the gateway was set wrong in the 
unreachable box... so it couldn't route the packets back to the 
client.

I include the following as an example of some working settings, 
though they are not the safest, they can be tightened. I'm sure there 
are others on the list which can critique them. My next step will be 
to ensure the only packets into the system are destined for the 
appropriate boxes rather than to anywhere i.e.
        EXTERN_TCP_PORT0="0/0_www_231.123.123.242"
        EXTERN_TCP_PORT1="<my_static_IP>_ssh_231.123.123.242"
instead of
        EXTERN_TCP_PORTS="0/0_ssh 0/0_www 0/0_ftp 0/0_20"

There are more, but you get the idea. Personally, I found this list 
to be a wealth of configuration info and helped me learn the DCD/LRP. 
So I submit this to the archives ;-)

___________________ begin original message ___________________

Hello again,

It's been a long learning curve, but I feel I have most everything 
pulled together. I still have a problem that when installed, the 
router will only let me SSH into one of two servers, the .243 box. 
None of the forwarded services to .242 respond at all. The .244 box 
(part distraction, part sacrificial lamb & 100% MacOS) is not online 
so I can't say if that is working as yet.

I took the approach of simplifying all the settings and therefore 
offering the least security but also the least obscuring to 
protocols. I can refine after it works, but at present that is not 
the case. But I guess that's blatantly obvious ;-!

So, below you will find some grep'd files removing comments and 
altering the _insignificant_ IP numbers. The subnet and the last 
octal are real, only the names have been changed to protect... oops 
pop-culture strikes again. Well this net is certainly becoming a 
'Drag' so I suppose that slip was appropriate =8@



_________________________ begin network.conf

#cat /etc/network.conf

IF_AUTO="eth0 eth1 eth2"

eth0_IPADDR=231.123.123.241
eth0_MASKLEN=29
eth0_BROADCAST=+
eth0_DEFAULT_GW=231.123.123.246
eth0_IP_EXTRA_ADDRS="231.123.123.242
                         231.123.123.243
                         231.123.123.244"
eth0_IP_SPOOF=YES
eth0_IP_KRNL_LOGMARTIANS=YES
eth0_IP_SHARED_MEDIA=NO
eth0_BRIDGE=NO
eth0_PROXY_ARP=NO
eth0_FAIRQ=NO

eth1_IPADDR=192.168.70.254
eth1_MASKLEN=24
eth1_BROADCAST=+
eth1_IP_SPOOF=YES
eth1_IP_KRNL_LOGMARTIANS=YES
eth1_IP_SHARED_MEDIA=NO
eth1_BRIDGE=NO
eth1_PROXY_ARP=NO
eth1_FAIRQ=NO

eth2_IPADDR=192.168.71.254
eth2_MASKLEN=24
eth2_BROADCAST=+
eth2_IP_SPOOF=YES
eth2_IP_KRNL_LOGMARTIANS=YES
eth2_IP_SHARED_MEDIA=NO
eth2_BRIDGE=NO
eth2_PROXY_ARP=NO
eth2_FAIRQ=NO

IPFILTER_SWITCH=firewall

EXTERN_IF="eth0"
EXTERN_DHCP=NO
EXTERN_DYNADDR=NO

EXTERN_UDP_PORTS="0/0_domain"
EXTERN_TCP_PORTS="0/0_ssh 0/0_www 0/0_ftp 0/0_20"

INTERN_IF="eth1"
INTERN_NET=192.168.70.0/24
INTERN_IP=192.168.70.254

MASQ_SWITCH=YES

INTERN_SERVERS="tcp_231.123.123.244_20_192.168.71.244_20
                 tcp_231.123.123.244_ftp_192.168.71.244_ftp
                 tcp_231.123.123.242_www_192.168.71.242_www
                 tcp_231.123.123.243_ssh_192.168.71.243_ssh
                 tcp_231.123.123.242_ssh_192.168.71.242_ssh"

DMZ_SWITCH=YES
DMZ_IF="eth2"
DMZ_NET=192.168.71.0/24

DMZ_SRC=231.123.123.240/29

DMZ_EXT_ADDRS="$eth0_DEFAULT_GW $EXTERN_IP"

DMZ_HIGH_TCP_CONNECT=NO
DMZ_CLOSED_DEST="tcp_${DMZ_NET}_6000:6004 tcp_${DMZ_NET}_7100"

DMZ_OPEN_DEST=" udp_${DMZ_NET}_domain
                 tcp_${DMZ_NET}_domain
                 icmp_${DMZ_NET}_:
                 tcp_231.123.123.242_www
                 tcp_231.123.123.242_ssh
                 tcp_231.123.123.244_20
                 tcp_231.123.123.244_ftp
                 tcp_231.123.123.243_ssh"

DMZ_OUTBOUND_ALL=YES

___________________ end settings _____________________________

#ipchains -L -n -v

#*** only TCP and ALL are shown. UDP etc. have been stripped!

Chain input (policy ACCEPT: 0 packets, 0 bytes):
target  prot ifname     source  destination     ports
ACCEPT  tcp     eth0    0.0.0.0/0       0.0.0.0/0       * -> 22
ACCEPT  tcp     eth0    0.0.0.0/0       0.0.0.0/0       * -> 80
ACCEPT  tcp     eth0    0.0.0.0/0       0.0.0.0/0       * -> 21
ACCEPT  tcp     eth0    0.0.0.0/0       0.0.0.0/0       * -> 20
REJECT  tcp     eth0    0.0.0.0/0       0.0.0.0/0       * -> 113
ACCEPT  tcp     eth0    0.0.0.0/0       0.0.0.0/0       * -> 1024:65535
DENY    all     eth0    0.0.0.0/0       0.0.0.0/0       n/a
ACCEPT  all     *       0.0.0.0/0       0.0.0.0/0       n/a

Chain forward (policy DENY: 0 packets, 0 bytes):
target  prot ifname     mark    outsize  source destination     ports
MASQ    tcp     *       192.168.71.244  0.0.0.0/0       20 -> *
MASQ    tcp     *       192.168.71.244  0.0.0.0/0       21 -> *
MASQ    tcp     *       192.168.71.242  0.0.0.0/0       80 -> *
MASQ    tcp     *       192.168.71.243  0.0.0.0/0       22 -> *
MASQ    tcp     *       192.168.71.242  0.0.0.0/0       22 -> *
MASQ    all     eth2    192.168.70.0/24 192.168.71.0/24 n/a
REJECT  tcp     eth2    0.0.0.0/0       192.168.71.0/24 * -> 6000:6004
REJECT  tcp     eth2    0.0.0.0/0       192.168.71.0/24 * -> 7100
ACCEPT  tcp     eth2    0.0.0.0/0       192.168.71.0/24 * -> 53
ACCEPT  tcp     eth2    0.0.0.0/0       231.123.123.242 * -> 80
ACCEPT  tcp     eth2    0.0.0.0/0       231.123.123.242 * -> 22
ACCEPT  tcp     eth2    0.0.0.0/0       231.123.123.244 * -> 20
ACCEPT  tcp     eth2    0.0.0.0/0       231.123.123.244 * -> 21
ACCEPT  tcp     eth2    0.0.0.0/0       231.123.123.243 * -> 22
ACCEPT  tcp !y eth2     0.0.0.0/0       192.168.71.0/24 * -> 1024:65535
ACCEPT  tcp     eth0    192.168.71.0/24 0.0.0.0/0       * -> *
MASQ    all     eth0    192.168.70.0/24 0.0.0.0/0       n/a
DENY    all     eth2    0.0.0.0/0       192.168.71.0/24 n/a
DENY    all     *       0.0.0.0/0       0.0.0.0/0       n/a

Chain output (policy ACCEPT: 0 packets, 0 bytes):
target  prot ifname     mark    outsize  source destination     ports
ACCEPT  all     *       0.0.0.0/0       0.0.0.0/0       n/a

Chain fairq (0 references):
target  prot ifname     mark    outsize  source destination     ports
RETURN  tcp     *       0.0.0.0/0       0.0.0.0/0       * -> 179
RETURN  tcp     *       0.0.0.0/0       0.0.0.0/0       179 -> *
RETURN  tcp     *       0.0.0.0/0       0.0.0.0/0       * -> 53
RETURN  tcp     *       0.0.0.0/0       0.0.0.0/0       53 -> *
RETURN  tcp     *       0.0.0.0/0       0.0.0.0/0       * -> 23
RETURN  tcp     *       0.0.0.0/0       0.0.0.0/0       23 -> *
RETURN  tcp     *       0.0.0.0/0       0.0.0.0/0       * -> 22
RETURN  tcp     *       0.0.0.0/0       0.0.0.0/0       22 -> *

#ipmasqadm portfw -ln

prot localaddr            rediraddr               lport    rport  pcnt  pref
TCP  231.123.123.242       192.168.71.242             22       22     9    10
TCP  231.123.123.243       192.168.71.243             22       22     6    10
TCP  231.123.123.242       192.168.71.242             80       80     8    10
TCP  231.123.123.244       192.168.71.244             21       21     8    10
TCP  231.123.123.244       192.168.71.244             20       20    10    10

_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user

Reply via email to