Hello all, Well, I was all ready to send the message below when I discovered what the real problem is... the gateway was set wrong in the unreachable box... so it couldn't route the packets back to the client.
I include the following as an example of some working settings, though they are not the safest, they can be tightened. I'm sure there are others on the list which can critique them. My next step will be to ensure the only packets into the system are destined for the appropriate boxes rather than to anywhere i.e. EXTERN_TCP_PORT0="0/0_www_231.123.123.242" EXTERN_TCP_PORT1="<my_static_IP>_ssh_231.123.123.242" instead of EXTERN_TCP_PORTS="0/0_ssh 0/0_www 0/0_ftp 0/0_20" There are more, but you get the idea. Personally, I found this list to be a wealth of configuration info and helped me learn the DCD/LRP. So I submit this to the archives ;-) ___________________ begin original message ___________________ Hello again, It's been a long learning curve, but I feel I have most everything pulled together. I still have a problem that when installed, the router will only let me SSH into one of two servers, the .243 box. None of the forwarded services to .242 respond at all. The .244 box (part distraction, part sacrificial lamb & 100% MacOS) is not online so I can't say if that is working as yet. I took the approach of simplifying all the settings and therefore offering the least security but also the least obscuring to protocols. I can refine after it works, but at present that is not the case. But I guess that's blatantly obvious ;-! So, below you will find some grep'd files removing comments and altering the _insignificant_ IP numbers. The subnet and the last octal are real, only the names have been changed to protect... oops pop-culture strikes again. Well this net is certainly becoming a 'Drag' so I suppose that slip was appropriate =8@ _________________________ begin network.conf #cat /etc/network.conf IF_AUTO="eth0 eth1 eth2" eth0_IPADDR=231.123.123.241 eth0_MASKLEN=29 eth0_BROADCAST=+ eth0_DEFAULT_GW=231.123.123.246 eth0_IP_EXTRA_ADDRS="231.123.123.242 231.123.123.243 231.123.123.244" eth0_IP_SPOOF=YES eth0_IP_KRNL_LOGMARTIANS=YES eth0_IP_SHARED_MEDIA=NO eth0_BRIDGE=NO eth0_PROXY_ARP=NO eth0_FAIRQ=NO eth1_IPADDR=192.168.70.254 eth1_MASKLEN=24 eth1_BROADCAST=+ eth1_IP_SPOOF=YES eth1_IP_KRNL_LOGMARTIANS=YES eth1_IP_SHARED_MEDIA=NO eth1_BRIDGE=NO eth1_PROXY_ARP=NO eth1_FAIRQ=NO eth2_IPADDR=192.168.71.254 eth2_MASKLEN=24 eth2_BROADCAST=+ eth2_IP_SPOOF=YES eth2_IP_KRNL_LOGMARTIANS=YES eth2_IP_SHARED_MEDIA=NO eth2_BRIDGE=NO eth2_PROXY_ARP=NO eth2_FAIRQ=NO IPFILTER_SWITCH=firewall EXTERN_IF="eth0" EXTERN_DHCP=NO EXTERN_DYNADDR=NO EXTERN_UDP_PORTS="0/0_domain" EXTERN_TCP_PORTS="0/0_ssh 0/0_www 0/0_ftp 0/0_20" INTERN_IF="eth1" INTERN_NET=192.168.70.0/24 INTERN_IP=192.168.70.254 MASQ_SWITCH=YES INTERN_SERVERS="tcp_231.123.123.244_20_192.168.71.244_20 tcp_231.123.123.244_ftp_192.168.71.244_ftp tcp_231.123.123.242_www_192.168.71.242_www tcp_231.123.123.243_ssh_192.168.71.243_ssh tcp_231.123.123.242_ssh_192.168.71.242_ssh" DMZ_SWITCH=YES DMZ_IF="eth2" DMZ_NET=192.168.71.0/24 DMZ_SRC=231.123.123.240/29 DMZ_EXT_ADDRS="$eth0_DEFAULT_GW $EXTERN_IP" DMZ_HIGH_TCP_CONNECT=NO DMZ_CLOSED_DEST="tcp_${DMZ_NET}_6000:6004 tcp_${DMZ_NET}_7100" DMZ_OPEN_DEST=" udp_${DMZ_NET}_domain tcp_${DMZ_NET}_domain icmp_${DMZ_NET}_: tcp_231.123.123.242_www tcp_231.123.123.242_ssh tcp_231.123.123.244_20 tcp_231.123.123.244_ftp tcp_231.123.123.243_ssh" DMZ_OUTBOUND_ALL=YES ___________________ end settings _____________________________ #ipchains -L -n -v #*** only TCP and ALL are shown. UDP etc. have been stripped! Chain input (policy ACCEPT: 0 packets, 0 bytes): target prot ifname source destination ports ACCEPT tcp eth0 0.0.0.0/0 0.0.0.0/0 * -> 22 ACCEPT tcp eth0 0.0.0.0/0 0.0.0.0/0 * -> 80 ACCEPT tcp eth0 0.0.0.0/0 0.0.0.0/0 * -> 21 ACCEPT tcp eth0 0.0.0.0/0 0.0.0.0/0 * -> 20 REJECT tcp eth0 0.0.0.0/0 0.0.0.0/0 * -> 113 ACCEPT tcp eth0 0.0.0.0/0 0.0.0.0/0 * -> 1024:65535 DENY all eth0 0.0.0.0/0 0.0.0.0/0 n/a ACCEPT all * 0.0.0.0/0 0.0.0.0/0 n/a Chain forward (policy DENY: 0 packets, 0 bytes): target prot ifname mark outsize source destination ports MASQ tcp * 192.168.71.244 0.0.0.0/0 20 -> * MASQ tcp * 192.168.71.244 0.0.0.0/0 21 -> * MASQ tcp * 192.168.71.242 0.0.0.0/0 80 -> * MASQ tcp * 192.168.71.243 0.0.0.0/0 22 -> * MASQ tcp * 192.168.71.242 0.0.0.0/0 22 -> * MASQ all eth2 192.168.70.0/24 192.168.71.0/24 n/a REJECT tcp eth2 0.0.0.0/0 192.168.71.0/24 * -> 6000:6004 REJECT tcp eth2 0.0.0.0/0 192.168.71.0/24 * -> 7100 ACCEPT tcp eth2 0.0.0.0/0 192.168.71.0/24 * -> 53 ACCEPT tcp eth2 0.0.0.0/0 231.123.123.242 * -> 80 ACCEPT tcp eth2 0.0.0.0/0 231.123.123.242 * -> 22 ACCEPT tcp eth2 0.0.0.0/0 231.123.123.244 * -> 20 ACCEPT tcp eth2 0.0.0.0/0 231.123.123.244 * -> 21 ACCEPT tcp eth2 0.0.0.0/0 231.123.123.243 * -> 22 ACCEPT tcp !y eth2 0.0.0.0/0 192.168.71.0/24 * -> 1024:65535 ACCEPT tcp eth0 192.168.71.0/24 0.0.0.0/0 * -> * MASQ all eth0 192.168.70.0/24 0.0.0.0/0 n/a DENY all eth2 0.0.0.0/0 192.168.71.0/24 n/a DENY all * 0.0.0.0/0 0.0.0.0/0 n/a Chain output (policy ACCEPT: 0 packets, 0 bytes): target prot ifname mark outsize source destination ports ACCEPT all * 0.0.0.0/0 0.0.0.0/0 n/a Chain fairq (0 references): target prot ifname mark outsize source destination ports RETURN tcp * 0.0.0.0/0 0.0.0.0/0 * -> 179 RETURN tcp * 0.0.0.0/0 0.0.0.0/0 179 -> * RETURN tcp * 0.0.0.0/0 0.0.0.0/0 * -> 53 RETURN tcp * 0.0.0.0/0 0.0.0.0/0 53 -> * RETURN tcp * 0.0.0.0/0 0.0.0.0/0 * -> 23 RETURN tcp * 0.0.0.0/0 0.0.0.0/0 23 -> * RETURN tcp * 0.0.0.0/0 0.0.0.0/0 * -> 22 RETURN tcp * 0.0.0.0/0 0.0.0.0/0 22 -> * #ipmasqadm portfw -ln prot localaddr rediraddr lport rport pcnt pref TCP 231.123.123.242 192.168.71.242 22 22 9 10 TCP 231.123.123.243 192.168.71.243 22 22 6 10 TCP 231.123.123.242 192.168.71.242 80 80 8 10 TCP 231.123.123.244 192.168.71.244 21 21 8 10 TCP 231.123.123.244 192.168.71.244 20 20 10 10 _______________________________________________ Leaf-user mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user