Hi Tom
Hi all

> Those zones aren't nested -- they are disjoint!
Right. Sorry for the disorientation.

> Maximum length of a zone name is 5 characters!
I'm sorry. I forgot about the 5 char limit when I wrote this mail. The real
zone names are 5 or less, I used longer names to make it clear what I mean.
But thank you for notifying!

> servers       eth1:10.0.0.0/24                        dhcp
> clients       eth1:10.0.1.0/24,10.0.2.0/23    dhcp
Yes, of course! Thank you!

> A real "belt and suspenders" setup :-)
Sorry, I don't understand this saying. What does it mean? (must be funny ;))

> No -- Not if:
>
> a) The addresses correspond to different zones; or
> b) The addresses are in the same zone but you have either
> intra-zone rules
> or an intra-zone policy for that zone.
aehm, hmm....,ok
A question to make it clear for me:
_If_ I use multiple IP adresses for one interface AND don't list each
corresponding IP/network in the hosts file AND want to route between them,
THEN I need the multi option.
In the following setup, hosts on 10.0.0.0/24, 10.0.1.0/24 and on
192.168.0.0/24 can access each other without specifying the multi option?:
/etc/shorewall/zones:
srv     Servers Server Zone
cli     Clients Client Zone
exa     Example Example Zone for the "detect" question

/etc/shorewall/interfaces:
-       eth1    detect  #no options

/etc/shorewall/hosts:
srv     eth1:10.0.0.0/24                dhcp
cli     eth1:10.0.1.0/23                dhcp
exa     eth1:192.168.0.0/24     #no options

eth1 has the following IPs (done in the Bering interface config)
10.0.0.1/22
192.168.0.1/24

> Yes -- "detect" only detects the first broadcast address.

So, in the example above, the "detect" in the interfaces file would be
wrong! I'd need:
/etc/shorewall/interfaces:
-       eth1    10.0.3.255,192.168.0.255        #no options

Right?

> One more comment -- if you plan to define rules between the client and
> server zones, what you are implementing is little more than "security
> through obscurity" and in this case, it's not even very obscure. Any user
> with administrative privileges on their client machine can change the
> netmask and access any server they choose.

Yes, you're right, that would be "security through obscurity"! But I don't
want to control traffic from the servers to the clients (or vice-versa). I
want to control traffic coming from the branch offices to the servers and
clients. Especially, I don't want that hosts on remote networks can access
the clients on the LAN.

--
Sandro Minola           | LEAF Developer (http://leaf.sourceforge.net)
mailto:[EMAIL PROTECTED] | mailto:[EMAIL PROTECTED]
http://www.minola.ch    | http://leaf.sourceforge.net/devel/sminola




-------------------------------------------------------
This SF.NET email is sponsored by:
SourceForge Enterprise Edition + IBM + LinuxWorld = Something 2 See!
http://www.vasoftware.com
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to