--On Thursday, January 23, 2003 8:36 PM +0100 Sandro Minola <[EMAIL PROTECTED]> wrote:


A real "belt and suspenders" setup :-)
Sorry, I don't understand this saying. What does it mean? (must be funny
;))
It refers to a cautious man who wears a belt around his waist as well as suspenders (straps over his shoulders) to hold up his pants.


No -- Not if:

a) The addresses correspond to different zones; or
b) The addresses are in the same zone but you have either
intra-zone rules
or an intra-zone policy for that zone.
aehm, hmm....,ok
A question to make it clear for me:
_If_ I use multiple IP adresses for one interface AND don't list each
corresponding IP/network in the hosts file AND want to route between them,
THEN I need the multi option.
Yes -- unless you have a policy for that zone to itself. So this works:

/etc/shorewall/zones

foo bar baz

/etc/shorewall/interfaces

foo eth1 ...

/etc/shorewall/policy

foo foo ACCEPT

In this case, even if eth1 has multiple addresses, there is no need for 'multi'.

In the following setup, hosts on 10.0.0.0/24, 10.0.1.0/24 and on
192.168.0.0/24 can access each other without specifying the multi option?:
/etc/shorewall/zones:
srv	Servers	Server Zone
cli	Clients	Client Zone
exa	Example	Example Zone for the "detect" question

/etc/shorewall/interfaces:
-	eth1	detect	#no options

/etc/shorewall/hosts:
srv	eth1:10.0.0.0/24		dhcp
cli	eth1:10.0.1.0/23		dhcp
exa	eth1:192.168.0.0/24	#no options

eth1 has the following IPs (done in the Bering interface config)
10.0.0.1/22
192.168.0.1/24
In this case, there is no need for 'multi' since each subnet is a separate zone.


Yes -- "detect" only detects the first broadcast address.
So, in the example above, the "detect" in the interfaces file would be
wrong! I'd need:
/etc/shorewall/interfaces:
-	eth1	10.0.3.255,192.168.0.255	#no options

Right?
Correct.


One more comment -- if you plan to define rules between the client and
server zones, what you are implementing is little more than "security
through obscurity" and in this case, it's not even very obscure. Any user
with administrative privileges on their client machine can change the
netmask and access any server they choose.
Yes, you're right, that would be "security through obscurity"! But I don't
want to control traffic from the servers to the clients (or vice-versa). I
want to control traffic coming from the branch offices to the servers and
clients. Especially, I don't want that hosts on remote networks can access
the clients on the LAN.
Good!

-Tom
--
Tom Eastep   \ Shorewall - iptables made easy
AIM: teastep  \ http://www.shorewall.net
ICQ: #60745924 \ [EMAIL PROTECTED]


-------------------------------------------------------
This SF.NET email is sponsored by:
SourceForge Enterprise Edition + IBM + LinuxWorld = Something 2 See!
http://www.vasoftware.com
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to