HI Calvin,


Bering and Bering uClibc are kissing cousins, so what you find in the original Bering docs are relevant to Bering uClibc. Any differences are noted in the uClibc docs.


Check out:
http://leaf.sourceforge.net/doc/guide/binstall.html - Bering Install guide
http://leaf.sourceforge.net/doc/guide/busers.html - Bering Users Guide
http://leaf.sourceforge.net/doc/guide/buc-install.html - Bering-uClibc Installation Guide
http://leaf.sourceforge.net/doc/guide/buc-user.html - Bering-uClibc User's Guide


As far as your requirements, I think you'll find either to be up to snuff, with the exception there is no web based configuration at this time. All CLI baby....

Don't forget to backup your disk after making changes, as they will be lost upon reboot if you don't.

Good Luck

Tony



Calvin Webster wrote:

Well, I've gotten no responses from the list so I think I'm going with
the "Bering-uClibc" distribution since it seems to be more actively
maintained than most of the others and apparently can handle the
multiple interfaces I'll need. Hopefully, someone will chime in with
some pointers when they get the time.

From what I've found so far, there is precious little "real"
documentation on installation, configuration, and implementation. A nice
HTML or PDF User Guide would be nice.

Thanks in advance for any suggestions. :-)

--Cal Webster

On Tue, 2004-03-16 at 18:17, Calvin Webster wrote:


I've been looking over the LEAF distros for a candidate to build a set
of border firewall/routers. They are to replace existing devices built
with PC hardware and commercial DOS-based firewall software.

I have several questions. Here are a few to start:

1. Given the details below, which distro would be most appropriate?
2. Given the firewall/routing requirements, which dynamic routing
protocols would be recommended.
3. Suggestions on configuring IPSEC VPNs over the untrusted networks?

I have given an outline of the project below. This is a fictitious
network, but representative of the real project. Details of
infrastructure have been obfuscated, but the outline describes project
parameters.

Please let me know if I've left out anything.

Thanks!

--Cal Webster



There are 4 devices, one in each building at our site. Two of the new
firewalls will run on the older hardware, while the other two will run
on recently purchased hardware stored in DiskOnChip. Eventually, I want
to replace all older platforms with newer machines and run them from
DiskOnChip or straight Flash memory. I have some 40 GB hard drives
installed in the new machines on which I plan to build the custom
kernels and setup the services for testing.

Old Hardware Platform:

Generic Desktop Chassis
   AMD K6-2 336 MHz CPU
   1MB cache
   128 MB RAM
   2 GB HDD
   1.44 FDD
4 3c905 NICs

New Hardware Platform:

Cyber Research 2U rack-mount passive backplane chassis
CPTD CEL/COP-850 All-In-One Single Board Computer
   PIII 850 MHz
   100 MHz front side bus
   Intel 82558 10/100-TX (integrated)
   768 MB RAM
   256 MB DiskOnChip
   1.44 FDD
   USB
4 3C905-TX NIC's

I began building one new machine with RedHat Linux 8 but had to put the
project on hold after finally getting the drivers to work with
DiskOnChip.



Here is a summary of the functionality required:

Firewall: stateful packet inspection
NAT/PAT
IPSEC Auth
IPSEC VPN tunneling
Router:
BGP
RIP
Logging to external syslog server
https/ssh configuration/management tool
Port Knocking to trigger remote vpn/ssh access
Optional user authentication to access Internet
Block outbound traffic by IP,subnet,user,port
Block all inbound traffic from untrusted networks except that which is
initiated from inside
Allow all traffic between trusted networks.
Fastest available link should be chosen when redundant paths exist.



Here is a sketch of the network:


DSL = 500 Kbps ADSL Link
RF1 = 100 Mbps RF Wireless direct point-to-point link
RF2 = 1.5 Mbps RF Wireless direct point-to-point link
ISP = 2 Mbps Cable ISP
PLANn = Fast Ethernet Private LANs within buildings at site.

[PLAN2] [PLAN2] [Remote User]
| | |
[PLAN1] | [PLAN1] | |
| | | | [Internet]
| | | | |
Building A Building B |
[Firewall 1]<-------------[RF1]------------->[Firewall 2]<--->[ISP]
^ \ / ^
\ \ / /
\ [DSL] [DSL] /
\ \ / / \ \ [Internet] / /
\ \ | / /
\ \ | / /
\ \ | / /
\ \ | / /
[RF1] \ | / [RF1]
\ [Corp Network] /
\ ^ /
\ | /
\ | /
\ [DSL] /
\ | /
\ | /
\ | /
Building C [Firewall 3]---[PLAN1]
^ \
| \--[PLAN2]
|
[RF2]
|
|
Building D [Firewall 4]
| |
| |
[PLAN1] |
|
[PLAN2]



Notes:


1. There are 2 Internet connections, a wideband cable ISP connection
(bldg B) and a slower, more problematic DSL connection (bldgs A,B, and
C) through the corporate intranet.
2. All RF links use VPN tunneling directly to private LANs.
3. The 3rd high-speed RF link is redundant (not yet installed)
4. DSL links function as backup VPN tunnels between building PLANs.
5. All PLANs must have routes to all other PLANs
6. Only PLANs and VPNs are trusted networks - all others are "external",
untrusted connections.
7. No external ports are open on any firewalls - only VPN tunnels.
8. No routes will be advertised on external ports.
9. All PLANS must have routes to Internet (bldg B)

Port Configurations:

Firewall 1
[PLAN1] Static, non-routable IP Addr - Local Private Network
[PLAN2] Static, non-routable IP Addr - Local Private Network
[DSL  ] Static non-routable IP Addr - Link to Corp intranet, through to
Internet
[RF1  ] Static non-routable IP Addr - VPN links to Bldgs B and C

Firewall 2
[PLAN1] Static, non-routable IP Addr - Local Private Network
[PLAN2] Static, non-routable IP Addr - Local Private Network
[ISP  ] Static, publicly routable IP Addr. - Internet Link
[DSL  ] Static non-routable IP Addr - Link to Corp intranet, through to
Internet
[RF1  ] Static non-routable IP Addr - VPN links to Bldgs A and C

Firewall 3
[PLAN1] Static, non-routable IP Addr - Local Private Network
[PLAN2] Static, non-routable IP Addr - Local Private Network
[DSL  ] Static non-routable IP Addr - Link to Corp intranet, through to
Internet
[RF1  ] Static non-routable IP Addr - VPN links to Bldgs A and B

Firewall 4
[PLAN1] Static, non-routable IP Addr - Local Private Network
[PLAN2] Static, non-routable IP Addr - Local Private Network
[RF2 ] Static non-routable IP Addr - VPN link to Bldg C




-------------------------------------------------------
This SF.Net email is sponsored by: IBM Linux Tutorials
Free Linux tutorial presented by Daniel Robbins, President and CEO of
GenToo technologies. Learn everything from fundamentals to system
administration.http://ads.osdn.com/?ad_id=1470&alloc_id=3638&op=click
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to