Charles,

Thanks for this.  I didn't expect to get an answer from the author of
Dachstein etc.

I'll let all know how I fare.

Bill Dudley


On 11/5/10, Charles Steinkuehler <char...@steinkuehler.net> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On 11/4/2010 8:11 PM, wfdudley wrote:
>> I'll stop being grumpy now.
>>
>> I was just dismayed that the docs for this are, um, more diffuse that my
>> old
>> LRP install.
>>
>> I'd suggest that the floppy is way past it's time, and now its time to
>> make a LRP
>> release that assumes real storage, like a 250Meg CF card, or other solid
>> state
>> "disk drive".  Then you can have the docs, a real editor, even a real GUI
>> if
>> somebody gets ambitious and codes it up.
>>
>> So: my REAL problem.
>>
>> My ISP (and my employer) gives me a block of 16 public IP addresses.
>> xxx.xxx.xxx.16/28
>> xxx.xxx.xxx.17 is the pipeline
>> xxx.xxx.xxx.18 is the WAN port on the firewall
>> The LAN port is 192.168.1.254, for laptops, Winders boxes, other stuff
>> without fixed
>> address
>> The DMZ port is xxx.xxx.xxx.16/28.  The current LRP/Dachstein uses Proxy
>> Arp
>> (not bridging, I was mistaken, the m0n0wall does bridged firewall) so that
>> the
>> servers on the DMZ have some ports visible to the outside world.
>>
>> The shorewall docs say "use the three port example -- unless you've got
>> multiple
>> IPs, in which case, never mind, you'll have to read all the docs".
>> I'm paraphrasing,
>> obviously.  This is about when I threw up my hands.
>
> This is virtually identical to my setup here (one reason you probably
> find the DachStein scripts easy to use...I set them up to do pretty much
> exactly what you want).  While I have migrated from leaf to a minimal
> debian install, I still use shorewall to create and control my firewall.
>  Tom has made this *MUCH* easier and more flexible than the scripts I
> crafted back in the *Stein days.
>
> I believe part of your problem is you are trying to make things harder
> than they really are.  In my setup, I use the network setup scripts (ie:
> /etc/network/interfaces and sub-scripts) to setup the basic routing,
> tell shorewall to turn on the proxy-arp flag, and that's about it.  The
> low-level network setup is identical to what you have to do for
> DachStein, you're just switching to the Shorewall scripts to craft the
> ipchains/iptables rules.
>
> To provide some concrete examples:
>
> Use /etc/network/interfaces to bring up two ports with identical IP
> address and network configuration, then use the routing tables to
> control which IP addresses appear on which interfaces:
>
> # Upstream link
> auto eth0
> iface eth0 inet static
>         address 70.184.225.178
>         netmask 255.255.255.240
>         gateway 70.184.225.177
>         # Proxyarp: Add specific routes to hosts on this nic
>         up ip route add 70.184.225.177/32 dev eth0
>
> # DMZ
> auto eth2
> iface eth2 inet static
>         address 70.184.225.178
>         netmask 255.255.255.240
>         # Proxyarp: Add specific routes to hosts on this nic
>         up ip route add 70.184.225.176/29 dev eth2
>         up ip route add 70.184.225.184/29 dev eth2
>
> Note there is a single host route (the /32) to the upstream gateway, and
> everything else is sent to the DMZ interface.  The two 'half network'
> routes (/29) on the DMZ interface are to override the /28 route which
> points to both interfaces and is created by default when you bring up
> the interface.
>
> Once your routing is in place, all you have to do in shorewall is add
> the proxyarp flag to the interface in the interfaces file:
>
> <snippet /etc/shorewall/interfaces>
> net     eth0   detect          proxyarp,tcpflags,blacklist,norfc1918
> loc     eth1   detect          dhcp
> dmz     eth2   detect          proxyarp
> </snippet>
>
> You can now freely create shorewall rules to allow traffic through the
> firewall, ie:
>
> <snippet /etc/shorewall/rules>
> ACCEPT  all  dmz:70.184.225.183  tcp  smtp,smtps,pop-3,imap2,imaps,www
> </snippet>
>
> - --
> Charles Steinkuehler
> char...@steinkuehler.net
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.10 (MingW32)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
>
> iEYEARECAAYFAkzUHjoACgkQLywbqEHdNFx1LgCg6pc+tTAW+6kOLVE9Mb5DL24Z
> coUAn1I+NH9Usi0Q3eHYMCPxxDNTg9wZ
> =BJNV
> -----END PGP SIGNATURE-----
>

------------------------------------------------------------------------------
The Next 800 Companies to Lead America's Growth: New Video Whitepaper
David G. Thomson, author of the best-selling book "Blueprint to a 
Billion" shares his insights and actions to help propel your 
business during the next growth cycle. Listen Now!
http://p.sf.net/sfu/SAP-dev2dev
------------------------------------------------------------------------
leaf-user mailing list: leaf-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/leaf-user
Support Request -- http://leaf-project.org/

Reply via email to