Juliano,

Boa noite me desculpe voce tem razao, irei anexar as informações
faltantes solicitadas:
Os testes feitos sao pings para o proprio ip de maquinas externas.
Sim existe um grande e unico motivo hoje a maioria dos meus servidores
de internet estao publicados diretamente com IP VALIDO entao o que eu
preciso fazer e fazer o cadastro dos meus ips validos no meu firewall
e ai ao invez do servidor estar com esse ip valido ele fica no
firewall e eu faco o encaminhamento pro ip da lan.

cat /etc/network/interfaces

iface eth0 inet static
        address 192.168.10.30
        netmask 255.255.255.0
        network 192.168.10.0
        broadcast 192.168.10.255


iface eth1 inet static
      address 200.205.182.94
      netmask 255.255.255.192


iface eth1:1 inet static
      address 200.205.182.68
      netmask 255.255.255.192



iface eth2 inet static
      address 200.212.230.3
      netmask 255.255.255.192


route -n

firewall:~# route -n
Tabela de Roteamento IP do Kernel
Destino         Roteador        MascaraGen.    Opções Métrica Ref   Uso Iface
200.212.230.0   0.0.0.0             255.255.255.192 U     0      0        0 eth2
200.205.182.64  0.0.0.0            255.255.255.192 U     0      0        0 eth1
192.168.100.0   192.168.10.1    255.255.255.0   UG    0      0        0 eth0
192.168.21.0    192.168.10.1    255.255.255.0   UG    0      0        0 eth0
192.168.20.0    192.168.10.1    255.255.255.0   UG    0      0        0 eth0
192.168.50.0    192.168.10.1    255.255.255.0   UG    0      0        0 eth0
192.168.19.0    192.168.10.1    255.255.255.0   UG    0      0        0 eth0
192.168.18.0    192.168.10.1    255.255.255.0   UG    0      0        0 eth0
192.168.17.0    192.168.10.1    255.255.255.0   UG    0      0        0 eth0
192.168.16.0    192.168.10.1    255.255.255.0   UG    0      0        0 eth0
192.168.15.0    192.168.10.1    255.255.255.0   UG    0      0        0 eth0
192.168.30.0    192.168.10.1    255.255.255.0   UG    0      0        0 eth0
192.168.14.0    192.168.10.1    255.255.255.0   UG    0      0        0 eth0
192.168.95.0    192.168.10.1    255.255.255.0   UG    0      0        0 eth0
192.168.13.0    192.168.10.1    255.255.255.0   UG    0      0        0 eth0
192.168.12.0    192.168.10.1    255.255.255.0   UG    0      0        0 eth0
192.168.11.0    192.168.10.1    255.255.255.0   UG    0      0        0 eth0
192.168.10.0    192.168.10.1    255.255.255.0   UG    0      0        0 eth0
192.168.10.0    0.0.0.0             255.255.255.0   U      0      0
    0 eth0
192.168.9.0     192.168.10.1    255.255.255.0    UG    0      0        0 eth0
0.0.0.0         200.212.230.1   0.0.0.0         UG    0      0        0 eth2
0.0.0.0         200.205.182.65  0.0.0.0         UG    0      0        0 eth1


###############Script do IPTABLES################################

touch /var/lock/subsys/local

echo "1" > /proc/sys/net/ipv4/ip_forward
echo "1" > /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts


##########################################GW####################################################
/sbin/route add default gw 200.205.182.65
/sbin/route add default gw 200.212.230.1
################################################################################################


########### Configuracoes  da Redes
##############################################################
/sbin/route add -net 192.168.9.0 netmask 255.255.255.0 gw 192.168.10.1
/sbin/route add -net 192.168.10.0 netmask 255.255.255.0 gw 192.168.10.1
/sbin/route add -net 192.168.11.0 netmask 255.255.255.0 gw 192.168.10.1
/sbin/route add -net 192.168.12.0 netmask 255.255.255.0 gw 192.168.10.1
/sbin/route add -net 192.168.13.0 netmask 255.255.255.0 gw 192.168.10.1
/sbin/route add -net 192.168.14.0 netmask 255.255.255.0 gw 192.168.10.1
/sbin/route add -net 192.168.15.0 netmask 255.255.255.0 gw 192.168.10.1
/sbin/route add -net 192.168.16.0 netmask 255.255.255.0 gw 192.168.10.1
/sbin/route add -net 192.168.17.0 netmask 255.255.255.0 gw 192.168.10.1
/sbin/route add -net 192.168.18.0 netmask 255.255.255.0 gw 192.168.10.1
/sbin/route add -net 192.168.19.0 netmask 255.255.255.0 gw 192.168.10.1
/sbin/route add -net 192.168.20.0 netmask 255.255.255.0 gw 192.168.10.1
/sbin/route add -net 192.168.21.0 netmask 255.255.255.0 gw 192.168.10.1
/sbin/route add -net 192.168.50.0 netmask 255.255.255.0 gw 192.168.10.1
/sbin/route add -net 192.168.30.0 netmask 255.255.255.0 gw 192.168.10.1
/sbin/route add -net 192.168.95.0 netmask 255.255.255.0 gw 192.168.10.1
/sbin/route add -net 192.168.100.0 netmask 255.255.255.0 gw 192.168.10.1
##################################################################################################

################################ Modulos NAT ###################################
/sbin/modprobe ip_tables
/sbin/modprobe ip_nat_ftp
/sbin/modprobe iptable_nat
/sbin/modprobe ip_conntrack_ftp
/sbin/modprobe ip_conntrack
/sbin/modprobe ipt_LOG
/sbin/modprobe ipt_REJECT
/sbin/modprobe ipt_MASQUERADE
################################################################################

#################################Limpando os Filtros############################
iptables -F
iptables -X
iptables -F -t nat
iptables -X -t nat
iptables -F -t mangle
iptables -X -t mangle
################################################################################

####################### Regras Default #########################################
/sbin/iptables -P INPUT DROP
/sbin/iptables -P OUTPUT ACCEPT
/sbin/iptables -P FORWARD DROP
################################################################################

#################### Regras ####################################################
/sbin/iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
/sbin/iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
/sbin/iptables -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
################################################################################

######## loopback  #############################################################
/sbin/iptables -A OUTPUT -s 127.0.0.1 -j ACCEPT
/sbin/iptables -A INPUT -i lo -j ACCEPT
/sbin/iptables -A OUTPUT -o lo -j ACCEPT
################################################################################

##################  Roteamento entre as redes ##################################
/sbin/iptables -A FORWARD  -s 192.168.9.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.9.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -s 192.168.10.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.10.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -s 192.168.11.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.11.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -s 192.168.12.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.12.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -s 192.168.13.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.13.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -s 192.168.14.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.14.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -s 192.168.15.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.15.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -s 192.168.16.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.16.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -s 192.168.17.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.17.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -s 192.168.18.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.18.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -s 192.168.19.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.19.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -s 192.168.20.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.20.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -s 192.168.21.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.21.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -s 192.168.93.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.93.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -s 192.168.94.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.94.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -s 192.168.95.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.95.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -s 192.168.96.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.96.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -s 192.168.97.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.97.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -s 192.168.98.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.98.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -s 192.168.99.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.99.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -s 192.168.30.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.30.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -s 192.168.100.0/24 -j ACCEPT
/sbin/iptables -A FORWARD  -d 192.168.100.0/24 -j ACCEPT
############################################################################

############# Acesso redes ##################################################
/sbin/iptables -A INPUT  -s 192.168.9.0/24 -j ACCEPT
/sbin/iptables -A INPUT  -s 192.168.10.0/24 -j ACCEPT
/sbin/iptables -A INPUT  -s 192.168.11.0/24 -j ACCEPT
/sbin/iptables -A INPUT  -s 192.168.12.0/24 -j ACCEPT
/sbin/iptables -A INPUT  -s 192.168.13.0/24 -j ACCEPT
/sbin/iptables -A INPUT  -s 192.168.14.0/24 -j ACCEPT
/sbin/iptables -A INPUT  -s 192.168.15.0/24 -j ACCEPT
/sbin/iptables -A INPUT  -s 192.168.16.0/24 -j ACCEPT
/sbin/iptables -A INPUT  -s 192.168.17.0/24 -j ACCEPT
/sbin/iptables -A INPUT  -s 192.168.18.0/24 -j ACCEPT
/sbin/iptables -A INPUT  -s 192.168.19.0/24 -j ACCEPT
/sbin/iptables -A INPUT  -s 192.168.20.0/24 -j ACCEPT
/sbin/iptables -A INPUT  -s 192.168.21.0/24 -j ACCEPT
/sbin/iptables -A INPUT  -s 192.168.93.0/24 -j ACCEPT
/sbin/iptables -A INPUT  -s 192.168.94.0/24 -j ACCEPT
/sbin/iptables -A INPUT  -s 192.168.95.0/24 -j ACCEPT
/sbin/iptables -A INPUT  -s 192.168.96.0/24 -j ACCEPT
/sbin/iptables -A INPUT  -s 192.168.97.0/24 -j ACCEPT
/sbin/iptables -A INPUT  -s 192.168.98.0/24 -j ACCEPT
/sbin/iptables -A INPUT  -s 192.168.99.0/24 -j ACCEPT
/sbin/iptables -A INPUT  -s 192.168.30.0/24 -j ACCEPT
/sbin/iptables -A INPUT  -s 192.168.100.0/24 -j ACCEPT
#########################################################################

####################################Liberando
ICMP###########################################################
iptables -A INPUT -p icmp --icmp-type 8 -i eth0 -j ACCEPT
iptables -A INPUT -p icmp --icmp-type 8 -i eth1 -j ACCEPT
#############################################################################################################

######################################## Exchange
###########################################################
/sbin/iptables -t nat -A PREROUTING -i eth1 -p tcp -d 200.205.182.94
--dport 80 -j DNAT --to 192.168.14.4:80
/sbin/iptables -t nat -A PREROUTING -i eth1 -p tcp -d 200.205.182.94
--dport 110 -j DNAT --to 192.168.14.4:110
/sbin/iptables -t nat -A PREROUTING -i eth1 -p tcp -d 200.205.182.94
--dport 53 -j DNAT --to 192.168.14.4:53
/sbin/iptables -t nat -A PREROUTING -i eth1 -p tcp -d 200.205.182.94
--dport 25 -j DNAT --to 192.168.14.4:25
/sbin/iptables -t nat -A PREROUTING -i eth1 -p tcp -d 200.205.182.94
--dport 143 -j DNAT --to 192.168.14.4:143
/sbin/iptables -t nat -A PREROUTING -i eth1 -p tcp -d 200.205.182.94
--dport 443 -j DNAT --to 192.168.14.4:443
/sbin/iptables -t nat -A PREROUTING -i eth1 -p tcp -d 200.205.182.94
--dport 8081 -j DNAT --to 192.168.14.4:8081
##############################################################################################################

##################################Encaminhamento de ETH
VIRTUAL##############################################
#iptables -t nat -I PREROUTING -d 200.205.182.68 -p tcp --dport 80 -j
DNAT --to-destination 192.168.30.1:80
/sbin/iptables -t nat -A PREROUTING -i eth1 -p tcp -d 200.205.182.68
--dport 80 -j DNAT --to-destination 192.168.30.1:80
#################################################################################################################




##############  Regra para o NAT #####################################
/sbin/iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
######################################################################


Acredito que agora contenha todas informações necessario para entender
o pq desse problema.


obrigado,


Fernando Felicissimo












2009/5/20 Juliano F. Ravasi <[email protected]>:
> Fernando Cesario wrote:
>> Estou usando Debian Leny como um firewall e com ele fazendo
>> direcionamentos de ip validos para lan, o problema e que por algum
>> motivo quando eu subo a eth virtual por exemplo eth1:1
>
> Isso não é uma "eth virtual", mas sim, "alias".
>
>> ela sobe
>> normalmente e ai do nada o ip valido atrelado a essa eth virtual para
>> de responder,
>
> Faltam detalhes. Para de responder como? Você verificou isso da própria
> máquina ou de máquinas externas? Como está sua tabela de rotas?
>
>> Alguem teria alguma dica a respeito dessa situacao?
>
> Primeira questão é: para quê você está usando alias de interfaces de
> rede? Existe algum bom motivo?
>
> Falta muita informação sobre o seu problema: como você está
> configurando, como você está detectando que "para de responder", como
> estão suas rotas, como está seu firewall...
>
>
> --
> Juliano F. Ravasi ·· http://juliano.info/
> 5105 46CC B2B7 F0CD 5F47 E740 72CA 54F4 DF37 9E96
>
> "A candle loses nothing by lighting another candle." -- Erin Majors
>
> * NOTE: Don't try to reach me through this address, use "contact@" instead.
>
---------------------------------------------------------------------------
Esta lista é patrocinada pela Conectiva S.A. Visite http://www.conectiva.com.br

Arquivo: http://bazar2.conectiva.com.br/mailman/listinfo/linux-br
Regras de utilização da lista: http://linux-br.conectiva.com.br
FAQ: http://www.zago.eti.br/menu.html

Responder a