/* HINT: Search archives @ http://www.indyramp.com/masq/ before posting! 
/* ALSO: Don't quote this header. It makes you look lame :-) */


Hi
I talk to the net via a diskless firewall box running Linux 2.2.17. 
I am currently using ipchains and ipmasqadm.
I would like to deny all external access to my internal network and to
the firewall,  with the  exception of  port 22 (sshd)  which is  to be
forwarded to a box on my internal network.  I must accept responses to
connections initiated by the internal network.
I would  like to preserve ftp  and telnet access to  the firewall box,
but only from the internal network. 

In  other  words, I  want  to deny  all  incoming  connections on  the
external  interface, unless they  are responses  to packets  that have
been rewritten by  the forwarding mechanism. (Currently I  do this with
tcpd, which only allows ftp  and telnet access from the local network,
but I want something better than this.) 

If it  is not possible  to do this with  2.2.17/ipchains/ipmasqadm, is
there another mechanism that will run under Linux which will do this? 
And again,  if it is not possible  with 2.2.17/ipchains/ipmasqadm, why
not? Isn't  this the functionality  that everyone wants? And  isn't it
trivial to implement  given that ipmasq presumably keeps  track of the
packets it has  rewritten, and the responses to  those packets should,
again  presumably,  carry  the  request  packets'  unique  identifiers
somewhere within them?

Thanks,
chris

_______________________________________________
Masq maillist  -  [EMAIL PROTECTED]
Admin requests can be handled at http://www.indyramp.com/masq-list/ -- 
THIS INCLUDES UNSUBSCRIBING!
or email to [EMAIL PROTECTED]

PLEASE read the HOWTO and search the archives before posting.
You can start your search at http://www.indyramp.com/masq/
Please keep general linux/unix/pc/internet questions off the list.

Reply via email to