On May 20, 2005, at 6:38 PM, Antoine Jacoutot wrote:
Jason Dixon a icrit :
What do you mean by "separate"? If you're using a bridge, that
suggests you're *bridging* them together. Routing denotes some level
os separation. The purpose of a DMZ is to isolate hostile traffic.
If you're going to bridge this traffic with your LAN, you don't
really have a DMZ.
Allright, I'll try to make myself more clear :)
Let's assume that for now, I only have one LAN nated behind an OpenBSD
firewall. Some servers on the LAN are accessible from the Internet
thanks to port forwarding.
Now, I would like to put those servers in another network segment so
that I could filter what's coming from the Internet (since they will
be behind the firewall, just like they are now) and in the meanwhile,
I could also filter traffic from/to this new segment (which I
uncorrectly called DMZ) from/to the LAN, without changing their
original private IPs. So, the firewall would have an external IP and 2
internal IP-less NICs.
Does this make more sense ? I hope so, I'm trying my best English here
:)
You make an offline reference to an older post of mine:
http://groups.google.fr/group/bit.listserv.openbsd-pf/browse_thread/
thread/7bb34e55a427335f/e19f13527f090b56?
q=filtering+bridge+lan+dmz&rnum=44&hl=fr#e19f13527f090b56
Yes, this sounds similar to what you want to do. So basically, you
want to bridge $ext_if with $dmz_if, and NAT $lan_if:network to
($ext_if). The NAT will happen first, then the outbound packet should
"see" the DMZ server announcing itself via the arp "proxy". It sounds
possible, although the filtering is bound to be tricky at best.
Rather, I would suggest adding a 4th interface on the WAN. Assign your
NAT external address to the first and use it for NAT traffic with the
LAN. The next WAN interface would be brought up without an IP and
added to bridge0 with the DMZ interface. This way, you can properly
isolate your filtering rules between interfaces without worrying about
any sort of overlap. Filtering bridges can be difficult without adding
this sort of complexity. If you insist on the 3-leg approach, take it
one step at a time and firewalk everything to make sure your rules are
behaving appropriately.
HTH.
--
Jason Dixon
DixonGroup Consulting
http://www.dixongroup.net