>>>>> "Harald" == Harald Welte <[EMAIL PROTECTED]> writes:

    Harald> On Mon, Feb 18, 2002 at 12:44:14AM +0100, Henrik Nordstrom wrote:
    >> On Sunday 17 February 2002 20.06, Harald Welte wrote:
    >> 
    >> > DNAT in output really makes sense. Imagine a proxy running on your
    >> > firewall. The firewall also has a DMZ.  You DNAT inbound http
    >> > requests from the internet into your DMZ.  Now some user of your
    >> > internal network tries to reach the companies own webserver through
    >> > the squid running on the firewall.  The outgoing packets from SQUID
    >> > need to get DNAT'ed into the DMZ.
    >> 
    >> In such case you can simply tell Squid what the real server addresses 
    >> are. No need to go thru DNAT to fool Squid. Simply put the addresses 
    >> into /etc/hosts or a private DNS, or have Squid rewrite the addresses 
    >> on the way.

    Harald> Sorry, but IMHO any of those 'solutions' is ugly. It should just work
    Harald> automagically.

 I agree, since putting that at the netfilter level obviates the need
 for special purpose code in any arbitrary application needing access
 to the DMZ via an IP returned by a DNS lookup that hands back the
 router's external IP.  It also eliminates needing to separately
 configure whatever peice of software that may be, and the requirement
 of an internal DNS server, hosts entry, or separate dmz domain
 visible only from the internal network.

 Think of the www link breakage involved - for from external sites,
 you publish the www.yourdomain.com, but for from internal, you must
 publish the www.dmz.yourdomain.com?  It's much simpler to make it
 possible to configure that in one place only - a single NAT rule in
 the netfilter OUTPUT table.

-- 
mailto: (Karl M. Hegbloom) [EMAIL PROTECTED]
Free the Software  http://www.debian.org/social_contract
http://www.microsharp.com
phone://USA/WA/360-260-2066

Reply via email to