Answering backwards...

IP aliasing is fine with iptables - I have 35 IPs aliased to one NIC and
it works fine

You only need DNAT in PREROUTING and FORWARD rules to allow incoming
traffic to pass through your Gateway.  So I think you have the DNAT
rules right, you just need to add some FORWARD rules - my FORWARD rules
go like this:
iptables -A FORWARD -p tcp -d 192.168.101.54 --dport 80 -j ACCEPT

Where my -d address is obviously internal, so in your case it will be
10.x.x.x

Aldo


> -----Original Message-----
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED]] On Behalf Of John Jones
> Sent: Monday, June 03, 2002 2:59 PM
> To: Iptables
> Subject: Help needed understanding what I am doing wrong.
> 
> 
> I have banged my head for too long, and now it is no longer 
> an exercise in learning IPTABLES, but an exercise in frustration.
> 
> Can someone please help me here? 
> 
>   What I need to do is set up a DMZ firewall that forwards 
> all DNS requests to an internal server (10.0.0.10).
> 
> Once I am shown what I -should- be doing, I can translate all 
> of the other rules that I need to implement, such as the 
> forwarding of HTTP requests on the various external IPs into 
> that same server (10.0.0.10), on different ports.  
> 
> It's that simple.  I am not sure what I am doing wrong, I 
> have used example rules from both the Netfilter HOWTOs, a few 
> of the tutorials I have found, etc.  I am just not able to 
> understand this, it seems.  I am dense.  I apologize if this 
> is a stupid request, but I need to get this firewall 
> replacement finished so that I can move on to more critical 
> issues.  Below is a sample of what I have been trying.
> 
> 
> iptables -t nat -I PREROUTING 1 -p udp -d 66.38.133.113 
> --dport 53 -j DNAT --to 10.0.0.10:53 iptables -I FORWARD 1 -p 
> udp -s 0.0.0.0 -d 10.0.0.10 -j ACCEPT iptables -t nat -I 
> PREROUTING 1 -p udp -d 66.38.133.114 --dport 53 -j DNAT --to 
> 10.0.0.10:53 
> iptables -t nat -I POSTROUTING 1 -p udp -s 10.0.0.10 -j SNAT 
> --to 66.38.133.113:53 (( The above is my first attempt 
> ruleset.  This list reminded me to NAT the outgoing packets 
> again, hence the last line entry. ))
> 
> (( That didn't work, so I wiped the rules clean and went in 
> search of more learning and advice.  I found this: ))
> 
> iptables -t nat -A PREROUTING -d 66.38.133.120 -p tcp --dport 
> 53 -j DNAT --to-destination 10.0.0.10:53 iptables -t nat -A 
> POSTROUTING -o eth1 -s 10.0.0.0/24 -j SNAT --to-source 66.38.133.120
> 
> (( The above is copied and pasted from a Tutorial, all I have 
> done is replace IPs. ))
> 
> None of this works, and while it is obvious to you guys why, 
> it is not obvious to me. :(  I don't want to appear like an 
> idiot, but I -have- read the HOWTOs and such.  I -know- that 
> the nat table is called first for PREROUTING, then the filter 
> table for FORWARD (INPUT is only used for localhost 
> destinations, right?), then the POSTROUTING.  I also know 
> that POSTROUTING does the SNAT, while PREROUTING does DNAT.  So, I
> -have- been reading, I just cannot get this to work and need help.
> 
> While I have been reading the list, other list archives, etc. 
>  I have stumbled across a few references to IP Aliasing on 
> NICs being a bad thing.  This concerns me, since our firewall 
> has 5 external IPs, all aliased to the same NIC.  The 
> firewall rules then forward the various requests, depending 
> on the destination address, to the correct port on the DMZ 
> server, which has multiple 10.0.0.x addresses aliased as well.
> 
> I would appreciate any help or input.  I am at my wit's end, 
> and it is really starting to affect my work.
> 
> 


Reply via email to