On Tuesday 04 June 2002 12:07 am, John Jones wrote:

> Antony, thanks for your continued help.

My God, what a horrible setup you've got :-)

>      {NET}                {NET}
>     [ ADSL ]             [ SDSL ]
>      [FW A]               [FW B]
>      {LAN}                {DMZ}

Okay, so they're even less connected than I thought they were...

> FW A:
>   EXT IP:  209.139.199.253
>
> Everything here works.  I am on that network now.  We can browse the
> net, and all operations are normal.

Okay, where are you getting your name lookups from ?   Where are your 
internal clients being told to find their DNS server ?

> Now, I don't want to scare you, but this Firewall actually has 3 internal
> interfaces.  192.168.0.0/23, 192.168.10.0/24

That's okay - I can cope with three internal interfaces :-)

> and 10.0.0.2.  There -is- a physical network cable running from 10.0.0.2 to
> the DMZ hub/switch.  Thus, I can ping 10.0.0.10 from this firewall.

Okay.   This bothers me.   There's now an added complication of the routing 
tables on your internal machines, and the DNS server, which we need to make 
sure are really sending packets out to the Internet to talk to each other, 
and not just trying to hop across this cable when they reply to each other...

> FW B:
>   EXT IP:  66.38.133.113, .114, .115, .118, .119
>
> This is the firewall we are working to replace.  Now, in my script
> examples, I am using .120 because the current firewall works, the .120
> machine doesn't.  Thus, until everything on .120 works, I cannot replace
> the ipchains firewall at .113.  Does that make sense?

Yes, I see what you're doing - that's okay.

> Since the two firewalls have to communicate with each other over the
> Net, I thought that it would be most simple to configure the DMZ
> firewall (FW B above) as if all traffic that it has to deal with is
> Net-originated.  Thus, anything that hits the exterior interface (eth1)
> on that box should get port-forwarded to the DMZ Server (10.0.0.10).
> Right now, to keep it simple, I am working on the DNS.  Once I
> understand how THAT is set up correctly, I can worry about forwarding
> the multiple aliased addresses (.114, .115, etc) in on different high
> ports.

Okay - that bit should be pretty easy (grin).

On the DMZ firewall:

iptables -A PREROUTING -t nat -i eth1 -p tcp --dport 53 -j DNAT --to 10.0.0.10
iptables -A PREROUTING -t nat -i eth1 -p udp --dport 53 -j DNAT --to 10.0.0.10
iptables -A FORWARD -m state --state ESTABLISHED,RELATED - j ACCEPT
iptables -A FORWARD -p tcp --dport 53 -j ACCEPT
iptables -A FORWARD -p udp --dport 53 -j ACCEPT
iptables -A POSTROUTING -t nat -o eth1 -j SNAT --to 66.38.133.120

> The LAN firewall, to my understanding (I could be wrong) is irrelevant
> here.  Since my LAN contacts the DMZ through the internet, we shouldn't
> have to worry about the LAN firewall at all.  Let me know if I am wrong.

Well, if you're trying to *redirect* all your internal accesses to DNS 
machines so they go to the machine on your DMZ, you need to do some DNAT 
routing on your LAN firewall to make sure they all point to your DMZ DNS.   
Maybe you're not trying to do that, though, and you've really configured the 
LAN clients so they know to send DNS requests to the external address of the 
DMZ firewall, in which case I wonder, how come everything's working okay 
right now ?   I repeat my earlier question - what address do your internal 
clients think they should use for a DNS server ?


If you put the above rules on your DMZ firewall, and then try from a machine 
on your internal network:

dig @66.38.133.120 samba.org

what happens ?

If it fails, go the the DNS machine itself (10.0.0.10) and try

dig samba.org

and see if it can get a reply from some external nameserver.



Okay - how close are we now ?


Antony.

Reply via email to