The request gets the the public interface, then (presumably, depends on your rules) goes to the LAN server and is answered to the client IP, which is listening for the response from the public IP, no go.
The LAN server needs to be be on a different subnet, so all traffic is routed through the router. You could remove the host route to the LAN, leaving only the route to the firewall, then you'll have the same problem if you access the LAN host via private IP. (Corrections welcome ;-) // George On Wed, Jun 12, 2002 at 10:07:55AM -0500, Glover George wrote: >Yes I've come across this problem MANY MANY times before, and would >appreciate it if someone could explain exactly why this doesn't work. >For instance. I have 3 machines, a firewall/nat (linux), a linux >webserver and a windows machine behind it. Now I am serving a website >that is on the webserver behind the firewall, and it's dns stuff is >somewhere out on the internet. On my windows machine it resolves to the >public interface of the firewall. Why doesn't packets destined for that >machine realize that they must be sent to the webserver instead of out >on the public interface? I know it's because the DNAT rule is on the >prerouting of the external nic, but why doesn't simply putting a DNAT >rule on the internal work as well? > >The only way for me to get this working is to run bind 9 and set up two >different views, to resolve different ip addresses whether you're on the >internet, or in my internal network. But this is a hack, and everytime >I add someones website, I have to make changes to both views on the DNS >server to get it to work, for every host in that new domain. It seems >like there should be an easier way, as I'm sure a LOT of people on this >list come across the same problem before. > >May not be possible with the current nat framework, but was just >wondering if someone could elaborate on it. As always, thanks in >advance. > >Glover George >Systems/Networks Administrator >Gulf Sales & Supply, Inc. >[EMAIL PROTECTED] >(228)-762-0268 > > >-----Original Message----- >From: [EMAIL PROTECTED] >[mailto:[EMAIL PROTECTED]] On Behalf Of Matthew Hellman >Sent: Wednesday, June 12, 2002 7:30 AM >To: Michael Hudin; [EMAIL PROTECTED] >Subject: Re: Internal machines can't resolve external addresses > >There is potentially another solution if you don't want to run your own >bind >server. Add a third nic to your firewall and put these boxes in a DMZ. >Then you can use PREROUTING/DNAT. > >Goodluck, >Matt > >----- Original Message ----- >From: "Michael Hudin" <[EMAIL PROTECTED]> >To: <[EMAIL PROTECTED]> >Sent: Tuesday, June 11, 2002 10:00 PM >Subject: Internal machines can't resolve external addresses > > >Machines in the outside world, can view my websites fine, but whenever I >try >to go to one of them from a machine on my internal network behind the >firewall, neither the domain name nor the IP will resolve. I also have >the >same problem with my mail server and have to use the internal address of >the >mail server. I am going to guess that the best solution to this is to >run >some kind of local DNS server on the inside of the firewall which >resolves >all my sites internally, but since I don't have a server at my disposal >for >it, is there some way around this? I had the POSTROUTING MASQ line on >and >that did allow the internal machines to resolve, but it also hid the >originating address for any outside machine, thus creating a security >disaster. > >-michael > >*nat >:PREROUTING ACCEPT [241:88600] >:POSTROUTING ACCEPT [0:9862] >:OUTPUT ACCEPT [68:4275] >-A PREROUTING -d 10.10.10.252 -p tcp -m tcp --dport 110 -j >DNAT --to-destination 192.168.77.2 >-A PREROUTING -d 10.10.10.252 -p tcp -m tcp --dport 25 -j >DNAT --to-destination 192.168.77.2 >-A PREROUTING -d 10.10.10.251 -p tcp -m tcp --dport 80 -j >DNAT --to-destination 192.168.77.2 >-A PREROUTING -d 10.10.10.250 -p tcp -m tcp --dport 80 -j >DNAT --to-destination 192.168.77.2 >-A PREROUTING -d 10.10.10.250 -p tcp -m tcp --dport 22 -j >DNAT --to-destination 192.168.77.2 >-A POSTROUTING -o eth0 -j SNAT --to-source 10.10.10.254 >#-A POSTROUTING -o eth1 -j MASQUERADE >COMMIT > >*mangle >:PREROUTING ACCEPT [18365:3221456] >:INPUT ACCEPT [10886:760348] >:FORWARD ACCEPT [7269:2438049] >:OUTPUT ACCEPT [8009:752540] >:POSTROUTING ACCEPT [15177:3182145] >COMMIT > >*filter >:INPUT ACCEPT [0:229546] >:FORWARD ACCEPT [363:1553786] >:OUTPUT ACCEPT [2:619341] >-A INPUT -p udp -m udp --sport 500 --dport 500 -j ACCEPT >-A INPUT -p tcp -j ACCEPT >-A INPUT -p esp -j ACCEPT >-A INPUT -p ah -j ACCEPT >-A INPUT -i lo -j ACCEPT >-A FORWARD -i eth1 -j ACCEPT >-A FORWARD -i eth0 -o eth1 -p tcp -m tcp --dport 110 -m state --state >NEW,RELATED,ESTABLISHED -j ACCEPT >-A FORWARD -i eth0 -o eth1 -p tcp -m tcp --dport 25 -m state --state >NEW,RELATED,ESTABLISHED -j ACCEPT >-A FORWARD -i eth0 -o eth1 -p tcp -m tcp --dport 80 -m state --state >NEW,RELATED,ESTABLISHED -j ACCEPT >-A FORWARD -i eth0 -o eth1 -p tcp -m tcp --dport 22 -m state --state >NEW,RELATED,ESTABLISHED -j ACCEPT >-A OUTPUT -p udp -m udp --sport 500 --dport 500 -j ACCEPT >-A OUTPUT -p tcp -j ACCEPT >-A OUTPUT -p esp -j ACCEPT >-A OUTPUT -p ah -j ACCEPT >-A OUTPUT -o lo -j ACCEPT >COMMIT > > > > > > > > -- GEORGE GEORGALIS, System Admin/Architect cell: 347-451-8229 Security Services, Web, Mail, mailto:[EMAIL PROTECTED] File, Print, DB and DNS Servers. http://www.galis.org/george
