David, thanks for the reply. I've tried adding that line to my 
iptables config (came up with a similar example after a web search), 
but every time I do, I'm no longer able to startup IPtables due to an 
error about "seems to have a -t table option" when I run 
"/etc/init.d/iptables start". Admittedly, I don't know enough about 
iptables syntax, but could you provide more explicit instruction on 
WHERE to add that line? My actual /etc/sysconfig/iptables file is in 
the message below (and my original message). Where in that file would 
that line fit in?

Thanks in advance.

PS - I'd posted to the Linux-HA list as well for any possible help, 
and one user stated that perhaps OSSEC isn't acting the way a program 
should in order to run properly on a multi-homed system. They stated 
that, in multi-homed cases, OSSEC should ideally be analyzing the 
original dstip for packets it processes, and send all outgoing 
responses with a matching srcip to avoid all this hassle. Is there 
anyone that should be contacted to hopefully get OSSEC setup using 
the proper behavior for HA or multi-homed systems? As it continues to 
increase in popularity, I can see this only increasing as a problem.

At 11:01 AM 10/25/2007, you wrote:

>* PGP Signed by an unknown key: 10/25/07 at 11:01:29
>
>Tim,
>         I think you need to add a SNAT rule to use iptables for this.  I'm
>not in a position to test this but I think something like this may
>work for you:
>-t nat -A POSTROUTING -o eth0 -p udp --dport 1514 -j SNAT --to
>xxx.xxx.xxx.29
>         The intent (as I said, I can't check this) is to add to the nat
>table a postrouting rule for udp output on eth0 to port 1514 that
>jumps to source network address translation setting the source
>address to be xxx.xxx.xxx.29.
>         I hope that at least points you in the right direction.
>         -David
>
>Timothy Meader wrote:
> > Hello, I'm having an issue that I'm hoping someone could provide me
> > some help on. To give a brief synopsis of the situation:
> >
> > We originally had a single server setup running OSSEC. Last week, we
> > decided to combine this server with another two that were running as
> > a simple log server (in high availability fail-over mode using
> > heartbeat) to make better use of the existing systems. The log server
> > portion is running on the virtual IP xxx.xxx.xxx.7 on eth0:0, the
> > OSSEC server is setup to run on a secondary virtual IP,
> > xxx.xxx.xxx.29, on eth0:1. When running on a single server, OSSEC
> > worked fine. But now, the clients refuse to communicate properly with
> > the server.

> > *filter
> > :INPUT ACCEPT [0:0]
> > :FORWARD ACCEPT [0:0]
> > :OUTPUT ACCEPT [0:0]
> > :RH-Firewall-1-INPUT - [0:0]
> > -A INPUT -j RH-Firewall-1-INPUT
> > -A FORWARD -j RH-Firewall-1-INPUT
> > -A RH-Firewall-1-INPUT -i lo -j ACCEPT
> > -A RH-Firewall-1-INPUT -i eth1 -j ACCEPT
> > -A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT
> > -A RH-Firewall-1-INPUT -p 50 -j ACCEPT
> > -A RH-Firewall-1-INPUT -p 51 -j ACCEPT
> > -A RH-Firewall-1-INPUT -p udp --dport 5353 -d 224.0.0.251 -j ACCEPT
> > -A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT
> > -A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
> > -A RH-Firewall-1-INPUT -m state --state NEW -p tcp --dport 443 -j ACCEPT
> > -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 
> 514 -j ACCEPT
> > -A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 
> 514 -j ACCEPT
> > -A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 
> 720 -j ACCEPT
> > -A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport
> > 1514 -j ACCEPT
> > -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport
> > 5514 -j ACCEPT
> > -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport
> > 5140 -j ACCEPT
> > -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport
> > 8000:8001 -j ACCEPT
> > -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport
> > 8089 -j ACCEPT
> > -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 
> 22 -j ACCEPT
> > -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 
> 80 -j ACCEPT
> > -A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
> > COMMIT
> >
> > ---
> > Tim Meader
> > L-3 Communications, NASA EOS Security Operations
> > [EMAIL PROTECTED]
> > (301) 614-6371
> >
>
>--
>_______________________________________________
>GPG (http://www.gnupg.org/) key available from:
>http://www.kayakero.net/per/david/
>
>* Unknown Key
>* 0xF881874D (L)

---
Tim Meader
L-3 Communications, NASA EOS Security Operations
[EMAIL PROTECTED]
(301) 614-6371 

Reply via email to