Re: firewalls' behavior help

2006-07-03 Thread efrenba
Box:freeBSD 6.0, ipf: IP Filter: v4.1.8 (416), Kernel: IP Filter: v4.1.8

Network layout:
---
other building [ PCs - 192.168.80.0/24 ]
 |
 g1 (ipf - vr0:192.168.80.2 - sis0:10.10.10.13)
 |
My Lan ( 10.10.10.0/24 )

[ PCs (DefaultGw = g2) ]

[ MailSrv (10.10.10.12) (pop3/smtp/ssh) (DefaultGw = g2) ]

[ WebSrv (10.10.10.11) (http) (DefaultGw = g1) ]
 |
 g2
 |
Internet


ipnat.rules
---
map vr0 10.10.10.0/24 - 192.168.80.2/32 proxy port 21 ftp/tcp
map vr0 10.10.10.0/24 - 192.168.80.2/32

rdr vr0 192.168.80.2/32 port 80 - 10.10.10.11 port 80 tcp
rdr vr0 192.168.80.2/32 port 22 - 10.10.10.12 port 22 tcp
rdr vr0 192.168.80.2/32 port 25 - 10.10.10.12 port 25 tcp
rdr vr0 192.168.80.2/32 port 110 - 10.10.10.12 port 110 tcp


ipf.rules
-
### No restrictions inside LAN Interface ###
pass out quick on sis0 all
pass in quick on sis0 all

### No restrictions on Loopback Interface ###
pass out quick on lo0 all
pass in quick on lo0 all

### Allow out DNS queries ###
pass out quick on vr0 proto tcp from any to 192.168.10.5 port = 53 flags S
keep state
pass out quick on vr0 proto udp from any to 192.168.10.5 port = 53 keep state


### Allow IE out ###
pass out quick on vr0 proto tcp from any to any port = 80 flags S keep state

### Allow Squid Access out ###
pass out quick on vr0 proto tcp from any to any port = 3128 flags S keep
state
pass out quick on vr0 proto tcp from any to any port = 3130 flags S keep
state

### Allow FTP out ###
pass out quick on vr0 proto tcp from any to any port = 21 flags S keep state

### Allow Remote Desktop to WinXP external PCs ###
pass out quick on vr0 proto tcp from any to any port = 3389 flags S keep
state

### Allow MailServer to Deliver mails ###
pass out quick on vr0 proto tcp from any to any port = 25 flags S keep state


### Block and Log only first occurrence of everything ###
block out log first quick on vr0 all


### Block all inbound traffic from non-routable or reserved address spaces
...



### Allow in ssh session from other building ###
pass in quick on vr0 proto tcp from any to any port = 22 flags S keep state

### Allow in HTTP session from public to Internat MailServer ###
pass in quick on vr0 proto tcp from any to any port = 80 flags S keep state

### Allow in SMTP access to Internal Mail Server ###
pass in quick on vr0 proto tcp from any to any port = 25 flags S keep state

### Allow in POP3 access to Internal Mail Server ###
pass in quick on vr0 proto tcp from any to any port = 110 flags S keep state


### Block and log anly first occurence of all remaining traffic ###
block in log first quick on vr0 all


The situation:
--
...if the server(MailSrv) is redirected to G1, the users are able to
connect themselves to the services. To be sure about it I redirected the
server(WebSrv) with apache that before was pointing to G1 to G2(internet)
and the access was broken for the other building...

Why happen this?





 If I understand your description, it could be mapped like this:

 net1 is the other building's network
 net1pc1 .. net1pcN

 net2 is your network
 net2pc1 .. net2pcN
 net2server1 .. net2server3

 g1 == net1,net2
 g2 == net2,Internet

 Assumptions:
 net1 and net2 are private
 the default gateway for g1 is g2
 g1 is using a map rule to nat net1 hosts to net2
 the default gateway for g2 is on the Internet
 g2 is using a map rule to nat net2 hosts to the Internet

 If a net1 PC connects through g1, it would be mapped as coming from g1.
 Since g1 is on net2, and g2 can route to net2, the servers using g2 as
 the default route should have no problem.  My assumptions may be false.
 Would you post the g1 and g2 ipf.conf and ipnat.conf, and specify what
 the net1 and net2 CIDR?

 Thank you,

 Ben

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: firewalls' behavior help

2006-07-03 Thread efrenba
Sorry,

this mail was for the ipfilter's list...




 Box:freeBSD 6.0, ipf: IP Filter: v4.1.8 (416), Kernel: IP Filter: v4.1.8

 Network layout:
 ---
 other building [ PCs - 192.168.80.0/24 ]
  |
  g1 (ipf - vr0:192.168.80.2 - sis0:10.10.10.13)
  |
 My Lan ( 10.10.10.0/24 )

 [ PCs (DefaultGw = g2) ]

 [ MailSrv (10.10.10.12) (pop3/smtp/ssh) (DefaultGw = g2) ]

 [ WebSrv (10.10.10.11) (http) (DefaultGw = g1) ]
  |
  g2
  |
 Internet


 ipnat.rules
 ---
 map vr0 10.10.10.0/24 - 192.168.80.2/32 proxy port 21 ftp/tcp
 map vr0 10.10.10.0/24 - 192.168.80.2/32

 rdr vr0 192.168.80.2/32 port 80 - 10.10.10.11 port 80 tcp
 rdr vr0 192.168.80.2/32 port 22 - 10.10.10.12 port 22 tcp
 rdr vr0 192.168.80.2/32 port 25 - 10.10.10.12 port 25 tcp
 rdr vr0 192.168.80.2/32 port 110 - 10.10.10.12 port 110 tcp


 ipf.rules
 -
 ### No restrictions inside LAN Interface ###
 pass out quick on sis0 all
 pass in quick on sis0 all

 ### No restrictions on Loopback Interface ###
 pass out quick on lo0 all
 pass in quick on lo0 all

 ### Allow out DNS queries ###
 pass out quick on vr0 proto tcp from any to 192.168.10.5 port = 53 flags S
 keep state
 pass out quick on vr0 proto udp from any to 192.168.10.5 port = 53 keep
 state


 ### Allow IE out ###
 pass out quick on vr0 proto tcp from any to any port = 80 flags S keep
 state

 ### Allow Squid Access out ###
 pass out quick on vr0 proto tcp from any to any port = 3128 flags S keep
 state
 pass out quick on vr0 proto tcp from any to any port = 3130 flags S keep
 state

 ### Allow FTP out ###
 pass out quick on vr0 proto tcp from any to any port = 21 flags S keep
 state

 ### Allow Remote Desktop to WinXP external PCs ###
 pass out quick on vr0 proto tcp from any to any port = 3389 flags S keep
 state

 ### Allow MailServer to Deliver mails ###
 pass out quick on vr0 proto tcp from any to any port = 25 flags S keep
 state


 ### Block and Log only first occurrence of everything ###
 block out log first quick on vr0 all


 ### Block all inbound traffic from non-routable or reserved address spaces
 ...



 ### Allow in ssh session from other building ###
 pass in quick on vr0 proto tcp from any to any port = 22 flags S keep
 state

 ### Allow in HTTP session from public to Internat MailServer ###
 pass in quick on vr0 proto tcp from any to any port = 80 flags S keep
 state

 ### Allow in SMTP access to Internal Mail Server ###
 pass in quick on vr0 proto tcp from any to any port = 25 flags S keep
 state

 ### Allow in POP3 access to Internal Mail Server ###
 pass in quick on vr0 proto tcp from any to any port = 110 flags S keep
 state


 ### Block and log anly first occurence of all remaining traffic ###
 block in log first quick on vr0 all


 The situation:
 --
 ...if the server(MailSrv) is redirected to G1, the users are able to
 connect themselves to the services. To be sure about it I redirected the
 server(WebSrv) with apache that before was pointing to G1 to G2(internet)
 and the access was broken for the other building...

 Why happen this?





 If I understand your description, it could be mapped like this:

 net1 is the other building's network
 net1pc1 .. net1pcN

 net2 is your network
 net2pc1 .. net2pcN
 net2server1 .. net2server3

 g1 == net1,net2
 g2 == net2,Internet

 Assumptions:
 net1 and net2 are private
 the default gateway for g1 is g2
 g1 is using a map rule to nat net1 hosts to net2
 the default gateway for g2 is on the Internet
 g2 is using a map rule to nat net2 hosts to the Internet

 If a net1 PC connects through g1, it would be mapped as coming from g1.
 Since g1 is on net2, and g2 can route to net2, the servers using g2 as
 the default route should have no problem.  My assumptions may be false.
 Would you post the g1 and g2 ipf.conf and ipnat.conf, and specify what
 the net1 and net2 CIDR?

 Thank you,

 Ben

 ___
 freebsd-questions@freebsd.org mailing list
 http://lists.freebsd.org/mailman/listinfo/freebsd-questions
 To unsubscribe, send any mail to
 [EMAIL PROTECTED]



-- 
Efren Bravo
Sistemas DHL-Cuba
Telf-Pizarra: (537)-2041578 Ext 123
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]