Re: Building home router: 192.168.0.x to access internet

2009-08-09 Thread Erik Norgaard

Nerius Landys wrote:

First, my choise of internal network IP addresses is 192.168.0.x.  My
router machine's IP address will be 192.168.0.254 (that's the
interface facing the internal network).  The IP addresses of the
machines behind the router will start at 192.168.0.2 and go up.  I'm
wondering if this choice of IP addresses is conventional or good.  Is
this numbering scheme decent?  This is the way I had it set up
earlier.  I've seen a lot of networks using 192.168.1.x and the router
would be 192.168.1.1.


Whichever works. I don't think there is reason to speculate in best 
practices as which gets to be number 1, however you may consider 
dividing the address space into ranges for different uses. You may like 
to group servers in a particular range and clients in another so that 
you can create firewall rules accordingly.


My network is 172.16/23. The range 172.16.0/24 I use for statically 
configured nodes, servers, access points etc. The 172.16.1/24 I use for 
dynamically configured nodes, laptops.


The reason is that I'm using dynamic dns on my LAN. The reverse map 
zones cannot be created for classless networks, you have to define 
reverse zone for a /16 or /24 network. So to ensure that my static 
servers reverse map cannot be modified I have split my range such that 
dynamic and static addresses can be separated.


For my static range, I have divided it into two, 172.16.0.0/25 and 
172.16.0.128/25, the first for production servers, the later for testing 
and development. This is just a convention I have established, I thought 
it might be a good idea, but it is not configured in any way.


For my dynamic range, in my dhcpd configuration I have created two 
ranges, 172.16.1.0/25 and 172.16.1.128/25.


The first I assign to known hosts, that is hosts I have registered the 
MAC address of and know the owner. I haven't statically assigned a 
particular ip to a particular MAC, I just created a host entry in the 
dhcpd.conf with the MAC.


The later range I use for unknown hosts, so when somebody connects they 
are easy to identify as foreign. This also permits creating special 
rules in my firewall so that strangers do not get the same unlimited 
access as friends. Of course, this is very crude as anyone can just 
reconfigure their address to get unlimited access, but



So now to the problem of being able to connect from a 192.168.0.x
machine to an outside IP address.  The way I did this before was by
adding 'gateway_enable=YES' to /etc/rc.conf and then using the
OpenBSD packet filter (pf) to do a NAT thing.  I'm wondering if this,
in your opinion, is the preferred way to do things in order to set up
an internal network which can access the outside internet directly.


Yes, that's a great idea.


If so, can someone give me a really minimal yet secure packet filter
rule set that would do the job? (I'm prepared to read the pf docs,
which will take me a few hours.)  The router will connect to the
outside via DHCP, and from what I remember I had to add a rule to not
drop packets that were DHCP-related.


See the packet filter documentation, IIRC they have also sample filters 
for common setups such as yours.


BR, Erik
--
Erik Nørgaard
Ph: +34.666334818/+34.915211157  http://www.locolomo.org
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Building home router: 192.168.0.x to access internet

2009-08-08 Thread Nerius Landys
I'm setting up my FreeBSD computer (which has multiple NICs) to act as
a home router (and DNS server and a few other things, but that's not
important for this email).  I have done this before, but then my hard
drive broke and I have to do this all again.  So, I have a few
questions just to confirm that my approach to this problem is going to
be the optimal one that I can take.

First, my choise of internal network IP addresses is 192.168.0.x.  My
router machine's IP address will be 192.168.0.254 (that's the
interface facing the internal network).  The IP addresses of the
machines behind the router will start at 192.168.0.2 and go up.  I'm
wondering if this choice of IP addresses is conventional or good.  Is
this numbering scheme decent?  This is the way I had it set up
earlier.  I've seen a lot of networks using 192.168.1.x and the router
would be 192.168.1.1.

So now to the problem of being able to connect from a 192.168.0.x
machine to an outside IP address.  The way I did this before was by
adding 'gateway_enable=YES' to /etc/rc.conf and then using the
OpenBSD packet filter (pf) to do a NAT thing.  I'm wondering if this,
in your opinion, is the preferred way to do things in order to set up
an internal network which can access the outside internet directly.
If so, can someone give me a really minimal yet secure packet filter
rule set that would do the job? (I'm prepared to read the pf docs,
which will take me a few hours.)  The router will connect to the
outside via DHCP, and from what I remember I had to add a rule to not
drop packets that were DHCP-related.
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Building home router: 192.168.0.x to access internet

2009-08-08 Thread Mel Flynn
On Saturday 08 August 2009 18:32:30 Nerius Landys wrote:

 First, my choise of internal network IP addresses is 192.168.0.x.  My
 router machine's IP address will be 192.168.0.254 (that's the
 interface facing the internal network).  The IP addresses of the
 machines behind the router will start at 192.168.0.2 and go up.  I'm
 wondering if this choice of IP addresses is conventional or good.  Is
 this numbering scheme decent?

Convention is to use the lowest host IP address for the router and the highest 
for broadcast. Yet, it is only convention. There's nothing stopping you from 
using other address, as long as your client machines know this.

 If so, can someone give me a really minimal yet secure packet filter
 rule set that would do the job? (I'm prepared to read the pf docs,
 which will take me a few hours.)  The router will connect to the
 outside via DHCP, and from what I remember I had to add a rule to not
 drop packets that were DHCP-related.

There's actually a nice example in the PF FAQ that covers some basics:
http://www.openbsd.org/faq/pf/tagging.html

There used to be a sample pf.conf, but I see that got nuked, yet there still 
are examples in /usr/share/examples/pf/.
-- 
Mel
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org