My problem is one of virtual interfaces. First I understand the ramifications 
of pass-through. 
Here is what I'm trying to do.
Another (trusted) entity in our building has a router connected to our private 
network to utilize out Internet connection. 
It is at address 192.168.1.3. They recently requested a external static 
Internet address. I acquired one and added a rule
(see the bottom of this). Even though I placed it at the end of the rules file 
it preempts access to my webserver running 
on the firewall and using the primary address on the same interface. I've 
studied your page on virtual interfaces but I 
must be missing something.  What happens is everything coming in on the 
xxx.xxx.xxx.141 address goes to loc:192.168.1.3.
What I want is the allow traffic to xxx.xxx.xxx.141 to go to the firewall 
server and traffic to xxx.xxx.xxx.184 to go to 192.168.1.3.

Working on the assumption that even (possibly) dumb questions need answering, 
why is this happening?
Also, the basis of my configuration is the two-interface sample. 


[EMAIL PROTECTED] ~]# ip addr show
1: lo: <LOOPBACK,UP,10000> mtu 16436 qdisc noqueue
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:12:3f:73:de:72 brd ff:ff:ff:ff:ff:ff
    inet xxx.xxx.xxx.141/25 brd xxx.xxx.xxx.255 scope global eth0
    inet xxx.xxx.xxx.160/25 brd xxx.xxx.xxx.255 scope global secondary eth0:1
    inet xxx.xxx.xxx.184/25 brd xxx.xxx.xxx.255 scope global secondary eth0:2
    inet6 fe80::212:3fff:fe73:de72/64 scope link
       valid_lft forever preferred_lft forever
3: eth1: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:50:fc:27:38:46 brd ff:ff:ff:ff:ff:ff
    inet 192.168.1.1/24 brd 192.168.1.255 scope global eth1
    inet6 fe80::250:fcff:fe27:3846/64 scope link
       valid_lft forever preferred_lft forever
4: sit0: <NOARP> mtu 1480 qdisc noop
    link/sit 0.0.0.0 brd 0.0.0.0
5: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,10000> mtu 1500 qdisc pfifo_fast qlen 
100
    link/[65534]
    inet 10.8.0.1 peer 10.8.0.2/32 scope global tun0

[EMAIL PROTECTED] ~]# ip route show
10.8.0.2 dev tun0  proto kernel  scope link  src 10.8.0.1
xxx.xxx.xxx.128/25 dev eth0  proto kernel  scope link  src xxx.xxx.xxx.141
192.168.4.0/24 via 10.8.0.1 dev tun0  scope link
192.168.3.0/24 via 192.168.1.252 dev eth1
192.168.2.0/24 via 192.168.1.252 dev eth1
192.168.1.0/24 dev eth1  proto kernel  scope link  src 192.168.1.1
192.168.123.0/24 via 192.168.1.3 dev eth1
169.254.0.0/16 dev eth1  scope link
default via xxx.xxx.xxx.129 dev eth0

The rule in question:
DNAT            net             loc:192.168.1.3         all             -       
xxx.xxx.xxx.184
-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys - and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to