Hello all,  my first post so be gentle....

I was asked to restructure a few things here at work... after some 
consideration and no budget... i came up with this that i thought was 
good...

I have a Linux box named Megs. This box has 4 public IPs on it(one main 
and 3 aliases) and on one NIC

I then have 2(what i call front end servers, Peter & Lois)  also with 
one NIC and one NFS server(Joe) with one NIC, what i do is,  everyone's 
domain  has the same entries like this..

domain.com     xxx.xxx.xxx.148   used for web services
domain.com's MX   xxx.xxx.xxx.147  for mail services

now Megs has both those IPs, plus its own ip of xxx.xxx.xxx.146

My plan was this, have everything go to Megs and then redirect to other 
servers(all on the same network, but not using 2 nics or NAT as it made 
it hard to fix remotely if something broke,  and that is important here, 
being able to do everything remotely. So i use Shorewall on all servers 
and block everything except  certain ports  for certain machines(Peter, 
Lois, Joe)....  IE only Peter will accept http request from Megs and no 
where else.... I figure this was not a bad set up for them at this time....

So now i have this sort of working, but i am using another program named 
rinetd, to do the port redirections, and this works great for http, 
smtp, pop and imap. Now i figured Shorewall can do redirect too, however 
when it was setup i did not think of this at the time....  But now i ran 
into a problem rinetd does not do ftp, so now i have to allow some users 
directly over to the NFS server directly for now...

So now my questions are...

Can Shorewall do the redirects using only one NIC on Megs? So i can get 
rid of rinetd?
Would i need to radically change my below configs to do this....

See below for my configs...

I Thank everyone for being patient with me....

Thanks again and have a great day!


RUles files

# This is used so all on our local lan is accepted
ACCEPT                  net:xxx.xxx.xxx.145/28     $FW

# Reject Ping from the "bad" net zone.. and prevent your log from being 
flooded..
Ping/ACCEPT     net:xxx.xxx.xxx.145/28, xxx.xxx.xxx.163             $FW

# Permit all ICMP traffic FROM the firewall TO the net zone
ACCEPT          $FW             net             icmp

# For ssh connections
ACCEPT      net:xxx.xxx.xxx164, xxx.xxx.xxx.182, 
xxx.xxx.xxx.163,xxx.xxx.xxx.145/28, 192.168.2.0/24  $FW   tcp  22

# Mail connections
ACCEPT     net             $FW             tcp  25
ACCEPT     net             $FW             tcp  110
ACCEPT     net             $FW             tcp  143

# DNS connections
#ACCEPT      net             $FW             udp        53

# web connections
ACCEPT     net             $FW             tcp  80
FTP/ACCEPT      net     $FW

Policy file
#SOURCE         DEST            POLICY          LOG LEVEL       LIMIT:BURST
$FW             net             ACCEPT
net             $FW             DROP            info
net             all             DROP            info
# The FOLLOWING POLICY MUST BE LAST
all             all             REJECT          info


Zones file
#ZONE   TYPE    OPTIONS                 IN                      OUT
#                                       OPTIONS                 OPTIONS
fw      firewall
net     ipv4



Interfaces file
#ZONE   INTERFACE       BROADCAST       OPTIONS
net     eth0            detect          
norfc1918,routefilter,dhcp,tcpflags,logmartians,nosmurfs


-- 

Rob Morin
Director of Technologies
Dido Internet Inc.
Montreal,Canada
http://www.dido.ca
514-990-4444

-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to