On Fri, 25 Feb 2011, Tom Eastep wrote: >>> Apparently you have since it doesn't work. But until you show us what >>> you have done, we can't tell you what you are missing. >>> >>> Things to check: >>> >>> a) That you have set 'routeback' on the internal firewall interface. >>> b) That you have added a hairpin DNAT rule. >>> c) That you have added a hairpin SNAT entry in /etc/shorewall/masq >>> d) That all of the addresses in the entries are correct. >> >> I think address are correct because it is all working fine a part the >> "routeback". >> >> I have (actually, done some tests ...): >> >> #/etc/shorewall/interfaces >> net vmbr0 detect dhcp,tcpflags,logmartians,nosmurfs >> dmz vmbr8 detect tcpflags,nosmurfs,routefilter,routeback >> dmz vmbr9 detect tcpflags,nosmurfs,routefilter,routeback >> dmz vmbr10 detect tcpflags,nosmurfs,routefilter,routeback >> loc vmtab+ detect tcpflags,nosmurfs,routefilter >> loc vmbr2 detect tcpflags,nosmurfs,routefilter >> dmz tap+ detect tcpflags,nosmurfs,routefilter >> >> #/etc/shorewall/masq >> >> vmbr0 vmbr9 1.2.3.109 >> vmbr0 vmbr10 1.2.3.110 >> vmbr0 vmbr8 1.2.3.108 > > Please get rid of the interface names in the SOURCE column. You must be > running some ancient version of Shorewall that doesn't issue a warning > for that archaic usage.
I simply ignore the warning ... :-) Ok, Changed in: vmbr0 192.168.109.0/24 1.2.3.109 vmbr0 192.168.110.0/24 1.2.3.110 vmbr0 192.168.108.0/24 1.2.3.108 vmbr9 192.168.109.0/24 1.2.3.109 <<< NEW Attempt > And I don't see any SNAT rule for dmz->dmz traffic. I don't understand a logic for a correct syntax Can please, give an example? >> #/etc/shorewall/policy >> $FW net ACCEPT >> loc net ACCEPT >> loc $FW ACCEPT >> dmz net ACCEPT >> ###dmz $FW ACCEPT >> ###dmz dmz ACCEPT >> net all DROP info >> # The FOLLOWING POLICY MUST BE LAST >> all all REJECT info >> >> #/etc/shorewall/rules >> DNAT net dmz:192.168.109.9 tcp 20,21,80,443 - 1.2.3.109 >> DNAT net dmz:192.168.110.10 tcp 20,21,80,443 - 1.2.3.110 >> DNAT net dmz:192.168.108.8 tcp 20,21,80,443 - 1.2.3.108 > > I see no dmz->dmz DNAT rules there. Added: DNAT dmz dmz:192.168.109.9 tcp 20,21,80,443 - 1.2.3.109 >> >> >> > > That is because you only have 1 out of the three things needed for > hairpinning from dmz->dmz. You have 'routeback' but no applicable SNAT > or DNAT rules. Adding: vmbr9 192.168.109.0/24 1.2.3.109 to /masq and: DNAT dmz dmz:192.168.109.9 tcp 20,21,80,443 - 1.2.3.109 to /rules seems solve the problem. But I reach this result by attpmts, not following a logical path (in my mind that have limited understanding of [SD]NAT & c. Is this conf correct? Can I extend to the other servers or am I solving a problem and generating many others? Thank, Paolo ------------------------------------------------------------------------------ Free Software Download: Index, Search & Analyze Logs and other IT data in Real-Time with Splunk. Collect, index and harness all the fast moving IT data generated by your applications, servers and devices whether physical, virtual or in the cloud. Deliver compliance at lower cost and gain new business insights. http://p.sf.net/sfu/splunk-dev2dev _______________________________________________ Shorewall-users mailing list Shorewall-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/shorewall-users