Thanks! This sets up traffic like I want it. The only thing left - tunnels 
complain about zone net:

# shorewall check -r /etc/shorewall.testing
Checking...
Processing /etc/shorewall.testing/params ...
Processing /etc/shorewall.testing/shorewall.conf...
Loading Modules...
Checking /etc/shorewall.testing/zones...
Checking /etc/shorewall.testing/interfaces...
Checking /etc/shorewall.testing/hosts...
Determining Hosts in Zones...
Locating Action Files...
Checking /usr/share/shorewall/action.Drop for chain Drop...
Checking /usr/share/shorewall/action.Broadcast for chain Broadcast...
Checking /usr/share/shorewall/action.Invalid for chain Invalid...
Checking /usr/share/shorewall/action.NotSyn for chain NotSyn...
Checking /usr/share/shorewall/action.Reject for chain Reject...
Checking /etc/shorewall.testing/policy...
Adding Anti-smurf Rules
Adding rules for DHCP
Checking TCP Flags filtering...
Checking Kernel Route Filtering...
Checking Martian Logging...
Checking /etc/shorewall.testing/providers...
Checking /etc/shorewall.testing/tcrules...
Checking /etc/shorewall.testing/masq...
Checking MAC Filtration -- Phase 1...
Checking /etc/shorewall.testing/rules...
Checking /etc/shorewall.testing/tunnels...
   ERROR: Invalid tunnel ZONE (net) : /etc/shorewall.testing/tunnels (line 16)

if I replace it with world, it works fine, but tunnel rules (placed in 
world2fw) will never be processed:

-A lan_in -m conntrack --ctstate NEW,INVALID -j dynamic
-A lan_in -m conntrack --ctstate NEW,INVALID -j smurfs
-A lan_in -p udp --dport 67:68 -j ACCEPT
-A lan_in -p tcp -j tcpflags
-A lan_in -m physdev --physdev-in eth0 -j eth0_in
-A lan_in -m physdev --physdev-in vf-ssw-vpn -j vpn2fw
-A lan_in -j world2fw

-A eth0_in -m conntrack --ctstate NEW,INVALID -j dynamic
-A eth0_in -s 192.168.0.0/24 -j lan2fw
-A eth0_in -j net2fw

-A net2fw -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
-A net2fw -p 6 --dport 22 -j ACCEPT -m comment --comment "SSH"
-A net2fw -p 6 --dport 636 -j ACCEPT -m comment --comment "LDAPS"
-A net2fw -p 17 --dport 1194 -j ACCEPT -m comment --comment "OpenVPN"
-A net2fw -j Reject
-A net2fw -j LOG --log-level 6 --log-prefix "Shorewall:net2fw:REJECT:"
-A net2fw -g reject

-A world2fw -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
-A world2fw -p udp --dport 2001 -s 85.214.209.171 -j ACCEPT
-A world2fw -p udp --dport 2002 -s 85.214.204.137 -j ACCEPT
-A world2fw -p udp --dport 1194 -j ACCEPT
-A world2fw -j Reject

I guess unless I specify policy net -> fw CONTINUE, right?

Thanks!

You have helped me a lot!

-- 
Radoslaw Kamil Ejsmont, Ph.D.
http://radoslaw.ejsmont.net

On 20 Dec 2012, at 17:30, Tom Eastep <[email protected]> wrote:

> On 12/20/2012 08:22 AM, Radoslaw Kamil Ejsmont wrote:
>> Tried that - eth0 is a bridge port. If I do, then policies between
>> lan/net and vpn don't work - shorewall complains about vpn and lan/net
>> not being on the same bridge device.
> 
> zones:
> 
> fw            firewall
> world         ipv4
> net:world     bport
> lan:net               bport
> vpn:world     bport
> 
> interfaces:
> 
> FORMAT 2
> world         br0             bridge
> net           br0:eth0
> vpn           br0:tap0
> 
> hosts:
> 
> lan   eth0:192.168.0.0/24
> 
> 
> -Tom
> -- 
> Tom Eastep        \ When I die, I want to go like my Grandfather who
> Shoreline,         \ died peacefully in his sleep. Not screaming like
> Washington, USA     \ all of the passengers in his car
> http://shorewall.net \________________________________________________
> 
> ------------------------------------------------------------------------------
> LogMeIn Rescue: Anywhere, Anytime Remote support for IT. Free Trial
> Remotely access PCs and mobile devices and provide instant support
> Improve your efficiency, and focus on delivering more value-add services
> Discover what IT Professionals Know. Rescue delivers
> http://p.sf.net/sfu/logmein_12329d2d
> _______________________________________________
> Shorewall-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/shorewall-users

------------------------------------------------------------------------------
LogMeIn Rescue: Anywhere, Anytime Remote support for IT. Free Trial
Remotely access PCs and mobile devices and provide instant support
Improve your efficiency, and focus on delivering more value-add services
Discover what IT Professionals Know. Rescue delivers
http://p.sf.net/sfu/logmein_12329d2d
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to