Hello.

Shorewall version 4.5.7.1, the configuration example follows:

zones:
loc   ipv4
net   ipv4
sitea:net ipsec

interfaces:
loc   eth0
-     eth1

hosts:
sitea  eth1:192.168.111.0/24
net    eth1:0.0.0.0/0

policy:
loc    net    ACCEPT
loc    sitea  REJECT
all    all    REJECT

netmap:
SNAT   192.168.1.0/24     eth1   10.1.0.0/24   192.168.111.0/24

rules:
Web(ACCEPT)   loc   sitea



ALL traffic from loc to sitea will be accepted, because resulting rule in 
loc_frwd chain is never matched (in particular ipsec policy is not matched):

Chain eth0_fwd (1 references)
168 23503 loc_frwd   all  --  *      *       192.168.1.0/24       0.0.0.0/0     
       policy match dir in pol none
  46  7456 loc_frwd   all  --  *      *       10.1.0.0/24          0.0.0.0/0    
        policy match dir in pol none

Chain loc_frwd (2 references)
0     0 loc2sitea  all  --  *      eth1     0.0.0.0/0            
192.168.111.0/24     policy match dir out pol ipsec


Traffic from loc to sitea eventually hits loc2net policy (ACCEPT).

Without netmap all works like expected.
When zone is defined as an ordinary ipv4 zone, all works like expected too.

Is there any way to keep a zone as an ipsec zone, use netmap and have working 
loc2sitea rules ? Do I lose anything by defining zone as ipv4 instead of ipsec 
(is it significantly less secure) ?

Regards.
--
Artur


------------------------------------------------------------------------------
Flow-based real-time traffic analytics software. Cisco certified tool.
Monitor traffic, SLAs, QoS, Medianet, WAAS etc. with NetFlow Analyzer
Customize your own dashboards, set traffic alerts and generate reports.
Network behavioral analysis & security monitoring. All-in-one tool.
http://pubads.g.doubleclick.net/gampad/clk?id=126839071&iu=/4140/ostg.clktrk
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to