Hello;
I have configured a network with shorewall as firewall in a host bastion mode and I want to configure a DMZ. 
 This is a little view of what I have done.
 
 I declared three zones in my network; in the 192.168.41.0/24 IP range are my internal network (the shorewall firewall use the 172.16.120.1 IP to masquerade it) and in the 172.16.120.0/24 my external. The DMZ are in 192.168.14.0/24 IP range.
 
 The services of email and web browser depend of a first level network that are installed in other center (center offices); I mean, there are a central email server for all in and out email and a central proxy for access to web. For that I have an asigment IP for my email and proxy servers that are authorized.
 
 My network serve to a thirth level network (municipal offices). email (pop3 and smtp), instant messages, FTP, web are some of the services used form then.

 This is my working around to try the DMZ config.
 
 - Declared the zones and the interfaces. Four zones: for the internal network (loc), for the external network (net), for the DMZ network (dmz) and for the firewall it seft (fw). The interfaces are assignet to the corresponding zones using the interfaces identifications.
 
fw  firewall
net ipv4
loc ipv4
dmz ipv4

net enp4s1  tcpflags,nosmurfs,routefilter,logmartians,sourceroute=0
loc enp5s0  tcpflags,nosmurfs,routefilter,logmartians
dmz enp7s0  tcpflags,nosmurfs,routefilter,logmartians

 
 - Configure the policy. The must simple: allow from the firewall access to every network; from the internal network can access to the external network and to the DMZ; from the DMZ can access to the local or internal network and to the external. From the external network is not allowed the access, this will be controlled for the firewall rules. If something is needed from the internal network and from the DMZ network to the firewall, it will be controlled from the firewall rules
  In the last places if something is missing it will be rejected.
 
fw  net ACCEPT  info
fw  dmz ACCEPT  info
fw  loc ACCEPT  info
loc net ACCEPT  info
loc dmz ACCEPT  info
dmz loc ACCEPT  info
dmz net ACCEPT  info
net all DROP    info
all all REJECT  info

 - Rules. Here declared the service needed from my users (in my internal network and in the municipal offices) for example the access to the instant messages service, to the email services, the access to the DNS services and consult to the external DNS from my network
 
?SECTION ALL
?SECTION ESTABLISHED
?SECTION RELATED
?SECTION INVALID
?SECTION UNTRACKED
?SECTION NEW

DNS(DNAT):info     net  dmz:192.168.14.12
FTP(DNAT):info     net  dmz:192.168.14.13
Squid(DNAT):info    net     dmz:192.168.14.18
DNAT:info           net     dmz:192.168.14.15 tcp 5222,5223,5269
DNAT:info           net     dmz:192.168.14.8 tcp pop3,pop3s,smtp,smtps
DNAT:info           net     dmz:192.168.14.14 tcp http,https

DNS(ACCEPT)         loc     dmz:192.168.14.12 tcp
DNS(ACCEPT)         loc     dmz:192.168.14.12 udp
FTP(ACCEPT):info    loc     dmz:192.168.14.13
Squid(ACCEPT):info  loc     dmz:192.168.14.18
ACCEPT:info         loc     dmz:192.168.14.15 tcp 5222,5223,5269
ACCEPT:info         loc     dmz:192.168.14.8 tcp pop3,pop3s,smtp,smtps
ACCEPT:info         loc     dmz:192.168.14.14 tcp http,https

DNS(ACCEPT)         dmz     net                 tcp
DNS(ACCEPT)         dmz     loc                 tcp
DNS(ACCEPT)         dmz     net                 udp
DNS(ACCEPT)         dmz     loc                 udp

NTP(ACCEPT):info    dmz     loc:192.168.41.16
ACCEPT:info         dmz     loc:192.168.41.16 tcp 111,2049,20048,43810,52834
ACCEPT:info         dmz     loc:192.168.41.16 udp 111,2049,20048,47934,54948
SMB(ACCEPT):info    dmz     loc:192.168.41.16

 - As I mentioned early, my network have an authorized IP address from where can access to the email service and proxy in the central servers, to make this possible I use the snat. 
  With snat I masquerade my network too.
  
SNAT(172.16.120.8)  192.168.14.8    enp4s1  25,110
SNAT(172.16.120.2)  192.168.14.18   enp4s1  3128
SNAT(172.16.120.1)  192.168.41.0/24 enp4s1
  
   
 Using this config the firewall is not working fine. For example, the users in the municipal offices can not access to service in my network. The access to the services in central offices I still can not probe it. Is well planed this config? Is posible that using this config in central offices server the packect send from the email server of my network were identified with the IP 172.16.120.8 and proxies with 172.16.120.2? Is that correct?
 
  Thank for your attentions and sorry for my horrible English.
    

Rommel Rodriguez Toirac
romme...@nauta.cu
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to