On 8/21/19 10:32 AM, Justin Pryzby wrote:
> On Wed, Aug 21, 2019 at 10:49:33AM -0600, Richard B. Pyne wrote:
>> What I want to do is to redirect incoming traffic from all interfaces for
>> 166.70.103.226:8080 to 166.70.169.36:80
>>
>> Both addresses are in my DMZ
> 
> Are they on the same interface and do you have "routeback" enabled ?
> 
>> shorewall show nat shows
>>
>> Chain net_dnat (1 references)
>>  pkts bytes target     prot opt in     out source               destination
>>     5   200 DNAT       tcp  --  *      * 0.0.0.0/0           
> 
> It shows packets hitting the rule...
> 
>> all attempts to browse to 166.70.103.226:8080 time out.
> 
> Are there any logs, and can you enable logging on the DNAT rule ?
> 
> Did/Can you tcpdump the interface the packets should be going out of ?
> 
> Do you need a MASQ rule for that interface so the source address is that of 
> the
> firewall, rather than the original ip ?
> 

Also, Shorewall FAQs 1a and 1b give detailed DNAT debugging information.

-Tom
-- 
Tom Eastep        \   Q: What do you get when you cross a mobster with
Shoreline,         \     an international standard?
Washington, USA     \ A: Someone who makes you an offer you can't
http://shorewall.org \   understand
                      \_______________________________________________

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to