Many thanks for your reply and taking the time to look Tom. You are correct, the Reverse Proxy’s IP address is 203.214.66.103.
The web server is 172.16.4.203. I have no problems connecting to the Web Server from the Reverse Proxy using Ping, ssh etc and vice versa. I have a similar situation between my smtp and imaps servers. Both use public IPs. .100 and .104 respectively. .100 is a secondary IP for .103, established using IP ADDRESS ADD at boot via /etc/network/interfaces (Debian). Similarly, .105 and .106 are secondary IPs for .104. I hope this helps. Kind regards, Bruce > On 21 Feb 2020, at 6:20 am, Tom Eastep <teas...@shorewall.net> wrote: > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > >> On 2/20/20 4:22 AM, Bruce Bannerman wrote: >> Hello colleagues, >> >> I hope that someone can point me in the right direction here. I >> have been trying many options for weeks to sort this out. >> >> (Thank you for the excellent Shorewall documentation.) >> >> >> In a nutshell, I can see network traffic coming into my DMZ from >> external to my site, but I don’t see it coming out. >> >> >> Environment: >> >> Debian 10.3 Stable Xen 4.11.4-pre Shorewall 5.2.3.2 >> >> I have four Debian 10.3 Stable VMs running. >> >> >> Everything has been working fine for several years with a single >> public IP connected to two externally facing VMs, with traffic >> redirected using DNAT. >> >> I recently obtained a /28 subnet of public IP addresses from my ISP >> to allow me to expand my web activities. >> >> * My ISP is routing the /28 subnet via my external /32 public >> static IP address that they have allocated to me for the external >> interface of my router / modem. * This static /32 IP is from a >> totally different IP range to my subnet. >> >> >> I’m having troubles getting network traffic returned from my DMZ >> VMs with these /28 subnet IP addresses. >> >> I have the same result whether I set my systems up using either: >> >> * a XEN Routed configuration as described in [1]; or * a XEN >> One-to-One NAT configuration as described at [2]. >> >> >> My current configuration is configured as XEN Routed. >> >> ===== >> >> I can get external network traffic returned from my servers under >> the current configuration if I: >> >> * configure my nameserver to use my /32 external static IP address >> for all servers. * use port forwarding configured within the modem >> to point at my VMs using their public /28 subnet addresses. * keep >> NAT enabled on the modem. * however, this is very restrictive, and >> defeats the purpose of having the public /28 subnet in the first >> place. >> >> >> ===== >> >> I have attached a shorewall dump below. >> >> For this test, I attempted to access the web site of one of my >> domains at http://www.foss4climate.org. This domain and site have >> not been launched and are just in a preliminary stage. >> >> This URL points to my reverse proxy server. I then redirect using >> https to a second webserver (www2 also a VM) that uses a private IP >> address. >> >> I tested from a laptop, external to my site’s network. >> >> * the laptop’s IP address was: >> 49.183.163.227 * the IP address of the web server is currently: >> 203.214.66.103 > > The Shorewall-generated firewall is seeing the connection successfully > established. From the dump: > > Conntrack Table (50 out of 262144) > ... > ipv4 2 tcp 6 272 ESTABLISHED src=49.183.163.227 > dst=203.214.66.103 sport=52024 dport=443 src=203.214.66.103 > dst=49.183.163.227 sport=443 dport=52024 [ASSURED] mark=0 zone=0 use=2 > > That shows that the three-way TCP handshake was successfully completed > between 49.183.163.227 and 203.214.66.103 (which I presume is your > reverse proxy server and not the web server itself). What is the > (private) IP address of the web server? > > - -Tom > - -- > Tom Eastep \ Q: What do you get when you cross a mobster > Shoreline, \ with an international standard? > Washington, USA \ A: Someone who makes you an offer you > http://shorewall.org \ can't understand > \________________________________________ > -----BEGIN PGP SIGNATURE----- > Comment: GPGTools - http://gpgtools.org > > iQIzBAEBCgAdFiEEFNMNR63CLO6yqbL8luaz8kI6TRAFAl5O1+YACgkQluaz8kI6 > TRD9FBAAq16g9xliejHHgLY9fv4MfpJNQdrBjLWnUUc1z4boCkvDUOAXJvRFeCBS > Fx5O3hbRgsQks6ciFueHnHWmvJXqYnTZZOLuOvLjkm2pl3IVPrBh/DE8ImCl/Xfx > sHFp/vYDqAW4/prnOWN3IsSfnLYNaI+Y7kOY/jS4lPXzcxX01JFqeqPxi4J8k6M2 > EwhAi/K4611pheSQKSdqdB4tKY/tICPAUu2YyOkVRX1JzC/5kXNfYiLc4aJmyPb6 > GsZ6hSNTg27xBV2RtbawsxMzovTLK+PqV1BtamvZT6FM0e9Wp+83wfbTOTo9P7wn > 8FMwalWL5OdCONBBYjKc/69pdzo682vnIJbUdPea3QbmeoADK7V/wcK0GEb+BDYp > nK7dQMTMOb1t2Jwt5AsEBeTk275MUECB7NLA51QIhuB587ywf1J2A6krcNw7qIHR > dps0dRoDOBj/m+rRaKcyfl4LTYcnrizrtKBbznuvghbD0LDjQTf+VLR5FMEuOKrU > BXpusOt8jznSgxXzuv+t2QmomwQ/I5i4n4u90eyuzBwdvnBpj+UQclMz0pQNnZ0l > vV1CbbhkY/M48p2EcHF6YdkLV66mrrGlpj4uDKXU2P20KaWtUyZDZUQmBzv0VKWk > xInQMgbD2WHOhZM5/s0a12bnZLUoCkNWbiHtIakHtAcitkAxfqs= > =jarS > -----END PGP SIGNATURE----- > > > _______________________________________________ > Shorewall-users mailing list > Shorewall-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/shorewall-users _______________________________________________ Shorewall-users mailing list Shorewall-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/shorewall-users