From what I can remember, this issue does not apply to NAT so you 
shouldn't have to.

Thanks,

Robyn

Joe Pub wrote:
> Hi,
>
> Is this just for the firewall rules portion or should I do the same for NAT 
> too?
>
> Thanks.
>
> On 20/03/2008, Robyn Orosz <[EMAIL PROTECTED]> wrote:
>   
>> Hi Joe,
>>
>>  I'm not sure which version you are upgrading to but since you mentioned
>>  xorpsh, I am assuming VC3?
>>
>>  If so, the issue is probably the : and "" on the firewall port-number
>>  and port-name nodes.  If you edit your config.boot file and remove the :
>>  and "" from the port-name and port-number settings in the firewall
>>  portion of your config, you should be able to load the config in the new
>>  version.
>>
>>  See the following Bugzilla reports for more information:
>>
>>  https://bugzilla.vyatta.com/show_bug.cgi?id=2573
>>
>>  https://bugzilla.vyatta.com/show_bug.cgi?id=2637
>>
>>  Thank you,
>>
>>  Robyn
>>
>>
>>  Joe Pub wrote:
>>  > Hi All,
>>  >
>>  > I have recently done a live upgrade of vyatta to make sure everything
>>  > was up to date.  I saved the config.boot file just in case.  After the
>>  > reboot the loaded config was lost (not sure if this is by design on an
>>  > upgrade).  So I am now trying to load the config file from the ofr
>>  > over tftp.
>>  >
>>  > Now the first problem was this, it failed to parse the config file on
>>  > a firewall rule (which worked before the upgrade)
>>  >
>>  > which was this.
>>  >
>>  >         rule 9 {
>>  >             protocol: "tcp"
>>  >             action: "accept"
>>  >             log: "disable"
>>  >             destination {
>>  >                 address: 192.168.10.2
>>  >                 port-number: 1723
>>  >             }
>>  >         }
>>  >
>>  > it was complaining about the port number.  So I removed this rule out
>>  > of the config file and tried to reaload it with this version.
>>  >
>>  > protocols {
>>  >     ospf4 {
>>  >         router-id: 10.1.1.3
>>  >         rfc1583-compatibility: false
>>  >         ip-router-alert: false
>>  >         area 0.0.0.0 {
>>  >             area-type: "normal"
>>  >             interface eth0 {
>>  >                 link-type: "broadcast"
>>  >                 address 172.20.1.253 {
>>  >                     priority: 128
>>  >                     hello-interval: 10
>>  >                     router-dead-interval: 40
>>  >                     interface-cost: 1
>>  >                     retransmit-interval: 5
>>  >                     transit-delay: 1
>>  >                     passive: false
>>  >                     disable: false
>>  >                 }
>>  >             }
>>  >             interface lo {
>>  >                 link-type: "broadcast"
>>  >                 address 10.1.1.3 {
>>  >                     priority: 128
>>  >                     hello-interval: 10
>>  >                     router-dead-interval: 40
>>  >                     interface-cost: 1
>>  >                     retransmit-interval: 5
>>  >                     transit-delay: 1
>>  >                     passive: false
>>  >                     disable: false
>>  >                 }
>>  >             }
>>  >         }
>>  >         export: "static-to-OSPF"
>>  >     }
>>  >     static {
>>  >         disable: false
>>  >         route 0.0.0.0/0 {
>>  >             next-hop: x.x.x.30
>>  >             metric: 1
>>  >         }
>>  >     }
>>  > }
>>  > policy {
>>  >     policy-statement "static-to-OSPF" {
>>  >         term 1 {
>>  >             from {
>>  >                 protocol: "static"
>>  >             }
>>  >             then {
>>  >                 action: "accept"
>>  >             }
>>  >         }
>>  >     }
>>  > }
>>  > interfaces {
>>  >     restore: false
>>  >     loopback lo {
>>  >         description: ""
>>  >         address 10.1.1.3 {
>>  >             prefix-length: 32
>>  >             disable: false
>>  >         }
>>  >     }
>>  >     ethernet eth1 {
>>  >         disable: false
>>  >         discard: false
>>  >         description: ""
>>  >         hw-id: 00:50:56:a8:29:60
>>  >         duplex: "auto"
>>  >         speed: "auto"
>>  >         address x.x.x.29 {
>>  >             prefix-length: 27
>>  >             disable: false
>>  >         }
>>  >         address x.x.x.3 {
>>  >             prefix-length: 27
>>  >             disable: false
>>  >         }
>>  >         address x.x.x.2 {
>>  >             prefix-length: 27
>>  >             disable: false
>>  >         }
>>  >         firewall {
>>  >             in {
>>  >                 name: "DMZ_IN"
>>  >             }
>>  >         }
>>  >     }
>>  >     ethernet eth0 {
>>  >         disable: false
>>  >         discard: false
>>  >         description: ""
>>  >         hw-id: 00:50:56:a8:34:ec
>>  >         duplex: "auto"
>>  >         speed: "auto"
>>  >         address 172.20.1.253 {
>>  >             prefix-length: 23
>>  >             disable: false
>>  >         }
>>  >         vrrp {
>>  >             vrrp-group: 100
>>  >             virtual-address: 172.20.1.254
>>  >             authentication: "xxxxxx"
>>  >             advertise-interval: 1
>>  >             preempt: true
>>  >             priority: 1
>>  >         }
>>  >     }
>>  > }
>>  > service {
>>  >     nat {
>>  >         rule 2 {
>>  >             type: "source"
>>  >             inbound-interface: "eth0"
>>  >             outbound-interface: "eth1"
>>  >             protocols: "all"
>>  >             source {
>>  >                 address: "172.20.0.1"
>>  >             }
>>  >             destination {
>>  >                 network: "0.0.0.0/0"
>>  >             }
>>  >             outside-address {
>>  >                 address: x.x.x.2
>>  >             }
>>  >         }
>>  >         rule 3 {
>>  >             type: "destination"
>>  >             inbound-interface: "eth1"
>>  >             outbound-interface: "eth0"
>>  >             protocols: "all"
>>  >             source {
>>  >                 network: "0.0.0.0/0"
>>  >             }
>>  >             destination {
>>  >                 address: "x.x.x.2"
>>  >             }
>>  >             inside-address {
>>  >                 address: 172.20.0.1
>>  >             }
>>  >         }
>>  >         rule 4 {
>>  >             type: "source"
>>  >             inbound-interface: "eth0"
>>  >             outbound-interface: "eth1"
>>  >             protocols: "tcp"
>>  >             source {
>>  >                 address: "192.168.10.5"
>>  >             }
>>  >             destination {
>>  >                 network: "0.0.0.0/0"
>>  >             }
>>  >             outside-address {
>>  >                 address: x.x.x.3
>>  >             }
>>  >         }
>>  >         rule 5 {
>>  >             type: "destination"
>>  >             inbound-interface: "eth1"
>>  >             outbound-interface: "eth0"
>>  >             protocols: "tcp"
>>  >             source {
>>  >                 network: "0.0.0.0/0"
>>  >             }
>>  >             destination {
>>  >                 address: "x.x.x.3"
>>  >                 port-number 25
>>  >             }
>>  >             inside-address {
>>  >                 address: 192.168.10.5
>>  >                 port-number: 25
>>  >             }
>>  >         }
>>  >         rule 6 {
>>  >             type: "destination"
>>  >             inbound-interface: "eth1"
>>  >             outbound-interface: "eth0"
>>  >             protocols: "tcp"
>>  >             source {
>>  >                 network: "0.0.0.0/0"
>>  >             }
>>  >             destination {
>>  >                 address: "x.x.x.3"
>>  >                 port-number 80
>>  >             }
>>  >             inside-address {
>>  >                 address: 192.168.10.5
>>  >                 port-number: 80
>>  >             }
>>  >         }
>>  >         rule 7 {
>>  >             type: "destination"
>>  >             inbound-interface: "eth1"
>>  >             outbound-interface: "eth0"
>>  >             protocols: "tcp"
>>  >             source {
>>  >                 network: "0.0.0.0/0"
>>  >             }
>>  >             destination {
>>  >                 address: "x.x.x.3"
>>  >                 port-name https
>>  >             }
>>  >             inside-address {
>>  >                 address: 192.168.10.5
>>  >                 port-number: 443
>>  >             }
>>  >         }
>>  >         rule 8 {
>>  >             type: "destination"
>>  >             inbound-interface: "eth1"
>>  >             outbound-interface: "eth0"
>>  >             protocols: "tcp"
>>  >             destination {
>>  >                 address: "x.x.x.29"
>>  >                 port-number 1723
>>  >             }
>>  >             inside-address {
>>  >                 address: 192.168.10.2
>>  >                 port-number: 1723
>>  >             }
>>  >         }
>>  >         rule 9 {
>>  >             type: "source"
>>  >             inbound-interface: "eth0"
>>  >             outbound-interface: "eth1"
>>  >             protocols: "tcp"
>>  >             source {
>>  >                 address: "192.168.10.2"
>>  >                 port-number 1723
>>  >             }
>>  >             outside-address {
>>  >                 address: x.x.x.29
>>  >                 port-number: 1723
>>  >             }
>>  >         }
>>  >         rule 10 {
>>  >             type: "destination"
>>  >             inbound-interface: "eth1"
>>  >             outbound-interface: "eth0"
>>  >             protocols: "gre"
>>  >             destination {
>>  >                 address: "x.x.x.29"
>>  >             }
>>  >             inside-address {
>>  >                 address: 192.168.10.2
>>  >             }
>>  >         }
>>  >         rule 1023 {
>>  >             type: "masquerade"
>>  >             outbound-interface: "eth1"
>>  >             source {
>>  >                 network: "192.168.10.0/23"
>>  >             }
>>  >         }
>>  >         rule 1024 {
>>  >             type: "masquerade"
>>  >             outbound-interface: "eth1"
>>  >             source {
>>  >                 network: "172.20.0.0/23"
>>  >             }
>>  >         }
>>  >     }
>>  >     webgui {
>>  >         http-port: 80
>>  >         https-port: 443
>>  >     }
>>  > }
>>  > firewall {
>>  >     log-martians: "enable"
>>  >     send-redirects: "disable"
>>  >     receive-redirects: "disable"
>>  >     ip-src-route: "disable"
>>  >     broadcast-ping: "disable"
>>  >     syn-cookies: "enable"
>>  >      name "DMZ_IN" {
>>  >          description: "Input packet from public network into DMZ"
>>  >          rule 1 {
>>  >              protocol: "udp"
>>  >              action: "accept"
>>  >              log: "disable"
>>  >              source {
>>  >                  port-name: "domain"
>>  >              }
>>  >          }
>>  >          rule 2 {
>>  >              protocol: "icmp"
>>  >              action: "accept"
>>  >              log: "disable"
>>  >          }
>>  >          rule 3 {
>>  >              protocol: "udp"
>>  >              action: "accept"
>>  >              log: "disable"
>>  >              destination {
>>  >                  port-name: "domain"
>>  >              }
>>  >          }
>>  >          rule 4 {
>>  >              protocol: "tcp"
>>  >              action: "accept"
>>  >              log: "disable"
>>  >              source {
>>  >                  port-name: "domain"
>>  >              }
>>  >          }
>>  >          rule 5 {
>>  >              protocol: "tcp"
>>  >              state {
>>  >                  established: "enable"
>>  >              }
>>  >              action: "accept"
>>  >              log: "disable"
>>  >          }
>>  >          rule 6 {
>>  >              protocol: "tcp"
>>  >              action: "accept"
>>  >              log: "disable"
>>  >              destination {
>>  >                  address: 192.168.10.5
>>  >                  port-name: "smtp"
>>  >              }
>>  >          }
>>  >          rule 7 {
>>  >              protocol: "tcp"
>>  >              action: "accept"
>>  >              log: "disable"
>>  >              destination {
>>  >                  port-name: "http"
>>  >              }
>>  >          }
>>  >          rule 8 {
>>  >              protocol: "tcp"
>>  >              action: "accept"
>>  >              log: "disable"
>>  >              destination {
>>  >                  port-name: "https"
>>  >              }
>>  >          }
>>  >          rule 9 {
>>  >              protocol: "gre"
>>  >              action: "accept"
>>  >              log: "disable"
>>  >              destination {
>>  >                  address: 192.168.10.2
>>  >              }
>>  >          }
>>  >          rule 10 {
>>  >              protocol: "tcp"
>>  >              action: "accept"
>>  >              log: "disable"
>>  >              destination {
>>  >                  port-range {
>>  >                      start: 20
>>  >                      stop: 21
>>  >                  }
>>  >              }
>>  >          }
>>  >     }
>>  > }
>>  >
>>  >
>>  > but it fails to load. the xorpsh process shot up to 100% cpu and did
>>  > not load the config.  The shell just sits there with [edit] showing
>>  > and does not return me back to the shell.  I have to press Ctrl-C to
>>  > abort the operation.  When I then exit configuration mode I get the
>>  > message
>>  >
>>  > Finder disconnected. No Finder?
>>  >
>>  > Does anyone have any idea why this could be?
>>  > Thanks
>>
>>     
>>> _______________________________________________
>>>       
>>  > Vyatta-users mailing list
>>  > Vyatta-users@mailman.vyatta.com
>>  > http://mailman.vyatta.com/mailman/listinfo/vyatta-users
>>  >
>>  _______________________________________________
>>  Vyatta-users mailing list
>>  Vyatta-users@mailman.vyatta.com
>>  http://mailman.vyatta.com/mailman/listinfo/vyatta-users
>>
>>     
> _______________________________________________
> Vyatta-users mailing list
> Vyatta-users@mailman.vyatta.com
> http://mailman.vyatta.com/mailman/listinfo/vyatta-users
>   
_______________________________________________
Vyatta-users mailing list
Vyatta-users@mailman.vyatta.com
http://mailman.vyatta.com/mailman/listinfo/vyatta-users

Reply via email to