From: "Deepak Seshadri" <dseshadri@broadbandmaritime.com>
To: Daniel Chemko <dchemko@smgtec.com>, netfilter@lists.netfilter.org
Cc: "John A. Sullivan III" <jsullivan@opensourcedevelopmentcorp.com>
Subject: Re: DMZ Question
Date: Tue, 5 Oct 2004 23:44:53 -0400 [thread overview]
Message-ID: <005e01c4ab56$d7201e40$02c8a8c0@floydian> (raw)
In-Reply-To: 7C9884991ADAE0479C14F10C858BCDF591E381@alderaan.smgtec.com
Hello Daniel & John,
Thank you very much for your replies. Kudos to both of you for somehow interpreting the garbled ASCII art. It is the result of composing an "HTML format" email in Outlook '03.
I created a small subnet of /29 bits subnet mask for the DMZ and added the IPs of the machines in the DMZ to the outside interface of the firewall. I used DNAT & restricted access to only the intended services on those machines. Everything worked well. Thank you for the prompt replies.
Best Regards,
Deepak Seshadri
----- Original Message -----
From: Daniel Chemko
To: Deepak Seshadri ; netfilter@lists.netfilter.org
Cc: Imran Bashir ; Veena Rao ; Syed Amjad Ali ; Zia Ullah
Sent: Monday, October 04, 2004 2:09 PM
Subject: RE: DMZ Question
You ASCII arts looks like death!
In order to 'bind' any number of DNAT addresses to the firewall, you
have two choices.
1. Actually bind the IP address to the physical interface, such as:
ip addr add w.x.y.z/24 dev eth1
This will then get the DNAT from iptables.
iptables -t nat -A PREROUTING --destination w.x.y.z -j DNAT --to
${My_NEW_ADDR}
2. ProxyARP the IP address (http://www.sjdjweis.com/linux/proxyarp/):
echo 1 > /proc/sys/net/ipv4/conf/eth1/proxy_arp
echo 1 > /proc/sys/net/ipv4/conf/eth0/proxy_arp
This will then get the DNAT from iptables.
iptables -t nat -A PREROUTING --destination w.x.y.z -j DNAT --to
${My_NEW_ADDR}
There is one to catch when doing this. If you have a single DNS source
for external and internal machines, you'll have to resolve the machine's
ip's the external IP. Netfilter will not work performing what I call
reflective nat out of the box.
I consider reflective nat to be when you want to connect to a machine on
your subnet but under a different IP address.
# You should have something like this line already
iptables -t nat -A PREROUTING --destination w.x.y.z -j DNAT --to
${My_NEW_ADDR}
# Allow traffic to bounce off the interface
iptables -A FORWARD -o ${IF_DMZ} -o ${IF_DMZ} -j ACCEPT
# Force the firewall to rewrite the source IP of the packet since
conntrack refuses to allow SRC->FW->DST->SRC flows
iptables -t nat -A POSTROUTING --destination ${My_NEW_ADDR} --source
${DMZ_NET}/${DMZ_MSK} -j SNAT --to ${FW_DMZ_IP}
next prev parent reply other threads:[~2004-10-06 3:44 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2004-10-04 18:09 DMZ Question Daniel Chemko
2004-10-06 3:44 ` Deepak Seshadri [this message]
2004-10-06 12:02 ` John Black
2004-10-06 12:35 ` Jason Opperisano
-- strict thread matches above, loose matches on Subject: below --
2004-10-04 18:11 Daniel Chemko
2004-10-04 17:41 Deepak Seshadri
2004-10-04 18:06 ` John A. Sullivan III
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='005e01c4ab56$d7201e40$02c8a8c0@floydian' \
--to=dseshadri@broadbandmaritime.com \
--cc=dchemko@smgtec.com \
--cc=jsullivan@opensourcedevelopmentcorp.com \
--cc=netfilter@lists.netfilter.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.