On 5 Nov 99, at 9:25, [EMAIL PROTECTED] wrote:

> I am trying to install some Watchguard Firebox II systems on internal
> networks and am running into major problems.  I am using the trusted and
> external interfaces and am using RFC1918 addresses on both sides (all
*> 10.0.0.0 addresses).  I have removed all blocked subnets and ports.  I have
> enabled just about every service in an Any to Any fashion for ingoing and
> outgoing.  When the thing is installed I can reach it from my side (on the
> external network) and users in the 'trusted' network can ping the trusted
> interface and that's all.  They cannot transit the firewall in any fashion
> with any protocol.
> 
> I keep seeing a Deny statement in the log that says eth0 is denying traffic
> from the external gateway router (which is configured in the Firebox as the
> external gateway).
> 
> Any ideas?

  See the "*" above.

  10.x.x.x is a Class A network address -- default mask is 255.0.0.0. 
 Using 10.x.x.x on both sides of the firewall is probably taken to 
mean that the trusted and untrusted networks are the *SAME* network; 
packets from your internal machines see no reason to try to traverse 
the firewall to reach untrusted addresses.
  Try using different network addresses for the trusted and untrusted 
networks....

David G


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to