I am stuck with a request from a client. A FreeBSD box, with 3 nic's 
appears as:

[internet]----/FreeBSD/------>[lan 192.168.1.2]
                  ^
                  |------>[dmz 192.168.10.2]

dmz receiv (and replies) requests for dns/sendmail/apache either from 
internet or from the lan thru the FreeBSD box. What is needed: all and 
ANY packet originated from dmz and destinated to lan must be denyied 
(drop/reject). The intent is that, even if a bad-boy goes to dmz the 
firewall still will refuse connection originated from this (compromised) 
box to the internal lan.

I am using ipfilter for this setup.

note: even changing rules a lot, I am unable to do this. Then I just 
tryied to 'block everything for that machine':

:=== begin
block in quick from any to 192.168.1.89
block out quick from any to 192.168.1.89
block in quick from 192.168.1.89 to any
:===

but nmap (from dmz) still shows open ports 22 and 53 on these machine.

How to effectively BLOCK every packet from dmz to internal lan?? :o(


-- 

sauda��es,

irado furioso com tudo.
Linux User (SuSE) 179.402
a f� move montanhas. Mas tratores s�o mais eficientes e exigem menos 
esf�r�o de 'f�', �sse estranho departamento. Afinal, acreditando ou n�o, 
o trator manda a montanha embora. J� a f�.. cad� o mapa com o antes e o 
depois??

_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to