Charles Steinkuehler wrote:
>
> > Did you see this, yesterday?
>
> Yeah...got distracted while analizing & it got dropped...
OK, sorry for my impatience . . .
> > > The final problem is the fact that you can't do an snmpwalk from the
> > > firewall to the DMZ. Apparently, the SNMP query packets are
> transmitted,
> > > but no response is recieved. I still don't understand why this is
> > > happening, especially if you can do an snmpwalk from the internal
> network (I
> > > think I remember you saying you could...)
> > >
> > > Patch your ipfilter.conf, and see how much farther that gets you. If
> you
> > > still can't snmpwalk from the firewall, take tcpdumps at both the
> firewall
> > > (DMZ IF) and the DMZ system, while trying to snmpwalk from both the
> firewall
> > > and from an internal system.
> >
> > Following are dumps for snmpwalk failure between DCD and one of its dmz
> > hosts. I have tried to remove spurious data, like Unknown IPX packet
> > stuff ;< The rest I could not rule out -- can you?
>
> We'll see...are you actually running an IPX network?
Yes, and else, too ;>
[ snip ]
> I'm confused. I don't think the firewall rules on the .65 machine can be
> your problem, since you're seeing the request packets go out, and even if
> the replies were being dropped, tcpdump would see them at the interface.
> About the only thing that comes to mind is your snmp configuration on the
> .66 machine. Are you *SURE* you've allowed snmp queries from the firewall
> IP and you're not firewalling any traffic on the .66 system? Which version
> of SNMP are you running?
Join the club ;>
w.x.y.66 is a netware v5.x box, a mail server running groupies, &c.
It's not my environment, but an associate's. I know (next to) nothing
about netware and he knows nearly nothing about snmp. I've queried snmp
v1, 2c and 3 -- all same results. No, there is not any ip filtering on
that box.
> If you can't find any problems with the configuration of the .66 machine, do
> a tcp dump on the DMZ IF of the the firewall while trying to snmpwalk from
> the firewall and from an internal network system (am I remembering correctly
> that you said internal systems could see the DMZ snmp server?). It would
> probalby also help if you provide the output of net ipfilter list and your
> snmp config file from the DMZ system...
Yes, I can snmpwalk w.x.y.66 *both* from a remote internet host _and_
from some moronic wintel box inside its internal network (notice, *not*
on the dmz).
This weekend, I will try to comply with your latest test . . .
Follows, hopefully readable, is output of net ipfilter list from subject
DCD:
Chain input (policy DENY: 7 packets, 801 bytes):
pkts bytes target prot opt tosa tosx ifname mark
outsize source destination ports
0 0 DENY all ------ 0xFF 0x00
wan1 0.0.0.0/0
255.255.255.255 n/a
0 0 DENY icmp ----l- 0xFF 0x00
* 0.0.0.0/0
0.0.0.0/0 5 -> *
0 0 DENY icmp ----l- 0xFF 0x00
* 0.0.0.0/0
0.0.0.0/0 13 -> *
0 0 DENY icmp ----l- 0xFF 0x00
* 0.0.0.0/0
0.0.0.0/0 14 -> *
0 0 DENY all ----l- 0xFF 0x00
wan1 0.0.0.0
0.0.0.0/0 n/a
1 43 DENY all ----l- 0xFF 0x00
wan1 255.255.255.255
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 127.0.0.0/8
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 224.0.0.0/4
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 10.0.0.0/8
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 172.16.0.0/12
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 192.168.0.0/16
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 0.0.0.0/8
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 128.0.0.0/16
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 191.255.0.0/16
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 192.0.0.0/24
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 223.255.255.0/24
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 240.0.0.0/4
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 192.168.1.0/24
0.0.0.0/0 n/a
0 0 dmzSpoof all ------ 0xFF 0x00
wan1 w.x.y.64/26
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 w.x.z.157
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 w.x.y.72
0.0.0.0/0 n/a
0 0 REJECT all ----l- 0xFF 0x00
wan1 0.0.0.0/0
127.0.0.0/8 n/a
0 0 REJECT all ----l- 0xFF 0x00
wan1 0.0.0.0/0
192.168.1.0/24 n/a
0 0 REJECT tcp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 137
0 0 REJECT tcp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 135
105 8190 REJECT udp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 137
0 0 REJECT udp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 135
4 192 REJECT tcp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 138:139
0 0 REJECT udp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 138
0 0 REJECT udp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 137:138 -> *
0 0 REJECT udp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 135 -> *
0 0 REJECT tcp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 137:139 -> *
0 0 REJECT tcp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 135 -> *
17340 2940K dmzIn all ------ 0xFF 0x00
wan1 0.0.0.0/0
w.x.y.64/26 n/a
14 728 ACCEPT tcp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 22
0 0 REJECT tcp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 113
81135 71M ACCEPT tcp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 1024:65535
0 0 ACCEPT udp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 123
1835 285K ACCEPT udp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 161
0 0 ACCEPT udp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 162
0 0 ACCEPT udp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 514
3476 710K ACCEPT udp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 500
0 0 DENY udp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 67
1894 487K ACCEPT udp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 1024:65535
105 6175 ACCEPT icmp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> *
0 0 ACCEPT ospf ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 n/a
9 1064 ACCEPT 50 ------ 0xFF 0x00
wan1 0.0.0.0/0
w.x.z.157 n/a
0 0 ACCEPT 51 ------ 0xFF 0x00
wan1 0.0.0.0/0
w.x.z.157 n/a
39 2061 DENY all ----l- 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 n/a
109K 23M ACCEPT all ------ 0xFF 0x00
* 0.0.0.0/0
0.0.0.0/0 n/a
Chain forward (policy DENY: 0 packets, 0 bytes):
pkts bytes target prot opt tosa tosx ifname mark
outsize source destination ports
0 0 DENY icmp ----l- 0xFF 0x00
* 0.0.0.0/0
0.0.0.0/0 5 -> *
0 0 MASQ tcp ------ 0xFF 0x00
* 192.168.1.20
0.0.0.0/0 5631 -> *
0 0 MASQ udp ------ 0xFF 0x00
* 192.168.1.20
0.0.0.0/0 5632 -> *
14296 940K MASQ all ------ 0xFF 0x00
eth1 192.168.1.0/24
w.x.y.64/26 n/a
0 0 ACCEPT tcp ------ 0xFF 0x00
eth1 0.0.0.0/0
w.x.y.66 * -> 110
2771 1879K ACCEPT tcp ------ 0xFF 0x00
eth1 0.0.0.0/0
w.x.y.66 * -> 25
2250 157K ACCEPT tcp ------ 0xFF 0x00
eth1 0.0.0.0/0
w.x.y.66 * -> 80
0 0 ACCEPT tcp ------ 0xFF 0x00
eth1 0.0.0.0/0
w.x.y.66 * -> 7205
22 1668 ACCEPT udp ------ 0xFF 0x00
eth1 0.0.0.0/0
w.x.y.66 * -> 161
16 1451 ACCEPT udp ------ 0xFF 0x00
wan1 w.x.y.66
0.0.0.0/0 161 -> *
0 0 ACCEPT udp ------ 0xFF 0x00
eth1 0.0.0.0/0
w.x.y.66 * -> 7205
0 0 ACCEPT udp ------ 0xFF 0x00
wan1 w.x.y.66
0.0.0.0/0 7205 -> *
28 2076 ACCEPT udp ------ 0xFF 0x00
eth1 0.0.0.0/0
w.x.y.68 * -> 161
16 1416 ACCEPT udp ------ 0xFF 0x00
wan1 w.x.y.68
0.0.0.0/0 161 -> *
0 0 ACCEPT tcp ------ 0xFF 0x00
eth1 0.0.0.0/0
w.x.y.67 * -> 5631
0 0 ACCEPT udp ------ 0xFF 0x00
eth1 0.0.0.0/0
w.x.y.67 * -> 5632
0 0 ACCEPT udp ------ 0xFF 0x00
wan1 w.x.y.67
0.0.0.0/0 5632 -> *
724 36354 ACCEPT tcp !y---- 0xFF 0x00
eth1 0.0.0.0/0
w.x.y.64/26 * -> 1024:65535
372 18280 ACCEPT icmp ------ 0xFF 0x00
eth1 0.0.0.0/0
w.x.y.64/26 * -> *
7257 4444K ACCEPT tcp ------ 0xFF 0x00
wan1 w.x.y.64/26
0.0.0.0/0 * -> *
4 136 ACCEPT icmp ------ 0xFF 0x00
wan1 w.x.y.64/26
0.0.0.0/0 * -> *
0 0 ACCEPT udp ------ 0xFF 0x00
wan1 w.x.y.64/26
0.0.0.0/0 53 -> *
178 12609 MASQ udp ------ 0xFF 0x00
wan1 w.x.y.64/26
0.0.0.0/0 * -> *
61687 9489K MASQ all ------ 0xFF 0x00
wan1 192.168.1.0/24
0.0.0.0/0 n/a
2117 109K DENY all ----l- 0xFF 0x00
eth1 0.0.0.0/0
w.x.y.64/26 n/a
0 0 DENY all ------ 0xFF 0x00
* 0.0.0.0/0
0.0.0.0/0 n/a
Chain output (policy DENY: 5 packets, 200 bytes):
pkts bytes target prot opt tosa tosx ifname mark
outsize source destination ports
211K 99M fairq all ------ 0xFF 0x00
* 0.0.0.0/0
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 0.0.0.0
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 255.255.255.255
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 127.0.0.0/8
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 224.0.0.0/4
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 10.0.0.0/8
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 172.16.0.0/12
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 192.168.0.0/16
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 0.0.0.0/8
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 128.0.0.0/16
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 191.255.0.0/16
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 192.0.0.0/24
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 223.255.255.0/24
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
wan1 240.0.0.0/4
0.0.0.0/0 n/a
0 0 DENY all ------ 0xFF 0x00
wan1 192.168.1.0/24
0.0.0.0/0 n/a
0 0 REJECT tcp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 137
0 0 REJECT tcp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 135
0 0 REJECT udp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 137
0 0 REJECT udp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 135
0 0 REJECT tcp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 138:139
0 0 REJECT udp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 * -> 138
0 0 REJECT udp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 137:138 -> *
0 0 REJECT udp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 135 -> *
0 0 REJECT tcp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 137:139 -> *
0 0 REJECT tcp ------ 0xFF 0x00
wan1 0.0.0.0/0
0.0.0.0/0 135 -> *
211K 99M ACCEPT all ------ 0xFF 0x00
* 0.0.0.0/0
0.0.0.0/0 n/a
Chain fairq (1 references):
pkts bytes target prot opt tosa tosx ifname mark
outsize source destination ports
0 0 RETURN ospf ------ 0xFF 0x00 *
0x1 0.0.0.0/0 0.0.0.0/0 n/a
0 0 RETURN ospf ------ 0xFF 0x00 *
0x1 0.0.0.0/0 0.0.0.0/0 n/a
0 0 RETURN udp ------ 0xFF 0x00 *
0x1 0.0.0.0/0 0.0.0.0/0 * ->
520
0 0 RETURN udp ------ 0xFF 0x00 *
0x1 0.0.0.0/0 0.0.0.0/0 520
-> *
0 0 RETURN tcp ------ 0xFF 0x00 *
0x1 0.0.0.0/0 0.0.0.0/0 * ->
179
0 0 RETURN tcp ------ 0xFF 0x00 *
0x1 0.0.0.0/0 0.0.0.0/0 179
-> *
0 0 RETURN tcp ------ 0xFF 0x00 *
0x1 0.0.0.0/0 0.0.0.0/0 * ->
53
12 656 RETURN tcp ------ 0xFF 0x00 *
0x1 0.0.0.0/0 0.0.0.0/0 53 ->
*
3109 210K RETURN udp ------ 0xFF 0x00 *
0x1 0.0.0.0/0 0.0.0.0/0 * ->
53
1240 164K RETURN udp ------ 0xFF 0x00 *
0x1 0.0.0.0/0 0.0.0.0/0 53 ->
*
0 0 RETURN tcp ------ 0xFF 0x00 *
0x2 0.0.0.0/0 0.0.0.0/0 * ->
23
0 0 RETURN tcp ------ 0xFF 0x00 *
0x2 0.0.0.0/0 0.0.0.0/0 23 ->
*
3 132 RETURN tcp ------ 0xFF 0x00 *
0x2 0.0.0.0/0 0.0.0.0/0 * ->
22
7988 1020K RETURN tcp ------ 0xFF 0x00 *
0x2 0.0.0.0/0 0.0.0.0/0 22 ->
*
Chain dmzSpoof (1 references):
pkts bytes target prot opt tosa tosx ifname mark
outsize source destination ports
0 0 RETURN all ------ 0xFF 0x00
* w.x.z.158
0.0.0.0/0 n/a
0 0 RETURN all ------ 0xFF 0x00
* w.x.z.157
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
* 0.0.0.0/0
0.0.0.0/0 n/a
Chain dmzIn (1 references):
pkts bytes target prot opt tosa tosx ifname mark
outsize source destination ports
0 0 RETURN all ------ 0xFF 0x00
* 0.0.0.0/0
w.x.z.158 n/a
0 0 RETURN all ------ 0xFF 0x00
* 0.0.0.0/0
w.x.z.157 n/a
17340 2940K ACCEPT all ------ 0xFF 0x00
* 0.0.0.0/0
0.0.0.0/0 n/a
AutoFW:
Type Prot Low High Vis Hid Where Last CPto CPrt Timer Flags
MarkFW:
fwmark rediraddr rport pcnt pref
PortFW:
prot localaddr rediraddr lport rport pcnt
pref
UDP w.x.z.157 192.168.1.20 55632 5632 10
10
TCP w.x.z.157 192.168.1.20 55631 5631 10
10
--
Best Regards,
mds
mds resource
888.250.3987
Dare to fix things before they break . . .
Our capacity for understanding is inversely proportional to how much we
think we know. The more I know, the more I know I don't know . . .
_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user