Oh -- I guess I totally forgot about the custom firewalls. I am using the native Eigerstein and will soon be porting to Dachstein.
Help me to understand....So rule 1 says to accept port 80 tcp calls that come in on eth1 that are going to the modem and rule 2 says to take accept any port 80 calls tcp calls that come in on eth0 from the modem? I put the following in my file script: $IPCH -I INPUT 1 -d 192.168.100.1/32 80 -p tcp -i eth1 -j ACCEPT $IPCH -I INPUT 1 -s 192.168.100.1/32 80 -p tcp -i eth0 -j ACCEPT svi network reload wasn't happy: Starting Network: [IP Always Defrag: ENABLED] IP filters: ipchains: No target by that name ipchains: No target by that name ipchains: No target by that name ipchains: No target by that name firewall [IP Forwarding: ENABLED] When I comment these rules out, I don't get those errors. What am I doing wrong? thanks. mike. Ray Olszewski wrote: > At 01:20 PM 7/6/02 -0700, Michael McClure wrote: > >> I have a cable modem that has an internal 192.168.100.1. It is >> hooked to the ISP and gets a public address which it passes to my LRP >> eth0. I have dhcpd running on eth1 to my internal Eigerstein >> 192.168.1.x. It's a surfboard 4100 modem w/an internal status page. >> >> Now, I want to be able to look at the surfboard modems status page >> 192.168.100.1 from my eth1 internal 192.168.1.x, but I don't want to >> open my router to the work for 192.168.x.x. I want to put in a rule >> that will take an HTTP source of 192.168.1.x on eth1 and pass that >> through eth0 to 192.168.100.1. This should work because when I hook >> a laptop directly to the modem, I can http://192.168.100.1 and see >> the page. Of course, I don't want eth0 the take in 192.168.x.x from >> the outside or break any other router RFC's. >> >> I've mucked about with it and am getting frustrated. I'm pretty sure >> I need to masq between the two interfaces, but I can't get it right >> without being wide open on 192.168.100 on all ports, all protocols. >> >> can any of you ipchains experts help? > > > > It would be easier if you had mentioned whether you are using > EigerStein's built-in firewalling or one of the drop-in firewall > packages (EchoWall, ShoreWall, and so forth). > > Probably all you need to do is add these rules to whatever mechanism > your firewall uses for setup: > > ipchains -I INPUT 1 -d 192.168.100.1/32 80 -p tcp -i eth1 -j > ACCEPT > ipchains -I INPUT 1 -s 192.168.100.1/32 80 -p tcp -i eth0 -j > ACCEPT > > Some firewall rulesets will require similar additions to OUTPUT, and > conceivably FORWARD or a custom chain, but this pair will work with > many firewalls that block private addresses on the external interface. > I think these additions are enough for EigerStein, but I'm not certain > of it. > > > > -- > -----------------------------------------------"Never tell me the > odds!"-------------- > Ray Olszewski -- Han Solo > Palo Alto, California, USA [EMAIL PROTECTED] > >------------------------------------------------------------------------------------------- > > > > ------------------------------------------------------- This sf.net email is sponsored by:ThinkGeek Got root? We do. http://thinkgeek.com/sf ------------------------------------------------------------------------ leaf-user mailing list: [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html