I'm trying to configure a backup/replacement of a Sonicwall firewall
which sits between our company LAN and an ADSL router.  We have been
allocated a range of IP addresses....

212.107.213.9           (the adsl modem)
212.107.213.10          (firewall WAN interface)
212.107.213.11          (incoming email comes to this address)
212.107.213.12          (DMZ - not used yet)

We run MS Exchange on the LAN server  (192.168.175.1)  - there is a
'one-to-one NAT' entry in the firewall which lets incoming mail through
to the mail server (directs incoming traffic 212.107.213.11 >>
192.168.175.1)

I've sucessfully got the Dachstein LEAF Firewall (floppy disk) running
and browsing pages across a test network with the external and internal
interfaces set the same as the Sonicwall (213.107.212.10 and
192.168.175.9 respectively).  I'm struggling to find how I can set a
rule which would direct mail arriving at 212.107.213.11 to the mail
server at 192.168.175.1.

I've searched and read a fair bit, and this page sounds the most
promising.....?
http://sourceforge.net/docman/display_doc.php?docid=10418&group_id=13751

Can anyone tell me if I'm on the right track?  I don't have alot of
experience with Linux or firewalls yet - any help would be appreciated.

Cheers,

MW

***********************************************************
*************************************
        the exact name of the LEAF distribution and version you are
running:
        dachstein-v1.0.2-1680
        *************************************
        the exact kernel version you are running
                Linux firewall 2.2.19-3-LEAF #1
                *************************************
        the complete, exact output of     ip addr show
                1: lo: <LOOPBACK,UP> mtu 3924 qdisc noqueue
                    link/loopback 00:00:00:00:00:00 brd
00:00:00:00:00:00 
                    inet 127.0.0.1/8 brd 127.255.255.255 scope global lo
                2: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc
pfifo_fast qlen 100
                    link/ether 00:60:08:5e:90:46 brd ff:ff:ff:ff:ff:ff
                    inet 213.107.212.10/29 brd 213.107.212.15 scope
global eth0
                3: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc
pfifo_fast qlen 100
                    link/ether 00:08:c7:39:af:07 brd ff:ff:ff:ff:ff:ff
                    inet 192.168.175.9/24 brd 192.168.175.255 scope
global eth1
                *************************************
        the complete, exact output of     ip route show
                213.107.212.8/29 dev eth0 proto kernel scope link src
213.107.212.10
                192.168.175.0/24 dev eth1 proto kernel scope link src
192.168.175.9
                default via 213.107.212.9 dev eth0

                *************************************
        the exact wording of any ping failure responses (there are some
FAQ entries
<http://sourceforge.net/docman/display_doc.php?docid=4099&group_id=13751
> to help you). 
          From the LEAF box, I can ping the WAN and LAN interfaces, and
the machines attached to those interfaces.
        *************************************
The output from    ipchains -nvL:

Chain input (policy DENY: 0 packets, 0 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname     mark
outsize  source                destination           ports
    0     0 DENY       icmp ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             5 ->   *
    0     0 DENY       icmp ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             13 ->   *
    0     0 DENY       icmp ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             14 ->   *
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
0.0.0.0              0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
255.255.255.255      0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
127.0.0.0/8          0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
224.0.0.0/4          0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
10.0.0.0/8           0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
172.16.0.0/12        0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
192.168.0.0/16       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
0.0.0.0/8            0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
128.0.0.0/16         0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
191.255.0.0/16       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
192.0.0.0/24         0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
223.255.255.0/24     0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
240.0.0.0/4          0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
192.168.175.0/24     0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
213.107.212.10       0.0.0.0/0             n/a
    0     0 REJECT     all  ----l- 0xFF 0x00  eth0
0.0.0.0/0            127.0.0.0/8           n/a
    0     0 REJECT     all  ----l- 0xFF 0x00  eth0
0.0.0.0/0            192.168.175.0/24      n/a
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   137
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   135
   45  3510 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   137
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   135
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   138:139
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   138
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             137:138 ->   *
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             135 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             137:139 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             135 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   113
   47 10692 ACCEPT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   1024:65535
    0     0 REJECT     udp  ----l- 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   161:162
    0     0 ACCEPT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   53
    0     0 ACCEPT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   68
    0     0 DENY       udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   67
    0     0 ACCEPT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   1024:65535
    3   252 ACCEPT     icmp ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   *
    0     0 ACCEPT     ospf ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             n/a
    0     0 REJECT     udp  ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             * ->   161:162
    0     0 REJECT     udp  ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             161:162 ->   *
  816 82209 ACCEPT     all  ------ 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             n/a
Chain forward (policy DENY: 0 packets, 0 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname     mark
outsize  source                destination           ports
    0     0 DENY       icmp ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             5 ->   *
  479 44227 MASQ       all  ------ 0xFF 0x00  eth0
192.168.175.0/24     0.0.0.0/0             n/a
    0     0 DENY       all  ------ 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             n/a
Chain output (policy DENY: 0 packets, 0 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname     mark
outsize  source                destination           ports
  759  117K fairq      all  ------ 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
0.0.0.0              0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
255.255.255.255      0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
127.0.0.0/8          0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
224.0.0.0/4          0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
10.0.0.0/8           0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
172.16.0.0/12        0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
192.168.0.0/16       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
0.0.0.0/8            0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
128.0.0.0/16         0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
191.255.0.0/16       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
192.0.0.0/24         0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
223.255.255.0/24     0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
240.0.0.0/4          0.0.0.0/0             n/a
    0     0 DENY       all  ------ 0xFF 0x00  eth0
192.168.175.0/24     0.0.0.0/0             n/a
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   137
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   135
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   137
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   135
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   138:139
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   138
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             137:138 ->   *
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             135 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             137:139 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             135 ->   *
  759  117K ACCEPT     all  ------ 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             n/a
Chain fairq (1 references):
 pkts bytes target     prot opt    tosa tosx  ifname     mark
outsize  source                destination           ports
    0     0 RETURN     ospf ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             n/a
    0     0 RETURN     ospf ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             n/a
    0     0 RETURN     udp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             * ->   520
    0     0 RETURN     udp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             520 ->   *
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             * ->   179
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             179 ->   *
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             * ->   53
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             53 ->   *
  428 31842 RETURN     udp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             * ->   53
    0     0 RETURN     udp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             53 ->   *
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x2
0.0.0.0/0            0.0.0.0/0             * ->   23
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x2
0.0.0.0/0            0.0.0.0/0             23 ->   *
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x2
0.0.0.0/0            0.0.0.0/0             * ->   22
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x2
0.0.0.0/0            0.0.0.0/0             22 ->   *


---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.371 / Virus Database: 206 - Release Date: 6/13/02
 


-------------------------------------------------------
This sf.net email is sponsored by: OSDN - Tired of that same old
cell phone?  Get a new here for FREE!
https://www.inphonic.com/r.asp?r=sourceforge1&refcode1=vs3390
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to