As per the advice that I was given earlier today, I am hoping that this
information will be more helpful in getting to the bottom of my problem.
Please note that this configuration is slighly different than the one I posted
earlier. The differance being that I have NOT opened all internet traffic to my
DMZ. Instead I have chosen block all of the ports in my DMZ except the ones I
need for my server. Regardless of these changes, the problem still persists.
This is my first attempt at setting up a DMZ so I am
> admitting now that I probably got it all wrong. That said, I am hoping
> someone on the list can point out where I have made my mistakes and point
me in the right direction. Here is what I am attempting to accomplish.
GOAL IS:
> TO ALLOW "specific" traffic from the INTERNET INTO MY DMZ
> TO ALLOW DMZ ACCESS TO THE INTERNET (BUT LOG IT)
> TO ALLOW LOC ZONE OPEN ACCESS TO DMZ AND THE INTERNET
> TO BLOCK ALL TRAFFIC FROM DMZ TO LOC ZONE and log it if it
> tries to connect to loc zone.
> TO ALLOW DNSCACHE TO WORK FOR BOTH ZONES.
NETWORK LOOKS LIKE THIS:
-----> Internet to eth0 on Bering box
-----> eth0 Bering box using shorewall
----> eth1 loc zone
-----> eth2 dmz zone
THE PROBLEM IS:
POOR FILE TRANSFER RATE (ftp) BETWEEN LOC ZONE AND DMZ ZONE.
I thought I had it all working until I attempted to do an
ftp file transfer between my windoz systems on the loc zone to my Linux
server in the dmz zone. My transfer rate was terrible. (45kb/s should be
1400kb/s!) But, if I connect to a remote ftp server though my windoz box in the
loc zone,or my Linux server in the dmz zone, the transfer rate is normal. The
problem only seems to effect ftp but truthfully that is the only file tranfer
protocol that I use between my Linux server in the dmz and my windows box in the
loc zone so I can't say if it effects anything else.
> Please keep in mind that this is my first
> attempt at this and I have tried to follow the shorewall howto for setting
> up three interfaces but I am pretty sure I goofed.
> PLEASE HELP! I have included all the info that I think is pertinent but if you
require more please let me know and I will provide it. Thanks in advance.
>
> Troy
#
# Shorewall 1.3 -- Policy File
#
# /etc/shorewall/policy
###############################################################################
#SOURCE DEST POLICY LOG LEVEL LIMIT:BURST
loc net ACCEPT
loc dmz ACCEPT
dmz net ACCEPT info
dmz loc DROP info
#
# If you want open access to the internet from your firewall, uncomment the
# following line
#fw net ACCEPT
net all DROP info
all all REJECT info
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOTE
#
# Shorewall version 1.3 - Rules File
#
# /etc/shorewall/rules
#ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL
# PORT PORT(S) DEST
# Accept DNS connections from the firewall to the network
#
ACCEPT fw net tcp 53
ACCEPT fw net udp 53
#
# Accept SSH connections from the local network for administration
#
ACCEPT loc fw tcp 22
# DENAT to my webserver from web
DNAT net dmz:192.168.2.26:80 tcp 80
# DENAT to my sshserver from web
DNAT net dmz:192.168.2.26 tcp 22
# DENAT to my ftpserver from web
DNAT net dmz:192.168.2.2 tcp 21
# DENAT to my sshserver from web
DNAT net dmz:192.168.2.26 tcp 22
#DNAT to my SSL webmin server from web
DNAT net dmz:192.168.2.26:25000 tcp https -
DNAT net dmz:192.168.2.26:25000 tcp 25000
# Bering specific rules:
# allow loc to fw udp/53 for dnscache to work
# allow loc to fw tcp/80 for weblet to work
#
ACCEPT loc fw udp 53
ACCEPT loc fw tcp 80
ACCEPT loc fw udp 67
ACCEPT loc fw udp 68
# Bering specific rules:
# allow dmz to fw udp/53 for dnscache to work
# allow dmz to fw tcp/80 for weblet to work
#
ACCEPT dmz fw udp 53
ACCEPT dmz fw tcp 80
ACCEPT dmz fw udp 67
ACCEPT dmz fw udp 68
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE
#
# Shorewall 1.3 - Masquerade file
#
# /etc/shorewall/masq
#
##############################################################################
#INTERFACE SUBNET ADDRESS
eth0 eth1
eth0 eth2
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
#
# Shorewall 1.3 -- Interfaces File
#
# /etc/shorewall/interfaces
##############################################################################
#ZONE INTERFACE BROADCAST OPTIONS
net eth0 detect dhcp,routefilter,norfc1918,noping
loc eth1 detect routestopped
dmz eth2 detect routestopped
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE
# uname -a
Linux firewall 2.4.18 #4 Sun Jun 9 09:46:15 CEST 2002 i586 unknown
# ip addr show
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop
link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:04:5a:51:c2:3f brd ff:ff:ff:ff:ff:ff
inet 192.139.75.34/27 brd 192.139.75.63 scope global eth0
4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:04:5a:51:c1:91 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.254/24 brd 192.168.1.255 scope global eth1
5: eth2: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:50:fc:21:01:6c brd ff:ff:ff:ff:ff:ff
inet 192.168.2.254/24 brd 192.168.2.255 scope global eth2
# ip route show
192.139.75.32/27 dev eth0 proto kernel scope link src 192.139.75.34
192.168.2.0/24 dev eth2 proto kernel scope link src 192.168.2.254
192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.254
default via 192.139.75.33 dev eth0
# lsmod
Module Pages Used by
ip_nat_h323 2628 0 (unused)
ip_conntrack_h323 2280 1
ip_nat_irc 2384 0 (unused)
ip_nat_ftp 2960 0 (unused)
ip_conntrack_irc 3056 1
ip_conntrack_ftp 3824 1
ppp_mppe 20168 0 (unused)
ppp_async 5932 0 (unused)
ppp_generic 14920 0 [ppp_mppe ppp_async]
slhc 4264 0 [ppp_generic]
8139too 13308 1
mii 912 0 [8139too]
tulip 36928 2
Shorewall-1.3.1 Chain at firewall - Tue Oct 8 21:22:26 UTC 2002
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT ah -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 eth0_in ah -- eth0 * 0.0.0.0/0 0.0.0.0/0
0 0 eth1_in ah -- eth1 * 0.0.0.0/0 0.0.0.0/0
0 0 eth2_in ah -- eth2 * 0.0.0.0/0 0.0.0.0/0
0 0 common ah -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG ah -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:'
0 0 reject ah -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP 1 packets, 48 bytes)
pkts bytes target prot opt in out source destination
0 0 eth0_fwd ah -- eth0 * 0.0.0.0/0 0.0.0.0/0
0 0 eth1_fwd ah -- eth1 * 0.0.0.0/0 0.0.0.0/0
-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html