Charles Steinkuehler wrote: > > Comments inline. > > > Yes, I, too, have been confused by some of this. We have several > > successful proxy-arp dmz's; so, when we built this one, we started by > > cloning those other config's and changing addresses, &c. and it > appeared > > to be working as expected. > > > > # ip route > > 64.4.222.158 dev ipsec0 proto kernel scope link src 64.4.222.157 > > 64.4.222.158 dev wan1 proto kernel scope link src 64.4.222.157 > > 64.4.197.64/26 dev eth1 scope link > > 192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.254 > > 192.168.123.0/24 via 64.4.222.158 dev ipsec0 > > default via 64.4.222.158 dev wan1 > > This looks OK, assuming your ISP is routing the 64.4.197.64/26 subnet to > your WAN IP. Some traceroutes indicate this is what's happening (more > on that later).
Remember, this is ip route for the old, proxy-arp dmz . . . <snip /> > This is how your local system is setup...I was looking more for what > your ISP told you about your public IP's (if anything). Typically on > the sheet of "technical details" along with stuff like your DNS and > e-mail servers... I don't have that here; must wait to retrieve from an associate later . . . > I have attempted to extract what your ISP is doing by running some > traceroutes: > > [root@falcon root]# for DEST in 63 64 65 99 127 128 ; do > > echo ; traceroute -nf 17 -w 2 -m 20 64.4.197.$DEST ; done <snip /> > Note the reachability of systems you have assigned IP's to (.65, .99, & > .101), the fact that systems you don't have configured but are within > your subnet are routed to your firewall (.98 & .102), and that your > network and broadcast IP's follow the same path, but don't get a > response from your firewall (.64 & .127). > > All of this indicates to me that your ISP is routing the entire /26 > network to your firewall, so you have a classic "routed" DMZ, with 61 > usable IP's (woo-hoo!). OK <snip /> > > # ip route > > 64.4.222.158 dev ipsec0 proto kernel scope link src 64.4.222.157 > > 64.4.222.158 dev wan1 proto kernel scope link src 64.4.222.157 > > 64.4.197.64/26 dev eth1 proto kernel scope link src 64.4.197.65 > > 192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.254 > > 192.168.123.0/24 via 64.4.222.158 dev ipsec0 > > default via 64.4.222.158 dev wan1 > > Looks good. Remember, this is the new, non-proxy-arp dmz . . . <snip /> > > 17: wan1: <POINTOPOINT,NOARP,UP> mtu 1500 qdisc pfifo_fast qlen 100 > > link/ppp > > inet 64.4.222.157 peer 64.4.222.158/32 scope global wan1 > > inet 64.4.197.99/32 scope global wan1 > > inet 64.4.197.100/32 scope global wan1 > > inet 64.4.197.101/32 scope global wan1 > > Please *REMOVE* the extra IP's assigned to your wan interface and see > what happens (ie wan1 should have *ONLY* the 64.4.222.157 IP). The fact > that you have IP's assigned to the firewall that actually belong on your > DMZ network could be the source of all your confusion. Remember, the > wan interface is an arpless point-to-point interface, and even if wan1 > was an ethernet NIC, your IP configuration would not work in either a > routed *OR* a proxy-arp DMZ. Yes, looks pretty dumb; but, we have these mapped to systems on NAT'ed internal network. Besides, I have done same testing *without* these and results are identical . . . <snip /> > > # ping -c 3 64.4.197.127 > > PING 64.4.197.127 (64.4.197.127): 56 data bytes > > 64 bytes from 64.4.197.65: icmp_seq=0 ttl=255 time=0.3 ms > > 64 bytes from 64.4.197.69: icmp_seq=0 ttl=255 time=0.7 ms (DUP!) > > 64 bytes from 64.4.197.68: icmp_seq=0 ttl=128 time=0.9 ms (DUP!) > > 64 bytes from 64.4.197.65: icmp_seq=1 ttl=255 time=0.3 ms > > 64 bytes from 64.4.197.69: icmp_seq=1 ttl=255 time=0.7 ms (DUP!) > > 64 bytes from 64.4.197.68: icmp_seq=1 ttl=128 time=0.9 ms (DUP!) > > 64 bytes from 64.4.197.65: icmp_seq=2 ttl=255 time=0.3 ms > > > > --- 64.4.197.127 ping statistics --- > > 3 packets transmitted, 3 packets received, 4 duplicates, 0% packet > loss > > round-trip min/avg/max = 0.3/0.5/0.9 ms > > This is as expected, and even makes sense. What, pray tell, are those DUP! lines? <snip /> > > # ping -c 3 64.4.197.127 > > PING 64.4.197.127 (64.4.197.127): 56 data bytes > > 64 bytes from 192.168.1.254: icmp_seq=0 ttl=255 time=0.3 ms > > 64 bytes from 192.168.1.254: icmp_seq=1 ttl=255 time=0.2 ms > > 64 bytes from 192.168.1.254: icmp_seq=2 ttl=255 time=0.2 ms > > > > --- 64.4.197.127 ping statistics --- > > 3 packets transmitted, 3 packets received, 0% packet loss > > round-trip min/avg/max = 0.2/0.2/0.3 ms > > I'm confused as to why the responding IP is the internal IP of your > firewall, rather than an IP on your DMZ network. Pretty cool, huh? I'm also more than a little mystified . . . <snip /> > > I'd be happy to publish more information to the website -- what more > do > > you need? > > Just wondering what made you think a DNS query arrived. Tcpdump? > Packet log? Something else? See other posts and corresponding webpage -- tail -f /var/log/dnscache/* <snip /> -- Best Regards, mds mds resource 888.250.3987 Dare to fix things before they break . . . Our capacity for understanding is inversely proportional to how much we think we know. The more I know, the more I know I don't know . . . ------------------------------------------------------- This sf.net email is sponsored by:ThinkGeek Welcome to geek heaven. http://thinkgeek.com/sf ------------------------------------------------------------------------ leaf-user mailing list: [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html