Hello!
I've done quite a bit of testing to try to get this to work. But, I still
am having no luck! Any help would be greatly appreciated.
As a recap, I am trying to allow a client to "Call Remote" over the Internet
by connecting to one of my secondary IP addresses. The workstation behind
the firewall is configured to "Wait for Call" from a host. I just can't
seem to figure this out!
Here's the scenario:
My ISP has assigned me a primary static IP for my Dachstein LEAF box of
206.127.76.231
I have also been assigned a range of 16 secondary IP addresses
206.127.77.48-63 / 255.255.255.240.
I have 10 workstations behind the firewall using the 192.168.10.0 network.
I can get out through the Dach box with absolutely no problems. NAT is
working great. Some of the Port Forwarding stuff is working because I have
configured the INTERN_WWW_SERVER to point to 192.168.10.100 as a test and I
can connect to that web server fine. I have opened the TCP and UDP ports
for pcAnywhere (TCP 5631 and UDP 5632) using:
EXTERN_UDP_PORT1="0/0 5632 206.127.77.48/28"
EXTERN_TCP_PORT0="0/0 5631 206.127.77.48/28"
I then set up the Internal Servers for PortFW using:
# Set Additional EXTERN_IPx Addresses
EXTERN_IP1=206.127.77.49
EXTERN_IP2=206.127.77.50
EXTERN_IP3=206.127.77.51
EXTERN_IP4=206.127.77.52
EXTERN_IP5=206.127.77.53
EXTERN_IP6=206.127.77.54
EXTERN_IP7=206.127.77.55
EXTERN_IP8=206.127.77.56
EXTERN_IP9=206.127.77.57
EXTERN_IP10=206.127.77.58
EXTERN_IP11=206.127.77.59
EXTERN_IP12=206.127.77.60
EXTERN_IP13=206.127.77.61
EXTERN_IP14=206.127.77.62
INTERN_SERVERS="tcp_${EXTERN_IP2}_5631_192.168.10.50_5631
udp_${EXTERN_IP2}_5632_192.168.10.50_5632 \
tcp_${EXTERN_IP3}_5631_192.168.10.70_5631
udp_${EXTERN_IP3}_5632_192.168.10.70_5632 \
tcp_${EXTERN_IP4}_5631_192.168.10.52_5631
udp_${EXTERN_IP4}_5632_192.168.10.52_5632 \
tcp_${EXTERN_IP5}_5631_192.168.10.53_5631
udp_${EXTERN_IP5}_5632_192.168.10.53_5632 \
tcp_${EXTERN_IP6}_5631_192.168.10.54_5631
udp_${EXTERN_IP6}_5632_192.168.10.54_5632 \
tcp_${EXTERN_IP7}_5631_192.168.10.55_5631
udp_${EXTERN_IP7}_5632_192.168.10.55_5632 \
tcp_${EXTERN_IP8}_5631_192.168.10.71_5631
udp_${EXTERN_IP8}_5632_192.168.10.71_5632"
Here is my current rule set: (I enabled logging on the PortFW entries of
the input chain to try to troubleshoot. When a user tries to connect using
pcAnywhere, I don't get a log entry, but I do get log entries when users
connect to the web server.)
Chain input (policy DENY: 0 packets, 0 bytes):
pkts bytes target prot opt tosa tosx ifname mark outsize
source destination ports
0 0 DENY icmp ----l- 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 5 -> *
0 0 DENY icmp ----l- 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 13 -> *
0 0 DENY icmp ----l- 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 14 -> *
0 0 DENY all ----l- 0xFF 0x00 eth0
0.0.0.0 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
255.255.255.255 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
127.0.0.0/8 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
224.0.0.0/4 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
10.0.0.0/8 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
172.16.0.0/12 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
192.168.0.0/16 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
0.0.0.0/8 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
128.0.0.0/16 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
191.255.0.0/16 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
192.0.0.0/24 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
223.255.255.0/24 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
240.0.0.0/4 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
192.168.10.0/24 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
206.127.76.231 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
206.127.77.48/28 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
206.127.77.50 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
206.127.77.51 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
206.127.77.52 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
206.127.77.53 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
206.127.77.54 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
206.127.77.55 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
206.127.77.56 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
206.127.77.57 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
206.127.77.58 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
206.127.77.59 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
206.127.77.60 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
206.127.77.61 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
206.127.77.62 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
206.127.77.49 0.0.0.0/0 n/a
0 0 REJECT all ----l- 0xFF 0x00 eth0
0.0.0.0/0 127.0.0.0/8 n/a
0 0 REJECT all ----l- 0xFF 0x00 eth0
0.0.0.0/0 192.168.10.0/24 n/a
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 137
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 135
6 468 REJECT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 137
0 0 REJECT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 135
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 138:139
3 696 REJECT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 138
0 0 REJECT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 137:138 -> *
0 0 REJECT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 135 -> *
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 137:139 -> *
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 135 -> *
0 0 ACCEPT tcp ----l- 0xFF 0x00 eth0
0.0.0.0/0 206.127.77.48/28 * -> 5631
0 0 ACCEPT tcp ----l- 0xFF 0x00 eth0
0.0.0.0/0 206.127.76.231 * -> 80
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 113
1122 1181K ACCEPT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 1024:65535
0 0 REJECT udp ----l- 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 161:162
0 0 ACCEPT udp ----l- 0xFF 0x00 eth0
0.0.0.0/0 206.127.76.231 * -> 53
0 0 ACCEPT udp ----l- 0xFF 0x00 eth0
0.0.0.0/0 206.127.77.48/28 * -> 5632
0 0 DENY udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 67
65 14265 ACCEPT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 1024:65535
9 632 ACCEPT icmp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> *
0 0 ACCEPT ospf ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 n/a
17 1008 DENY all ----l- 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 n/a
0 0 REJECT udp ----l- 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 * -> 161:162
0 0 REJECT udp ----l- 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 161:162 -> *
3530 297K ACCEPT all ------ 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 n/a
Chain forward (policy DENY: 0 packets, 0 bytes):
pkts bytes target prot opt tosa tosx ifname mark outsize
source destination ports
0 0 DENY icmp ----l- 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 5 -> *
0 0 MASQ tcp ------ 0xFF 0x00 *
192.168.10.50 0.0.0.0/0 5631 -> *
0 0 MASQ udp ------ 0xFF 0x00 *
192.168.10.50 0.0.0.0/0 5632 -> *
0 0 MASQ tcp ------ 0xFF 0x00 *
192.168.10.70 0.0.0.0/0 5631 -> *
0 0 MASQ udp ------ 0xFF 0x00 *
192.168.10.70 0.0.0.0/0 5632 -> *
0 0 MASQ tcp ------ 0xFF 0x00 *
192.168.10.52 0.0.0.0/0 5631 -> *
0 0 MASQ udp ------ 0xFF 0x00 *
192.168.10.52 0.0.0.0/0 5632 -> *
0 0 MASQ tcp ------ 0xFF 0x00 *
192.168.10.53 0.0.0.0/0 5631 -> *
0 0 MASQ udp ------ 0xFF 0x00 *
192.168.10.53 0.0.0.0/0 5632 -> *
0 0 MASQ tcp ------ 0xFF 0x00 *
192.168.10.54 0.0.0.0/0 5631 -> *
0 0 MASQ udp ------ 0xFF 0x00 *
192.168.10.54 0.0.0.0/0 5632 -> *
0 0 MASQ tcp ------ 0xFF 0x00 *
192.168.10.55 0.0.0.0/0 5631 -> *
0 0 MASQ udp ------ 0xFF 0x00 *
192.168.10.55 0.0.0.0/0 5632 -> *
0 0 MASQ tcp ------ 0xFF 0x00 *
192.168.10.71 0.0.0.0/0 5631 -> *
0 0 MASQ udp ------ 0xFF 0x00 *
192.168.10.71 0.0.0.0/0 5632 -> *
972 81444 MASQ all ------ 0xFF 0x00 eth0
192.168.10.0/24 0.0.0.0/0 n/a
0 0 DENY all ------ 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 n/a
Chain output (policy DENY: 0 packets, 0 bytes):
pkts bytes target prot opt tosa tosx ifname mark outsize
source destination ports
5705 2000K fairq all ------ 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
0.0.0.0 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
255.255.255.255 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
127.0.0.0/8 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
224.0.0.0/4 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
10.0.0.0/8 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
172.16.0.0/12 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
192.168.0.0/16 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
0.0.0.0/8 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
128.0.0.0/16 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
191.255.0.0/16 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
192.0.0.0/24 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
223.255.255.0/24 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
240.0.0.0/4 0.0.0.0/0 n/a
0 0 DENY all ------ 0xFF 0x00 eth0
192.168.10.0/24 0.0.0.0/0 n/a
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 137
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 135
0 0 REJECT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 137
0 0 REJECT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 135
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 138:139
0 0 REJECT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 138
0 0 REJECT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 137:138 -> *
0 0 REJECT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 135 -> *
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 137:139 -> *
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 135 -> *
5705 2000K ACCEPT all ------ 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 n/a
Here is the Port Forward Stuff from Weblet:
prot localaddr rediraddr lport rport pcnt pref
UDP 206.127.77.56 192.168.10.71 5632 5632 10 10
UDP 206.127.77.55 192.168.10.55 5632 5632 10 10
UDP 206.127.77.54 192.168.10.54 5632 5632 10 10
UDP 206.127.77.53 192.168.10.53 5632 5632 10 10
UDP 206.127.77.52 192.168.10.52 5632 5632 10 10
UDP 206.127.77.51 192.168.10.70 5632 5632 10 10
UDP 206.127.77.50 192.168.10.50 5632 5632 10 10
TCP 206.127.77.56 192.168.10.71 5631 5631 10 10
TCP 206.127.77.55 192.168.10.55 5631 5631 10 10
TCP 206.127.77.54 192.168.10.54 5631 5631 10 10
TCP 206.127.77.53 192.168.10.53 5631 5631 10 10
TCP 206.127.77.52 192.168.10.52 5631 5631 10 10
TCP 206.127.77.51 192.168.10.70 5631 5631 10 10
TCP 206.127.77.50 192.168.10.50 5631 5631 10 10
TCP 206.127.76.231 192.168.10.100 80 80 10 10
I know that the INTERN_SERVERS variable is part of the extended scripts. Is
there something I have to do to make the extended scripts work on Dach? BTW,
this is Dachstein with CD and floppy. The reason I ask is because the
standard scripts use the INTERN_WWW_SERVER and that seems to work fine.
But, since pcAnywhere is not a standard service, and because I don't want to
connect using the primary IP, I have to use the alternate variables.
Thanks very much for any help offered.
Ken
-------------------------------------------------------
This SF.net email is sponsored by:Crypto Challenge is now open!
Get cracking and register here for some mind boggling fun and
the chance of winning an Apple iPod:
http://ads.sourceforge.net/cgi-bin/redirect.pl?thaw0031en
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html