Please keep replies on-list (use reply-all).

Tibbs, Richard wrote:

Charles, first, I had not even set up an ipsec connection -- I was testing the port forwarding first, and it did not want to work.... So below is the output, but without any ipsec connections made.
The net ipfilter list command also complained:
Could not open /proc/net/ip_masq/portfw
Could not open /proc/net/ip_portfw
Check if you have enabled portforwarding.
So that may be the issue. Heretofore, I have only had to use network.conf to get port forwarding going. Is there another step or another config file?

The above errors indicate you haven't loaded the port-forwarding kernel modules, which will prevent pretty much any port-forwarding from working.


Edit /etc/modules appropriately, and I suspect you'll have a lot more luck. You'll want one or more of the following uncommented (for basic port-forwarding, ip_masq_portfw should be enough):
ip_masq_autofw
ip_masq_mfw
ip_masq_portfw


You can verify which modules are loded with the 'lsmod' command.

--
Charles Steinkuehler
[EMAIL PROTECTED]

Thanks in advance,
Rick
Here is the output you asked for:
ip addr gave me:
1: lo: <LOOPBACK,UP> mtu 3924 qdisc noqueue


link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00

inet 127.0.0.1/8 brd 127.255.255.255 scope global lo

2: ipsec0: <NOARP,UP> mtu 16260 qdisc pfifo_fast qlen 10

link/ether 00:02:e3:13:02:78 brd ff:ff:ff:ff:ff:ff

inet 216.12.22.89/26 brd 216.12.22.127 scope global ipsec0

3: ipsec1: <NOARP> mtu 0 qdisc noop qlen 10

link/ipip

4: ipsec2: <NOARP> mtu 0 qdisc noop qlen 10

link/ipip

5: ipsec3: <NOARP> mtu 0 qdisc noop qlen 10

link/ipip

6: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100

link/ether 00:02:e3:13:02:78 brd ff:ff:ff:ff:ff:ff

inet 216.12.22.89/26 brd 216.12.22.127 scope global eth0

7: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100

link/ether 00:02:e3:12:7d:94 brd ff:ff:ff:ff:ff:ff

inet 192.168.1.254/24 brd 192.168.1.255 scope global eth1

Chain input (policy DENY: 0 packets, 0 bytes):

pkts bytes target prot opt tosa tosx ifname mark outsize source destination ports

0 0 DENY icmp ----l- 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 5 -> *

0 0 DENY icmp ----l- 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 13 -> *

0 0 DENY icmp ----l- 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 14 -> *

0 0 DENY all ----l- 0xFF 0x00 eth0 0.0.0.0 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 255.255.255.255 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 127.0.0.0/8 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 224.0.0.0/4 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 10.0.0.0/8 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 172.16.0.0/12 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 192.168.0.0/16 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 0.0.0.0/8 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 128.0.0.0/16 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 191.255.0.0/16 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 192.0.0.0/24 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 223.255.255.0/24 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 240.0.0.0/4 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 192.168.1.0/24 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 216.12.22.89 0.0.0.0/0 n/a

0 0 REJECT all ----l- 0xFF 0x00 eth0 0.0.0.0/0 127.0.0.0/8 n/a

0 0 REJECT all ----l- 0xFF 0x00 eth0 0.0.0.0/0 192.168.1.0/24 n/a

0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 137

0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 135

0 0 REJECT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 137

0 0 REJECT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 135

0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 138:139

0 0 REJECT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 138

0 0 REJECT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 137:138 -> *

0 0 REJECT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 135 -> *

0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 137:139 -> *

0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 135 -> *

0 0 ACCEPT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 216.12.22.89 * -> 53

0 0 ACCEPT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 216.12.22.89 * -> 80

3 144 ACCEPT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 216.12.22.89 * -> 25

0 0 ACCEPT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 216.12.22.89 * -> 143

0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 113

135 118K ACCEPT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 1024:65535

0 0 REJECT udp ----l- 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 161:162

0 0 ACCEPT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 68

72 4977 ACCEPT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 216.12.22.89 * -> 53

0 0 ACCEPT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 500

0 0 DENY udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 67

5 1508 ACCEPT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 1024:65535

0 0 ACCEPT icmp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> *

0 0 ACCEPT ospf ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 n/a

0 0 ACCEPT 50 ------ 0xFF 0x00 eth0 0.0.0.0/0 216.12.22.89 n/a

0 0 ACCEPT 51 ------ 0xFF 0x00 eth0 0.0.0.0/0 216.12.22.89 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 n/a

0 0 REJECT udp ----l- 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 * -> 161:162

0 0 REJECT udp ----l- 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 161:162 -> *

136 26899 ACCEPT all ------ 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 n/a

Chain forward (policy DENY: 0 packets, 0 bytes):

pkts bytes target prot opt tosa tosx ifname mark outsize source destination ports

0 0 DENY icmp ----l- 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 5 -> *

0 0 MASQ tcp ------ 0xFF 0x00 * 192.168.1.2 0.0.0.0/0 53 -> *

0 0 MASQ udp ------ 0xFF 0x00 * 192.168.1.2 0.0.0.0/0 53 -> *

0 0 MASQ tcp ------ 0xFF 0x00 * 192.168.1.2 0.0.0.0/0 80 -> *

0 0 MASQ tcp ------ 0xFF 0x00 * 192.168.1.2 0.0.0.0/0 25 -> *

0 0 MASQ tcp ------ 0xFF 0x00 * 192.168.1.2 0.0.0.0/0 143 -> *

134 26604 MASQ all ------ 0xFF 0x00 eth0 192.168.1.0/24 0.0.0.0/0 n/a

0 0 DENY all ------ 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 n/a

Chain output (policy DENY: 0 packets, 0 bytes):

pkts bytes target prot opt tosa tosx ifname mark outsize source destination ports

278 145K fairq all ------ 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 0.0.0.0 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 255.255.255.255 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 127.0.0.0/8 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 224.0.0.0/4 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 10.0.0.0/8 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 172.16.0.0/12 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 192.168.0.0/16 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 0.0.0.0/8 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 128.0.0.0/16 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 191.255.0.0/16 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 192.0.0.0/24 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 223.255.255.0/24 0.0.0.0/0 n/a

0 0 DENY all ----l- 0xFF 0x00 eth0 240.0.0.0/4 0.0.0.0/0 n/a

0 0 DENY all ------ 0xFF 0x00 eth0 192.168.1.0/24 0.0.0.0/0 n/a

0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 137

0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 135

0 0 REJECT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 137

0 0 REJECT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 135

0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 138:139

0 0 REJECT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 138

0 0 REJECT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 137:138 -> *

0 0 REJECT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 135 -> *

0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 137:139 -> *

0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 135 -> *

278 145K ACCEPT all ------ 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 n/a

Chain fairq (1 references):

pkts bytes target prot opt tosa tosx ifname mark outsize source destination ports

0 0 RETURN ospf ------ 0xFF 0x00 * 0x1 0.0.0.0/0 0.0.0.0/0 n/a

0 0 RETURN ospf ------ 0xFF 0x00 * 0x1 0.0.0.0/0 0.0.0.0/0 n/a

0 0 RETURN udp ------ 0xFF 0x00 * 0x1 0.0.0.0/0 0.0.0.0/0 * -> 520

0 0 RETURN udp ------ 0xFF 0x00 * 0x1 0.0.0.0/0 0.0.0.0/0 520 -> *

0 0 RETURN tcp ------ 0xFF 0x00 * 0x1 0.0.0.0/0 0.0.0.0/0 * -> 179

0 0 RETURN tcp ------ 0xFF 0x00 * 0x1 0.0.0.0/0 0.0.0.0/0 179 -> *

0 0 RETURN tcp ------ 0xFF 0x00 * 0x1 0.0.0.0/0 0.0.0.0/0 * -> 53

0 0 RETURN tcp ------ 0xFF 0x00 * 0x1 0.0.0.0/0 0.0.0.0/0 53 -> *

5 320 RETURN udp ------ 0xFF 0x00 * 0x1 0.0.0.0/0 0.0.0.0/0 * -> 53

1 82 RETURN udp ------ 0xFF 0x00 * 0x1 0.0.0.0/0 0.0.0.0/0 53 -> *

0 0 RETURN tcp ------ 0xFF 0x00 * 0x2 0.0.0.0/0 0.0.0.0/0 * -> 23

0 0 RETURN tcp ------ 0xFF 0x00 * 0x2 0.0.0.0/0 0.0.0.0/0 23 -> *

0 0 RETURN tcp ------ 0xFF 0x00 * 0x2 0.0.0.0/0 0.0.0.0/0 * -> 22

0 0 RETURN tcp ------ 0xFF 0x00 * 0x2 0.0.0.0/0 0.0.0.0/0 22 -> *

AutoFW:

Type Prot Low High Vis Hid Where Last CPto CPrt Timer Flags

MarkFW:

fwmark rediraddr rport pcnt pref

PortFW:



ip route yielded:

216.12.22.64/26 dev eth0 proto kernel scope link src 216.12.22.89

216.12.22.64/26 dev ipsec0 proto kernel scope link src 216.12.22.89

192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.254

default via 216.12.22.65 dev eth0



-----Original Message----- From: Charles Steinkuehler [mailto:[EMAIL PROTECTED] Sent: Tue 1/20/2004 9:41 PM To: Tibbs, Richard Cc: [EMAIL PROTECTED] Subject: Re: [leaf-user] Port fw won't work in Dachstein-Ipsec image



        Dr. Richard W. Tibbs wrote:
        > Dear list:
        > Want to host a VPN through my Dachstein firewall,
        > as well as port-forward web, IMAP and SMTP to an interal server.
        > I made a boot floppy of Lynn Avants' Dachstein IPsec image, and configured 
the port forwarding in network.conf.
        > But, although web access from internal machines works fine, the outside 
world cannot get to my
        > mail, IMAP and www servers.
        > Is there an additional step or command required for this with Dach-ipsec?
        > My older (non-ipsec) dach boot disk port-fw just fine (back running on it 
now -- but no VPN).
        >
        > A "diff" of the two network.conf files is below.
        > Could the IP_SPOOF stuff be a problem?
        > I have not modified those lines from the default network.conf that came with 
the respective images.
        
        IP_SPOOF shouldn't be causing your problems.  IPSec can do some funny
        things with routing, depending on how you've got it setup, which is
        about the only thing I can think of that might be causing your problems.
        
        Please provide the output of the following commands, *WITH* any IPSec
        connections up and running:
        
           net ipfilter list
           ip addr
           ip route
        
        --
        Charles Steinkuehler
        [EMAIL PROTECTED]
        
        





-------------------------------------------------------
The SF.Net email is sponsored by EclipseCon 2004
Premiere Conference on Open Tools Development and Integration
See the breadth of Eclipse activity. February 3-5 in Anaheim, CA.
http://www.eclipsecon.org/osdn
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to