-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm using 4.4.0, so that would make RFC1918_STRICT deprecated?

I'm just a little confused now on the network settings for the port that
is attached to the DSL modem, it's on eth0.

I currently have this setup in /etc/network/interfaces (I'm running
Debian 5.0 "Lenny"):

# eth0 interface facing internet
auto eth0
iface eth0 inet static
address 76.5.159.xxx (last octet masked)
netmask 255.255.255.224
gateway 76.5.159.161

The DSL modem is in bridged mode, and I can't get to it unless I add an
alias, this is how it is configured presently:

# virtual interface to DSL modem
auto eth0:0
iface eth0:0 inet static
address 192.168.2.2
netmask 255.255.255.0

For this to work correctly like you mention below, would I need to
replace the static settings for eth0? I think if I do that the modem may
not be aware of it's static IP configuration, but I could be wrong....
Or am I completely off base alltogether? :)

Thanks,
Stephen


On Tue, Dec 15, 2009 at 10:05, Tom Eastep <teas...@shorewall.net> wrote:

> Stephen Brown wrote:
> >> I didn't even add a static route. I've a similar setup (Netgear
> >> DM111P) and the only thing I've had to do is add a rule to allow the
> >> traffic to that IP address (otherwise it gets blocked by all the
> >> RFC1918 rules). The modem knows that to reach my public IP it has to
> >> send the traffic to my interface rather than out the WAN I/F - no
> >> exceptions to NAT or anything.
> >
> > How would I go about setting this up? Can you provide some sample syntax?
>
> I'm having different results on my DSL modem in bridged mode. It's IP
> address is 192.168.1.1 and here is what I did:
>
>        ip addr add 192.168.1.254/24 dev eth2
>        ip route add 192.168.1.1/32 dev eth2 src 192.168.1.254
>
> (If I wanted this to be permanent, I would add those to my distro's
> network configuration). eth2 is, of course, the firewall interface
> connected to the modem.
>
> I'm running Shorewall 4.4+ so the RFC1918 rules that Simon mentions
> don't apply. I have NULL_ROUTE_RFC1918=Yes but the above route overrides
> that setting for 192.168.1.1.
>
> I also found that I had to insert this into /etc/shorewall/masq, just to
> be able to ping the modem from the firewall:
>
>        eth2:192.168.1.1        0.0.0.0/0               192.168.1.254
>
> That was necessary because of another masq rule which was altering the
> source IP address:
>
>        eth2                    !206.124.146.0/24       206.124.146.179
>
> You may need to add additional rules to handle the specific traffic that
> you mention in your post.
>
> -Tom
> --
> Tom Eastep        \ When I die, I want to go like my Grandfather who
> Shoreline,         \ died peacefully in his sleep. Not screaming like
> Washington, USA     \ all of the passengers in his car
> http://shorewall.net \________________________________________________
>
>
>
> ------------------------------------------------------------------------------
> Return on Information:
> Google Enterprise Search pays you back
> Get the facts.
> http://p.sf.net/sfu/google-dev2dev
>
> _______________________________________________
> Shorewall-users mailing list
> Shorewall-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/shorewall-users
>
>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Darwin)

iEYEARECAAYFAksnrF0ACgkQ3sJXNEncx7ghhACfdXJ7vPy9pmzsJ/1Bfo59FDMF
ukIAoO9XhgHdDHUqhVLxkLiR9UOs26MW
=0o0b
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
Return on Information:
Google Enterprise Search pays you back
Get the facts.
http://p.sf.net/sfu/google-dev2dev
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to