On Thu, 24 Feb 2011, Tom Eastep wrote:

>>> Would something roughly as documented here:
>>> http://www.shorewall.net/FAQ.htm#faq2 help?
>>
>> As in the subject and in my explanation (my english is poor but hope
>> unsterstandable), I read Faq 2 and related docs. I missed something?
>
> Apparently you have since it doesn't work. But until you show us what
> you have done, we can't tell you what you are missing.
>
> Things to check:
>
> a) That you have set 'routeback' on the internal firewall interface.
> b) That you have added a hairpin DNAT rule.
> c) That you have added a hairpin SNAT entry in /etc/shorewall/masq
> d) That all of the addresses in the entries are correct.

I think address are correct because it is all working fine a part the 
"routeback".

I have (actually, done some tests ...):

#/etc/shorewall/interfaces
net     vmbr0           detect    dhcp,tcpflags,logmartians,nosmurfs
dmz     vmbr8           detect    tcpflags,nosmurfs,routefilter,routeback
dmz     vmbr9           detect    tcpflags,nosmurfs,routefilter,routeback
dmz     vmbr10          detect    tcpflags,nosmurfs,routefilter,routeback
loc     vmtab+          detect    tcpflags,nosmurfs,routefilter
loc     vmbr2           detect    tcpflags,nosmurfs,routefilter
dmz     tap+    detect          tcpflags,nosmurfs,routefilter

#/etc/shorewall/masq

vmbr0                   vmbr9           1.2.3.109
vmbr0                   vmbr10          1.2.3.110
vmbr0                   vmbr8           1.2.3.108

#/etc/shorewall/policy
$FW             net             ACCEPT
loc             net             ACCEPT
loc             $FW             ACCEPT
dmz             net             ACCEPT
###dmz          $FW             ACCEPT
###dmz          dmz             ACCEPT
net             all             DROP            info
# The FOLLOWING POLICY MUST BE LAST
all             all             REJECT          info

#/etc/shorewall/rules
DNAT    net     dmz:192.168.109.9 tcp     20,21,80,443  -    1.2.3.109
DNAT    net     dmz:192.168.110.10 tcp     20,21,80,443 -    1.2.3.110 
DNAT    net     dmz:192.168.108.8 tcp     20,21,80,443  -    1.2.3.108


pinging a www.dominio.tld give me "Destination Host Unreachable"

telnet www.dominio.tld 80 result in

    telnet: connect to address 1.2.3.109: Connection refused


In messages I have:

Feb 25 20:27:15 ns213325 kernel: Shorewall:dmz2fw:REJECT:IN=vmbr9 OUT= 
PHYSIN=tap597i9d0 MAC=66:93:4b:b1:99:c4:00:50:56:0c:50:97:08:00 
SRC=192.168.109.9 DST=1.2.3.109 LEN=60 TOS=0x10 PREC=0x00 TTL=64 
ID=39058 DF PROTO=TCP SPT=60305 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Feb 25 20:27:15 ns213325 kernel: Shorewall:dmz2fw:REJECT:IN=vmbr9 OUT= 
PHYSIN=tap597i9d0 MAC=66:93:4b:b1:99:c4:00:50:56:0c:50:97:08:00 
SRC=192.168.109.9 DST=1.2.3.109 LEN=60 TOS=0x10 PREC=0x00 TTL=64 
ID=45105 DF PROTO=TCP SPT=60306 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0



-- 

Thanks,
                          Paolo

____________________________________________

   APF
   Piazza Serenissima, 20
   31033 Castelfranco V.to (TV)  -  (Italy)

   e-mail:  andre...@andretta.com
   web   :  http://www.apf.it
   Tel.  :  +39 0423  72.20.37 r.a.
   Fax   :  +39 0423  74.41.68
____________________________________________


------------------------------------------------------------------------------
Free Software Download: Index, Search & Analyze Logs and other IT data in 
Real-Time with Splunk. Collect, index and harness all the fast moving IT data 
generated by your applications, servers and devices whether physical, virtual
or in the cloud. Deliver compliance at lower cost and gain new business 
insights. http://p.sf.net/sfu/splunk-dev2dev 
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to