On 8/5/20 9:30 AM, colony.three--- via Shorewall-users wrote:
> Thank you Tom, but actually there is a DNS ACCEPT rule.
> 
> I didn't make this clear enough but I am trying to dnat from net to local, 
> for example incoming port 51554 to local 10.2.20.51:554 .  Here are my rules:
> 
> # Cameras
> ACCEPT          net:10.2.1.4    $FW             tcp     50554   -
> DNAT            net     local:10.2.20.50:554    tcp     50554   -
> ACCEPT          net             $FW             tcp     51554   -
> DNAT            net     local:10.2.20.51:554    tcp     51554   -
> ACCEPT          net:10.2.1.4    $FW             udp     50554   -
> DNAT            net     local:10.2.20.50:554    udp     50554   -
> ACCEPT          net:10.2.1.4    $FW             udp     51554   -
> DNAT            net     local:10.2.20.51:554    udp     51554   -
> ACCEPT          net:10.2.1.4    $FW             tcp     50443   -
> DNAT            net     local:10.2.20.50:443    tcp     50443   -
> ACCEPT          local           $FW             udp     domain,ntp      -
> 
> ACCEPT          net             $FW             tcp     51443   -
> DNAT            net     local:10.2.20.51:443    tcp     51443   -
> 
> ACCEPT          net             $FW             tcp     5180    -
> DNAT            net     local:10.2.20.51:80     tcp     5180    -
> 

The dump looks nothing like that. There is only 1 DNAT rule and no DNS
ACCEPT from local->fw.

Chain local-fw (1 references)
 pkts bytes target     prot opt in     out     source
destination
  808 67518 dynamic    all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID,NEW,UNTRACKED
  808 67518 smurfs     all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID,NEW,UNTRACKED
    0     0 tcpflags   tcp  --  *      *       0.0.0.0/0
0.0.0.0/0
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate RELATED,ESTABLISHED
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:2222
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0            icmptype 8 /* Ping */
  106 18444 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0            ADDRTYPE match dst-type BROADCAST
    0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0            ADDRTYPE match dst-type ANYCAST
    0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0            ADDRTYPE match dst-type MULTICAST
  702 49074 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0            limit: up to 1/sec burst 10 mode srcip LOG flags 10
level 6 prefix "local-fw REJECT "
  702 49074 reject     all  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]

NAT Table

Chain PREROUTING (policy ACCEPT 1038 packets, 79062 bytes)
 pkts bytes target     prot opt in     out     source
destination
    0     0 DNAT       tcp  --  eth0   *       0.0.0.0/0
0.0.0.0/0            tcp dpt:5180 to:10.2.20.51:80

Chain INPUT (...


> 
> As a test I also tried incoming 5180 to local 10.2.20.51:80 but that doesn't 
> work in a browser.  tcpdump shows traffic on both interfaces but a browser 
> can't get a connexion. Here's what happens:
> 
> # tcpdump 'tcp port 5180' -i eth0
> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
> listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
> 19:13:30.083040 IP andromeda2.darkmtter.org.38466 > 10.2.1.106.5180: Flags 
> [S], seq 4088927536, win 29200, options [mss 1460,nop,wscale 7], length 0
> 19:13:30.083860 IP 10.2.1.106.5180 > andromeda2.darkmtter.org.38466: Flags 
> [S.], seq 2964644306, ack 4088927537, win 14600, options [mss 1460,nop,wscale 
> 4], length 0
> 19:13:30.084728 IP andromeda2.darkmtter.org.38466 > 10.2.1.106.5180: Flags 
> [.], ack 1, win 229, length 0
> 19:13:30.085209 IP andromeda2.darkmtter.org.38466 > 10.2.1.106.5180: Flags 
> [P.], seq 1:316, ack 1, win 229, length 315
> 19:13:30.085840 IP 10.2.1.106.5180 > andromeda2.darkmtter.org.38466: Flags 
> [.], ack 316, win 980, length 0
> 19:13:30.087748 IP 10.2.1.106.5180 > andromeda2.darkmtter.org.38466: Flags 
> [P.], seq 1:286, ack 316, win 980, length 285
> 19:13:30.088661 IP andromeda2.darkmtter.org.38466 > 10.2.1.106.5180: Flags 
> [.], ack 286, win 237, length 0
> 19:13:30.089035 IP andromeda2.darkmtter.org.38466 > 10.2.1.106.5180: Flags 
> [F.], seq 316, ack 286, win 237, length 0
> 19:13:30.123597 IP 10.2.1.106.5180 > andromeda2.darkmtter.org.38466: Flags 
> [.], ack 317, win 980, length 0
> 19:13:30.942376 IP 10.2.1.106.5180 > andromeda2.darkmtter.org.38466: Flags 
> [F.], seq 286, ack 317, win 980, length 0
> 19:13:30.944365 IP andromeda2.darkmtter.org.38466 > 10.2.1.106.5180: Flags 
> [.], ack 287, win 237, length 0
> ^C
> 11 packets captured
> 11 packets received by filter
> 0 packets dropped by kernel
> 
> # tcpdump 'tcp port 80' -i eth1
> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
> listening on eth1, link-type EN10MB (Ethernet), capture size 262144 bytes
> 19:13:59.521650 IP andromeda2.darkmtter.org.38474 > 10.2.20.51.http: Flags 
> [S], seq 3884695726, win 29200, options [mss 1460,nop,wscale 7], length 0
> 19:13:59.522504 IP 10.2.20.51.http > andromeda2.darkmtter.org.38474: Flags 
> [S.], seq 3405756270, ack 3884695727, win 14600, options [mss 1460,nop,wscale 
> 4], length 0
> 19:13:59.523379 IP andromeda2.darkmtter.org.38474 > 10.2.20.51.http: Flags 
> [.], ack 1, win 229, length 0
> 19:13:59.523848 IP andromeda2.darkmtter.org.38474 > 10.2.20.51.http: Flags 
> [P.], seq 1:316, ack 1, win 229, length 315: HTTP: GET / HTTP/1.1
> 19:13:59.524422 IP 10.2.20.51.http > andromeda2.darkmtter.org.38474: Flags 
> [.], ack 316, win 980, length 0
> 19:13:59.527942 IP 10.2.20.51.http > andromeda2.darkmtter.org.38474: Flags 
> [P.], seq 1:286, ack 316, win 980, length 285: HTTP: HTTP/1.1 302 Moved 
> Temporarily
> 19:13:59.529091 IP andromeda2.darkmtter.org.38474 > 10.2.20.51.http: Flags 
> [.], ack 286, win 237, length 0
> 19:13:59.529487 IP andromeda2.darkmtter.org.38474 > 10.2.20.51.http: Flags 
> [F.], seq 316, ack 286, win 237, length 0
> 19:13:59.565954 IP 10.2.20.51.http > andromeda2.darkmtter.org.38474: Flags 
> [.], ack 317, win 980, length 0
> 19:13:59.651925 IP 10.2.20.51.http > andromeda2.darkmtter.org.38474: Flags 
> [F.], seq 286, ack 317, win 980, length 0
> 19:13:59.652996 IP andromeda2.darkmtter.org.38474 > 10.2.20.51.http: Flags 
> [.], ack 287, win 237, length 0
> ^C
> 11 packets captured
> 11 packets received by filter
> 0 packets dropped by kernel
> #
> 

The TCP connection is being made! So this doesn't look like a firewall
issue. Note the error 302 being returned by the web server.

-Tom
-- 
Tom Eastep        \ Q: What do you get when you cross a mobster
Shoreline,         \    with an international standard?
Washington, USA     \ A: Someone who makes you an offer you
http://shorewall.org \    can't understand
                      \________________________________________

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to