Hi All,

I already sent a message to this list on this subject, but I got no 
responses at all.  I suspect I need to rephrase my question.

I have read _all_ of the documentation on firewalls in several different 
Vyatta documents.  Though useful, the documentation is skeletal at best 
on the subject of firewalls.  I have read _many_ of the list archives, 
as well.

I want to implement a simple NAT Internet firewall function, similar to 
$50 boxes purchased anywhere.  I also want to firewall internal 
(192.168.x.0/24) networks from each other.

I found that simply enabling NAT doesn't seem to block any traffic.  I 
can ping internal network hosts from the external gateway with a (temp) 
route in place pointing to the VOFR.  This surprised me as I always 
thought NAT would block (new) external traffic of itself.

OK, so I need a firewall.  Out of all the documentation, there are no 
Internet NAT firewall examples that look appropriate for this most 
common of applications.  Am I missing something?  If so, please point me 
in the right direction and I'll tuck my tail and leave quietly.

Otherwise, can someone share their NAT Internet gateway/firewall 
configuration with me?  I would be very, very thankful.

As for firewalling the internal nets from each other, I came up with 
this, but not being a firewall expert makes me doubt whether this is 
acceptable (it seems to work with rudimentary testing).  Can somebody 
tell me if this is acceptable or the wrong way to do this?

Basically, it blocks traffic to various private address ranges and 
allows everything else.  I applied this firewall to all the internal 
interfaces (in).

[EMAIL PROTECTED] show firewall
     name "lan-to-lan" {
         description: "Block Internal LAN Interaction"
         rule 10 {
             description: "Block 192.168.x.x Networks"
             action: "reject"
             source {
                 network: "192.168.0.0/16"
             }
             destination {
                 network: "192.168.0.0/16"
             }
         }
         rule 20 {
             description: "Block 172.16.x.x Networks"
             action: "reject"
             source {
                 network: "192.168.0.0/16"
             }
             destination {
                 network: "172.16.0.0/12"
             }
         }
         rule 30 {
             description: "Block 10.x.x.x Networks"
             action: "reject"
             source {
                 network: "192.168.0.0/16"
             }
             destination {
                 network: "10.0.0.0/8"
             }
         }
         rule 40 {
             description: "Allow All Traffic Not Previously Blocked"
             action: "accept"
             source {
                 network: "0.0.0.0/0"
             }
             destination {
                 network: "0.0.0.0/0"
             }
         }
     }

Thanks very much in advance for _any_ comments.

G

_______________________________________________
Vyatta-users mailing list
Vyatta-users@mailman.vyatta.com
http://mailman.vyatta.com/mailman/listinfo/vyatta-users

Reply via email to