THANKS FOR ALL YOUR COMMENTS, i try all the answers you gave me and then see which one is best for me and post again if anything comes up. Thanks Rodrigo > -----Mensaje original----- > De: netfilter-admin@xxxxxxxxxxxxxxxxxxx > [mailto:netfilter-admin@xxxxxxxxxxxxxxxxxxx]En nombre de Antony Stone > Enviado el: Lunes, 19 de Abril de 2004 09:26 a.m. > Para: netfilter@xxxxxxxxxxxxxxxxxxx > Asunto: Re: IP Alias with iptables > > > On Monday 19 April 2004 5:07 pm, Rodrigo Haces wrote: > > > > > I have only one network adapter in my Server, but i need to have 2 > > > > different networks, 192.168.1.0 to the MAC addresses i know and > > > > 192.168.0.0 to the MAC addresses i don't know > > > > > > This sounds strange - what is your network layout, giving rise to > > > machines with "MAC addresses you don't know", which need you > to be on a > > > different subnet? > > > > Ok, this is what i want, i have a Restaurant, and have an administrative > > network (192.168.1.0) and i am giving wireless access to my > clients, but i > > cant let them get into my administrative network, so i set them > > 192.168.0.0. > > I would *really* recommend that you have two physically separate > subnets for > this. Otherwise there is nothing to stop someone using a > wireless sniffer > to see all the traffic on your administrative network. > > > > > i have managed this by makin mi eth0 to > > > > 192.168.1.1 and an alias eth0:0 to 192.168.0.1, everythings > ok, but i'm > > > > also sharing internet, but when i start the rule to the > eth0:0 it sends > > > > me an error. Is there a way to use IP Aliasing with iptables? > > > > > > Yes - just remember that there's only one physical interface, and > > > it's called eth0. Don't try to use :0 or :1 in your netfilter rules. > > > You can always use -s or -d to specify source & destination > IP addresses > > > if you want the rule/s to apply only to certain packets. > > > > ok, this are my rules, where and how do i use the -d and -s?? > > > > echo " FWD: Allow all connections OUT and only existing and > related ones > > IN" > > iptables -A FORWARD -i ppp0 -o eth0 -m state --state > ESTABLISHED,RELATED -j > > ACCEPT > > iptables -A FORWARD -i eth0 -o ppp0 -j ACCEPT > > echo " Enabling SNAT (MASQUERADE) functionality on ppp0" > > iptables -t nat -A POSTROUTING -o ppp0 -j MASQUERADE > > I can't answer your question properly because you haven't said > what you want > to allow and what you want to block (based on address, because > you can't base > it on interface name), however if for example you wanted to allow > Internet > access from network 192.168.0.0/24 and not allow it from > 192.168.1.0/24, then > you could use -s and -d like this: > > iptables -A POSTROUTING -o ppp0 -s 192.168.0.0/24 -j MASQUERADE > iptables -A FORWARD -i eth0 -o ppp0 -s 192.168.0.0/24 -j ACCEPT > iptables -A FORWARD -i ppp0 -o eth0 -d 192.168.0.0/24 -m state --state > ESTABLISHED,RELATED -j ACCEPT > > I'm sure this gives you the idea of what I mean - simply adjust > depending on > which network range you want to do what. > > > > > if not, is there a way to create an eth0 and eth1 witn the same > > > > adapter? > > > > > > No. It's a simple (and cheap) job to add another ethernet > card, though. > > > > No PCI slots available... :( > > I suggest another firewall then - trying to set up a firewall > with only one > ethernet interface is a poor enough solution (from a security > point of view) > in the first place, but if there is wireless access involved as > well then I > would not even consider it. > > Regards, > > Antony. > > -- > "There has always been an underlying argument that we should open up our > source code more broadly. The fact is that we are learning from > open source > and we are opening our code more broadly through Shared Source. > > Is there value to providing source code? The answer is unequivocally yes." > > - Jason Matusow, head of Microsoft's Shared Source Program, in > response to > recent leaks of Windows source code on the Internet. > > Please reply > to the list; > please > don't CC me. >