On Thu, Apr 14, 2005 at 03:16:37PM -0700, Gary W. Smith wrote: > Jason, > > Less typos this time... Just another couple questions though. Assume > that I have the 128 IP's but I don't want to route all of them but > rather most of them internally. Specifically, I don't want to route the > first 6 usable. I have concocted the nat segment below. Logically it > should work. I have taken the larger subnets and broken them down to > the largest possible block then worked my way down from there. > > Is the below now correct? > > The other question was regarding the OUTPUT rules. When I had the > manual 1:1 mapping I found that without the OUTPUT rules that there were > problems accessing an internal server from the firewall (or the server > itself) using the external address. Is this something that is fixed > with the NETMAP setting? no--you'll still need the OUTPUT rule to DNAT packets from the firewall itself. there's another thread from today about this very thing, "Problem with DNAT from localhost to LAN via loopback" > And the final question, which I have never been totally sure about is > that if we have a VPN tunnel between two networks we had problems access > the servers on the other side of network. We found that putting a > second entry in on the outgoing map that it was fixed. i.e we had the > following > > [0:0] -A POSTROUTING -s 10.20.30.96/27 -j NETMAP --to 88.44.55.96/27 > [0:0] -A POSTROUTING -s 10.20.30.96/27 -d 10.20.30.0/24 -j NETMAP --to > 88.44.55.96/27 i don't see how that second rule would ever get matched as all "-s 10.20.30.96/27" packets will be caught by the first rule... > So, in recap, is this what they new rules should look like (assuming > that IP's .3-8 belong to devices next to of the firewall rather than > behind it)? so you're trying to exclude .3 - .8 from the NETMAP? realize that 88.44.55.8/29 *includes* .8...if you're trying to break down .9 - .127 into CIDR blocks, it would be: 88.44.55.9/32 88.44.55.10/31 88.44.55.12/30 88.44.55.16/28 88.44.55.32/27 88.44.55.64/26 if you do intend to include .8 and are trying to break down .8 - .127, you can do it in one less prefix than you have: 88.44.55.8/29 88.44.55.16/28 88.44.55.32/27 88.44.55.64/26 (sorry for that tangent)... > *nat > :PREROUTING ACCEPT [0:0] > :POSTROUTING ACCEPT [0:0] > :OUTPUT ACCEPT [0:0] > # Incoming Maps > [0:0] -A PREROUTING -d 88.44.55.8/29 -j NETMAP --to 10.20.30.8/29 > [0:0] -A PREROUTING -d 88.44.55.26/28 -j NETMAP --to 10.20.30.16/28 > [0:0] -A PREROUTING -d 88.44.55.32/27 -j NETMAP --to 10.20.30.32/27 > [0:0] -A PREROUTING -d 88.44.55.64/27 -j NETMAP --to 10.20.30.64/27 > [0:0] -A PREROUTING -d 88.44.55.96/27 -j NETMAP --to 10.20.30.96/27 > # Outgoing Maps > [0:0] -A POSTROUTING -s 10.20.30.8/29 -j NETMAP --to 88.44.55.8/29 > [0:0] -A POSTROUTING -s 10.20.30.16/28 -j NETMAP --to 88.44.55.16/28 > [0:0] -A POSTROUTING -s 10.20.30.32/27 -j NETMAP --to 88.44.55.32/27 > [0:0] -A POSTROUTING -s 10.20.30.64/27 -j NETMAP --to 88.44.55.64/27 > [0:0] -A POSTROUTING -s 10.20.30.96/27 -j NETMAP --to 88.44.55.96/27 > [0:0] -A POSTROUTING -o eth0 -p ! esp -j SNAT --to-source 88.44.55.2 > # Output Maps --- NONE... > #[0:0] -A OUTPUT -d 88.44.55.8/26 -j NETMAP --to 10.20.30.8/26 > #[0:0] -A OUTPUT -d 88.44.55.16/28 -j NETMAP --to 10.20.30.16/28 > #[0:0] -A OUTPUT -d 88.44.55.32/27 -j NETMAP --to 10.20.30.32/27 > #[0:0] -A OUTPUT -d 88.44.55.64/27 -j NETMAP --to 10.20.30.64/27 > #[0:0] -A OUTPUT -d 88.44.55.96/27 -j NETMAP --to 10.20.30.96/27 like i said earlier--i think you'll still want the OUTPUT DNATs for packets from the firewall itself. -j -- "Announcer: Paw McTucket Beer. If you drink it, hot women will have sex in your backyard." --Family Guy