Re: DNAT Problems

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Davis,

Are the packet counters on any of the NAT rules incrementing?  Try running:

watch -d -n 1 iptables -L -vnt nat

Then try making connections to the webserver from outside your
network.  You should see the packet counters increasing when you make
the connection.

Also, it doesn't look like you are dropping packets anywhere in your
firewall (other than those INPUT rules).  Usually, you set the
filter::INPUT and FORWARD policies to DROP and use rules in those
chains to allow traffic that meets your security requirements.  Set
policies with the command:
iptables -P INPUT DROP
iptables -P FORWARD DROP

Don't make this change yet!  Figure out the DNAT problem first.  If
the counters aren't increasing, try inserting a more generic rule
like:

iptables -t nat -A PREROUTING -d 1.1.1.25
(Notice no -j TARGET, its just a packet counting rule)
If that matches, make it more complex:
iptables -t nat -A PREROUTING -d 1.1.1.25 -p tcp --dport 25
And so on...

Good Luck!

Matt

On 4/24/06, Davis Sylvester <dsylvesteriii@xxxxxxxxx> wrote:
> Greeting All:
>
> I have what I think is a simple firewall
> configuration.  All our hosts reside on the internal
> side of our network and we punch holes to allow access
> to servers that provide internet-based content (i.e.
> Web servers, e-mail servers, and Database server).
>
> For some reason my firewall was working fine until a
> reboot and now none of the DNAT is working.  The most
> important thing is that the e-mail server is not
> receiving mail, it sends just fine.  Also no one can
> access squirrel mail, again works fine internally.
>
> Here is my configuration any help is appreciated.
> Thanks in advance IPTABLES Gurus.
>
> ------------------------------------------------------
> # Generated by iptables-save v1.3.4 on Sat Apr  8
> 02:03:03 2006
> *raw
> :PREROUTING ACCEPT [69187:15784837]
> :OUTPUT ACCEPT [46891:5730774]
> COMMIT
> # Completed on Sat Apr  8 02:03:03 2006
> # Generated by iptables-save v1.3.4 on Sat Apr  8
> 02:03:03 2006
> *nat
> :PREROUTING ACCEPT [6384:872118]
> :POSTROUTING ACCEPT [156:10133]
> :OUTPUT ACCEPT [1681:126170]
> -A PREROUTING -d 1.1.1.25 -i eth1 -p tcp -m tcp
> --sport 1024:65535 --dport 25 -j DNAT --to-destination
> 192.168.150.20
> -A PREROUTING -d 1.1.1.25 -i eth1 -p tcp -m tcp
> --sport 1024:65535 --dport 110 -j DNAT
> --to-destination 192.168.150.20
> -A PREROUTING -d 1.1.1.25 -i eth1 -p tcp -m tcp
> --sport 1024:65535 --dport 143 -j DNAT
> --to-destination 192.168.150.20
> -A PREROUTING -d 1.1.1.200 -i eth1 -p tcp -m tcp
> --sport 1024:65535 --dport 80 -j DNAT --to-destination
> 192.168.150.200
> -A POSTROUTING -o lo -j ACCEPT
> -A POSTROUTING -o eth1 -j MASQUERADE
> -A OUTPUT -o lo -j ACCEPT
> -A OUTPUT -o eth0 -j ACCEPT
> COMMIT
> # Completed on Sat Apr  8 02:03:03 2006
> # Generated by iptables-save v1.3.4 on Sat Apr  8
> 02:03:03 2006
> *mangle
> :PREROUTING ACCEPT [69187:15784837]
> :INPUT ACCEPT [48202:5793791]
> :FORWARD ACCEPT [18360:9358860]
> :OUTPUT ACCEPT [46891:5730774]
> :POSTROUTING ACCEPT [65251:15089634]
> COMMIT
> # Completed on Sat Apr  8 02:03:03 2006
> # Generated by iptables-save v1.3.4 on Sat Apr  8
> 02:03:03 2006
> *filter
> :INPUT ACCEPT [5310:385325]
> :FORWARD ACCEPT [2955:564452]
> :OUTPUT ACCEPT [43086:5176570]
> :openvpn - [0:0]
> -A INPUT -i lo -j ACCEPT
> -A INPUT -i tun+ -j ACCEPT
> -A INPUT -m state --state RELATED,ESTABLISHED -j
> ACCEPT
> -A INPUT -i eth0 -j ACCEPT
> -A INPUT -s 220.193.98.15 -j DROP
> -A INPUT -s 82.127.9.42 -j DROP
> -A INPUT -s 82.226.217.40 -j DROP
> -A INPUT -s 207.212.29.73 -j DROP
> -A INPUT -s 213.154.72.195 -j DROP
> -A INPUT -s 221.169.125.102 -j DROP
> -A INPUT -s 218.202.223.238 -j DROP
> -A INPUT -s 213.175.92.222 -j DROP
> -A INPUT -s 210.228.173.152 -j DROP
> -A INPUT -s 219.0.0.0/255.0.0.0 -j DROP
> -A INPUT -s 220.0.0.0/255.0.0.0 -j DROP
> -A INPUT -s 221.0.0.0/255.0.0.0 -j DROP
> -A INPUT -s 210.0.0.0/255.0.0.0 -j DROP
> -A INPUT -s 211.0.0.0/255.0.0.0 -j DROP
> -A INPUT -s 200.0.0.0/255.0.0.0 -j DROP
> -A INPUT -s 218.0.0.0/255.0.0.0 -j DROP
> -A FORWARD -i tun0 -j openvpn
> -A FORWARD -i eth0 -j ACCEPT
> -A FORWARD -d 192.168.150.20 -i eth1 -o eth0 -p tcp -m
> tcp --sport 1024:65535 --dport 25 -m state --state NEW
> -j ACCEPT
> -A FORWARD -d 192.168.150.20 -i eth1 -o eth0 -p tcp -m
> tcp --sport 1024:65535 --dport 110 -m state --state
> NEW -j ACCEPT
> -A FORWARD -d 192.168.150.20 -i eth1 -o eth0 -p tcp -m
> tcp --sport 1024:65535 --dport 143 -m state --state
> NEW -j ACCEPT
> -A FORWARD -i eth0 -o eth1 -m state --state
> RELATED,ESTABLISHED -j ACCEPT
> -A FORWARD -i eth1 -o eth0 -m state --state
> RELATED,ESTABLISHED -j ACCEPT
> -A FORWARD -d 192.168.150.200 -i eth1 -o eth0 -p tcp
> -m tcp --sport 1024:65535 --dport 80 -m state --state
> NEW -j ACCEPT
> -A OUTPUT -o lo -j ACCEPT
> -A OUTPUT -o eth0 -j ACCEPT
> COMMIT
>
> __________________________________________________
> Do You Yahoo!?
> Tired of spam?  Yahoo! Mail has the best spam
> protection around
> http://mail.yahoo.com
>
> __________________________________________________
> Do You Yahoo!?
> Tired of spam?  Yahoo! Mail has the best spam protection around
> http://mail.yahoo.com
>
>



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux