Dimitri Yioulos wrote:
On Thursday September 21 2006 4:25 pm, you wrote:
Greetings,
Dimitri Yioulos wrote:
Noob, question:
I want to allow a vendor to access a piece of equipment on our
LAN (192.168.100.46) through port 4000 from outside via a server
in our DMZ (www.xxx.yyy.zzz). While I should know how to do
this, I'm not 100% sure. Can someone help?
DNAT.
for example:
iptables -t nat -A PREROUTING -d www.xxx.yyy.zzz -i eth1 -p tcp
--dport 4000 -j
DNAT --to 192.168.100.46
eth1 being the DMZ iface?
No, your Internet interface.
This rule says: if destination is www.xxx.yyy.zzz and it comes in
through eth1 and it's tcp and it's on port 4000, then DNAT to the
internal server. Obviously, if the packet comes from the vendor, it must
come from the Internet, so the interface in -i must be your Internet
interface.
You could leave this out, but that opens up all kind of nastiness if you
access this port on www.xxx.yyy.zzz from your DMZ (the return packets
will go straight to your client in the DMZ, will not go through your
firwall so will not be de-DNATted. Your client will get confused as it
gets packets from somewhere it's not expecting them. In short, it will
not work). You could replace that -i with "! -i $DMZ_IF", meaning if it
comes in from any interface but the DMZ interface. Then you can access
it from any interface (read your internal interface) other than your DMZ
interface.
HTH,
M4