Hello all,
I am trying to understand how would I manage traffic going using the new 
4.0 changes.
I have configured a bridge in my net interface and on that bridge is my 
dmz. I have two other machines on the DMZ and one of these machines 
happens to be a asterisk server and the other a mail server.
My goal using the bridge was originally to manage the bandwidth being 
sent over the bridge and centralize my firewall configuration.  So what 
I have right now looks like this.
            net0--/
                      |----------------br-net_dmz ------lan0
            dmz0--\
                         \
                          \--------- asterisk
                            \---------- mail
So my goal was to use the dmz0 interface as my controlling interface for 
the bandwidth.
What happens with the configuration I have right now is the tcrules 
complain that dmz0 is down, that is not actually true, it just does not 
have an IP address.
Does the traffic controlling in shorewall require an address to control 
the bandwidth?
Secondly I thought that I could actually do rules between the interfaces 
over the bridge.
Basically I wanted to control  net0 to dmz0 and I thought this was 
possible but it seems that it doesn''t work.
I do get some blocking at dmz0 but I am not sure why. I seem to only be 
blocking on some things but it should be blocking on everything based on 
my config right now.
I actually have my policy setup like this
Policy
lan       all     
ACCEPT
vpn      all      
ACCEPT
dmz     net     
ACCEPT
fw        all      
ACCEPT
net      dmz     DROP    
$LOG
world  dmz     DROP    
$LOG
net      all     DROP      
$LOG
all       all     REJECT    $LOG
Interfaces
world   br-wan_dmz      detect          
bridge,routefilter,dhcp,blacklist,routeback
net       br-wan_dmz:net0                  # nothing allowed here
dmz     br-wan_dmz:dmz0                  # nothing allowed here
lan       lan0                   detect           
dhcp,blacklist,routeback
vpn      tun+                  detect          routeback
Is it possible to do what I want? Will I need to use ebtables to get what I am
looking for?
Thanks, and if any logs are needed please let me know.
-- 		    
Philip S. Hempel
Cell: 574-261-2878
Phone: 317-324-1108
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >>  http://get.splunk.com/
Philip S. Hempel wrote:> Hello all, > I am trying to understand how would I manage traffic going using the new > 4.0 changes. > >I forgot to mention I am using shorewall perl Thanks again -- Philip S. Hempel Cell: 574-261-2878 Phone: 317-324-1108 ------------------------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Still grepping through log files to find problems? Stop. Now Search log events and configuration files using AJAX and a browser. Download your FREE copy of Splunk now >> http://get.splunk.com/
Philip S. Hempel wrote:> > What happens with the configuration I have right now is the tcrules > complain that dmz0 is down, that is not actually true, it just does not > have an IP address. > Does the traffic controlling in shorewall require an address to control > the bandwidth?The attached patch should correct that problem.> > Secondly I thought that I could actually do rules between the interfaces > over the bridge. > Basically I wanted to control net0 to dmz0 and I thought this was > possible but it seems that it doesn''t work. > > I do get some blocking at dmz0 but I am not sure why. I seem to only be > blocking on some things but it should be blocking on everything based on > my config right now.There is nothing that I can do with that problem statement. It doesn''t contain enough information to let us even understand the problem, let alone solve it. What we need is: a) The output of "shorewall dump" collected as described at http://www.shorewall.net/support.htm#Guidelines. b) A *concise* statement of what you tried, what you expected to happen and what you actually observed happening.> > I actually have my policy setup like this ><folded copy of config files deleted>> > Is it possible to do what I want?Should be.> Will I need to use ebtables to get what I am looking for?I wouldn''t think so. But we''ll need a more complete problem report to solve your problem. -Tom -- Tom Eastep \ Nothing is foolproof to a sufficiently talented fool Shoreline, \ http://shorewall.net Washington USA \ teastep@shorewall.net PGP Public Key \ https://lists.shorewall.net/teastep.pgp.key ------------------------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Still grepping through log files to find problems? Stop. Now Search log events and configuration files using AJAX and a browser. Download your FREE copy of Splunk now >> http://get.splunk.com/
Tom Eastep wrote:> Philip S. Hempel wrote: > > >> What happens with the configuration I have right now is the tcrules >> complain that dmz0 is down, that is not actually true, it just does not >> have an IP address. >> Does the traffic controlling in shorewall require an address to control >> the bandwidth? >> > > The attached patch should correct that problem. > >> Secondly I thought that I could actually do rules between the interfaces >> over the bridge. >> Basically I wanted to control net0 to dmz0 and I thought this was >> possible but it seems that it doesn''t work. >> >> I do get some blocking at dmz0 but I am not sure why. I seem to only be >> blocking on some things but it should be blocking on everything based on >> my config right now. >> > > There is nothing that I can do with that problem statement. It doesn''t > contain enough information to let us even understand the problem, let alone > solve it. > > What we need is: > > a) The output of "shorewall dump" collected as described at > http://www.shorewall.net/support.htm#Guidelines. >Sorry about that got a little ahead of myself.> b) A *concise* statement of what you tried, what you expected to happen and > what you actually observed happening. > >I get these errors as well in my syslog when restarting shorewall "physdev match: using --physdev-out in the OUTPUT, FORWARD and POSTROUTING chains for non-bridged traffic is not supported anymore." OK, I just I did not expect the sip connections and others that the asterisk server initiates from behind the dmz were going to be allowed back in. I was expecting that when I started the asterisk server I would not see the connections being allowed back in from the viop provider, but they are. In fact without the rules for allowing the sip or iax ports I cannot make a connection to the server behind the dmz with any voip clients from the net. So everything is working as expected in respect to net initiated connections. And with the patch that was given to me by Tom, I actually have full control over the bandwidth from the dmz as well. This is great! Thanks for the help. -- Philip S. Hempel Cell: 574-261-2878 Phone: 317-324-1108 ------------------------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Still grepping through log files to find problems? Stop. Now Search log events and configuration files using AJAX and a browser. Download your FREE copy of Splunk now >> http://get.splunk.com/
Philip S. Hempel wrote:>> > > I get these errors as well in my syslog when restarting shorewall > > "physdev match: using --physdev-out in the OUTPUT, FORWARD and > POSTROUTING chains for non-bridged traffic is not supported anymore."That issue is addressed in Shorewall FAQ 64 (http://www.shorewall.net/FAQ.htm#faq64.> > > OK, I just I did not expect the sip connections and others that the > asterisk server initiates from behind the dmz were going to be allowed > back in. > I was expecting that when I started the asterisk server I would not see > the connections being allowed back in from the viop provider, but they are.What do you mean by "allowed back in"? Do you mean response traffic? Or do you mean related connections? The former are admitted by the fact that Shorewall configures a stateful firewall; the latter are permitted by the SIP conntrack module which Shorewall loads by default.> > In fact without the rules for allowing the sip or iax ports I cannot > make a connection to the server behind the dmz with any voip clients > from the net. > So everything is working as expected in respect to net initiated > connections. > > And with the patch that was given to me by Tom, I actually have full > control over the bandwidth from the dmz as well. This is great! > > Thanks for the help.So at this point, do you still have a problem that needs solving? It''s unclear from your post. -Tom -- Tom Eastep \ Nothing is foolproof to a sufficiently talented fool Shoreline, \ http://shorewall.net Washington USA \ teastep@shorewall.net PGP Public Key \ https://lists.shorewall.net/teastep.pgp.key ------------------------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Still grepping through log files to find problems? Stop. Now Search log events and configuration files using AJAX and a browser. Download your FREE copy of Splunk now >> http://get.splunk.com/