I have shorewall on a Dell power-edge 600sc. two interfaces with the typical setup for shorewall The box was built for its primary intent for Shorewall and SquidGuard functions I have recently added an D-link wireless router wih its Wan side using 10.13.173.39 (One of the internal Shorewall IP''s) its internal subnet is on 192.168.0.1/24. This was added for showroom use in a Car Dealer to allow customers at the Dealer to access the internet! I need to block access from any PC on the 192.168.0.0/24 lan from accessing a SCO box on the 10.13.173.0./24 through telnet in which the sco box ip is 10.13.173.194 and the D-link wireless is again 10.13.173.39 for its wan side IP I am thinking this rule will work or is there a better way? REJECT:ULOG loc:00:80:c8:2a:60:15 loc:10.13.173.194 tcp 23 The mac address is the D-Link wireless router Thanks,-------Mike Kernal 2.4.18-3 Redhat 7.3 Shorewall version 1.3.14 [root@linc root]# ip addr show 1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 brd 127.255.255.255 scope host lo 2: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100 link/ether 00:04:e2:1c:f5:be brd ff:ff:ff:ff:ff:ff inet 216.210.232.226/29 brd 216.210.232.231 scope global eth0 3: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100 link/ether 00:c0:9f:22:63:6c brd ff:ff:ff:ff:ff:ff inet 10.13.173.20/24 brd 10.13.173.255 scope global eth1
I should add that I can now access printers and the SCO box on the 10.13.173.0/24 They want access on the wireless Lan to one of the printers and I have not had much experiance with the D-Link firewall Mike
On Thu, 22 May 2003 11:13:32 -0700, Mike <landers@lanlinecomputers.com> wrote:> > I am thinking this rule will work or is there a better way? > REJECT:ULOG loc:00:80:c8:2a:60:15 loc:10.13.173.194 tcp > 23 > > The mac address is the D-Link wireless router >You need to specify the MAC address of the D-link using Shorewall-format. See http://www.shorewall.net/configuration_file_basics.htm#MAC -Tom -- Tom Eastep \ Shorewall - iptables made easy Shoreline, \ http://www.shorewall.net Washington USA \ teastep@shorewall.net
I have a network question. I read the requirements for mac address and shorewall. I looked at Toms wireless setup and mine seems similar. I am going in today to add a third nic card for the wireless access to the lan and use shorewalls maclist to build rules I need for access to the internal lan. My question is if you only have one internal lan no DMZ, IE: two interface setup. Will a rule work to filter like this rule if neither is a gateway? And shorewalls lan gateway is 192.168.1.1 DROP loc:192.168.1.25 loc:192.168.1.30 tcp telnet,www Thanks, Mike ----- Original Message ----- From: "Mike" <landers@lanlinecomputers.com> To: <shorewall-users@lists.shorewall.net> Sent: Thursday, May 22, 2003 11:13 AM Subject: [Shorewall-users] Local Subnet Drop or Reject ? I have shorewall on a Dell power-edge 600sc. two interfaces with the typical setup for shorewall The box was built for its primary intent for Shorewall and SquidGuard functions I have recently added an D-link wireless router wih its Wan side using 10.13.173.39 (One of the internal Shorewall IP''s) its internal subnet is on 192.168.0.1/24. This was added for showroom use in a Car Dealer to allow customers at the Dealer to access the internet! I need to block access from any PC on the 192.168.0.0/24 lan from accessing a SCO box on the 10.13.173.0./24 through telnet in which the sco box ip is 10.13.173.194 and the D-link wireless is again 10.13.173.39 for its wan side IP I am thinking this rule will work or is there a better way? REJECT:ULOG loc:00:80:c8:2a:60:15 loc:10.13.173.194 tcp 23 The mac address is the D-Link wireless router Thanks,-------Mike Kernal 2.4.18-3 Redhat 7.3 Shorewall version 1.3.14 [root@linc root]# ip addr show 1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 brd 127.255.255.255 scope host lo 2: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100 link/ether 00:04:e2:1c:f5:be brd ff:ff:ff:ff:ff:ff inet 216.210.232.226/29 brd 216.210.232.231 scope global eth0 3: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100 link/ether 00:c0:9f:22:63:6c brd ff:ff:ff:ff:ff:ff inet 10.13.173.20/24 brd 10.13.173.255 scope global eth1 _______________________________________________ Shorewall-users mailing list Post: Shorewall-users@lists.shorewall.net Subscribe/Unsubscribe: http://lists.shorewall.net/mailman/listinfo/shorewall-users Support: http://www.shorewall.net/support.htm FAQ: http://www.shorewall.net/FAQ.htm
On Fri, 23 May 2003 09:52:58 -0700, Mike <landers@lanlinecomputers.com> wrote:> I have a network question. I read the requirements for mac address and > shorewall. I looked at Toms wireless setup and mine seems similar. > I am going in today to add a third nic card for the wireless access to > the > lan and use shorewalls maclist to build rules I need for access to the > internal lan. > My question is if you only have one internal lan no DMZ, IE: two > interface setup. Will a rule work to filter like this rule if neither is > a > gateway? > And shorewalls lan gateway is 192.168.1.1 > DROP loc:192.168.1.25 loc:192.168.1.30 tcp telnet,www >Assuming that the local network is 192.168.1.0/24, traffic between .25 and .30 doesn''t go through the firewall. -Tom -- Tom Eastep \ Shorewall - iptables made easy Shoreline, \ http://www.shorewall.net Washington USA \ teastep@shorewall.net