2004-02-14 19:06:39 +01:00
|
|
|
<?xml version="1.0" encoding="UTF-8"?>
|
|
|
|
<!DOCTYPE article PUBLIC "-//OASIS//DTD DocBook XML V4.2//EN"
|
|
|
|
"http://www.oasis-open.org/docbook/xml/4.2/docbookx.dtd">
|
|
|
|
<article>
|
|
|
|
<!--$Id$-->
|
|
|
|
|
|
|
|
<articleinfo>
|
|
|
|
<title>About My Network</title>
|
|
|
|
|
|
|
|
<authorgroup>
|
|
|
|
<author>
|
|
|
|
<firstname>Tom</firstname>
|
|
|
|
|
|
|
|
<surname>Eastep</surname>
|
|
|
|
</author>
|
|
|
|
</authorgroup>
|
|
|
|
|
2005-10-14 00:38:14 +02:00
|
|
|
<pubdate>2005-10-13</pubdate>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
|
|
|
<copyright>
|
2005-01-04 03:52:23 +01:00
|
|
|
<year>2001-2005</year>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
|
|
|
<holder>Thomas M. Eastep</holder>
|
|
|
|
</copyright>
|
|
|
|
|
|
|
|
<legalnotice>
|
|
|
|
<para>Permission is granted to copy, distribute and/or modify this
|
|
|
|
document under the terms of the GNU Free Documentation License, Version
|
|
|
|
1.2 or any later version published by the Free Software Foundation; with
|
|
|
|
no Invariant Sections, with no Front-Cover, and with no Back-Cover
|
|
|
|
Texts. A copy of the license is included in the section entitled
|
2004-12-21 17:55:29 +01:00
|
|
|
<quote><ulink url="GnuCopyright.htm">GNU Free Documentation
|
|
|
|
License</ulink></quote>.</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
</legalnotice>
|
|
|
|
</articleinfo>
|
|
|
|
|
|
|
|
<section>
|
|
|
|
<title>My Current Network</title>
|
|
|
|
|
|
|
|
<caution>
|
|
|
|
<para>I use a combination of One-to-one NAT and Proxy ARP, neither of
|
|
|
|
which are relevant to a simple configuration with a single public IP
|
|
|
|
address. If you have just a single public IP address, most of what you
|
2004-12-21 17:55:29 +01:00
|
|
|
see here won't apply to your setup so beware of copying parts of this
|
|
|
|
configuration and expecting them to work for you. What you copy may or
|
2004-12-23 23:28:58 +01:00
|
|
|
may not work in your environment.</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
</caution>
|
|
|
|
|
|
|
|
<caution>
|
|
|
|
<para>The configuration shown here corresponds to Shorewall version
|
2005-10-14 00:38:14 +02:00
|
|
|
3.0.0. My configuration uses features not available in earlier Shorewall
|
2005-02-06 16:58:52 +01:00
|
|
|
releases.</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
</caution>
|
|
|
|
|
|
|
|
<para>I have DSL service and have 5 static IP addresses
|
2005-03-01 21:20:26 +01:00
|
|
|
(206.124.146.176-180). My DSL <quote>modem</quote> (Westell 2200) is
|
|
|
|
connected to eth2 and has IP address 192.168.1.1 (factory default). The
|
|
|
|
modem is configured in <quote>bridge</quote> mode so PPPoE is not
|
|
|
|
involved. I have a local network connected to eth3 (subnet
|
2005-02-06 16:58:52 +01:00
|
|
|
192.168.1.0/24), a wireless network (192.168.3.0/24) connected to eth0,
|
|
|
|
and a DMZ connected to eth1 (206.124.146.176/32). Note that I configure
|
|
|
|
the same IP address on both <filename class="devicefile">eth1</filename>
|
|
|
|
and <filename class="devicefile">eth2</filename>.</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
2004-03-17 16:03:46 +01:00
|
|
|
<para>In this configuration:</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
|
|
|
<itemizedlist>
|
|
|
|
<listitem>
|
2004-09-04 22:07:48 +02:00
|
|
|
<para>I use one-to-one NAT for Ursa (my personal system that run SuSE
|
2005-10-13 19:12:56 +02:00
|
|
|
10.0) - Internal address 192.168.1.5 and external address
|
2004-09-04 22:07:48 +02:00
|
|
|
206.124.146.178.</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
2005-01-17 16:58:26 +01:00
|
|
|
<para>I use one-to-one NAT for Eastepnc6000 (My work system -- Windows
|
2005-03-01 21:20:26 +01:00
|
|
|
XP SP1). Internal address 192.168.1.6 and external address
|
2004-02-14 19:06:39 +01:00
|
|
|
206.124.146.180.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
2005-10-14 00:38:14 +02:00
|
|
|
<para>I use SNAT through 206.124.146.179 for my Wife's Windows XP
|
|
|
|
system <quote>Tarry</quote>, my <firstterm>crash and burn</firstterm>
|
|
|
|
system "Wookie", and our SuSE 10.0 laptop <quote>Tipper</quote> which
|
|
|
|
connects through the Wireless Access Point (wap) via a Wireless Bridge
|
|
|
|
(wet), and my work laptop (eastepnc6000) when it is not docked in my
|
|
|
|
office.<note>
|
2004-12-21 17:55:29 +01:00
|
|
|
<para>While the distance between the WAP and where I usually use
|
|
|
|
the laptop isn't very far (50 feet or so), using a WAC11 (CardBus
|
|
|
|
wireless card) has proved very unsatisfactory (lots of lost
|
|
|
|
connections). By replacing the WAC11 with the WET11 wireless
|
|
|
|
bridge, I have virtually eliminated these problems (Being an old
|
|
|
|
radio tinkerer (K7JPV), I was also able to eliminate the
|
|
|
|
disconnects by hanging a piece of aluminum foil on the family room
|
|
|
|
wall. Needless to say, my wife Tarry rejected that as a permanent
|
|
|
|
solution :-).</para>
|
|
|
|
</note></para>
|
2004-02-14 19:06:39 +01:00
|
|
|
</listitem>
|
|
|
|
</itemizedlist>
|
|
|
|
|
2004-03-17 16:03:46 +01:00
|
|
|
<itemizedlist>
|
2004-09-04 22:07:48 +02:00
|
|
|
<listitem>
|
2005-10-13 19:12:56 +02:00
|
|
|
<para>Squid runs on the DMZ server and is configured as a transparent
|
2004-09-04 22:07:48 +02:00
|
|
|
proxy.</para>
|
2004-03-17 16:03:46 +01:00
|
|
|
</listitem>
|
|
|
|
</itemizedlist>
|
|
|
|
|
2004-12-18 18:07:38 +01:00
|
|
|
<para>The firewall runs on a P-II/233 with Debian Sarge (testing).</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
2004-10-14 21:20:17 +02:00
|
|
|
<para>Ursa runs Samba for file sharing with the Windows systems and is
|
|
|
|
configured as a Wins server.</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
2005-02-06 16:58:52 +01:00
|
|
|
<para>The wireless network connects to the firewall's eth0 via a LinkSys
|
2004-12-21 17:55:29 +01:00
|
|
|
WAP11. In additional to using the rather weak WEP 40-bit encryption
|
|
|
|
(64-bit with the 24-bit preamble), I use <ulink
|
2004-10-14 21:20:17 +02:00
|
|
|
url="MAC_Validation.html">MAC verification</ulink> and <ulink
|
2005-02-06 18:24:23 +01:00
|
|
|
url="OPENVPN.html">OpenVPN</ulink>.</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
|
|
|
<para>The single system in the DMZ (address 206.124.146.177) runs postfix,
|
|
|
|
Courier IMAP (imaps and pop3), DNS, a Web server (Apache) and an FTP
|
2005-10-14 00:38:14 +02:00
|
|
|
server (Pure-ftpd) under Fedora Core 4. The system also runs fetchmail to
|
|
|
|
fetch our email from our old and current ISPs. That server is accessible
|
|
|
|
from the Internet through <ulink url="ProxyARP.htm">Proxy
|
|
|
|
ARP</ulink>.</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
|
|
|
<para>The firewall system itself runs a DHCP server that serves the local
|
2005-02-16 00:45:27 +01:00
|
|
|
and wireless networks.</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
|
|
|
<para>All administration and publishing is done using ssh/scp. I have a
|
2005-02-16 00:45:27 +01:00
|
|
|
desktop environment installed on the firewall but I usually don't start
|
|
|
|
it. X applications tunnel through SSH to Ursa or one of the laptops. The
|
|
|
|
server also has a desktop environment installed but it is seldom started
|
|
|
|
either. For the most part, X tunneled through SSH is used for server
|
|
|
|
administration and the server runs at run level 3 (multi-user console mode
|
|
|
|
on Fedora).</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
|
|
|
<para>I run an SNMP server on my firewall to serve <ulink
|
|
|
|
url="http://www.ee.ethz.ch/~oetiker/webtools/mrtg/">MRTG</ulink> running
|
2004-05-09 00:31:54 +02:00
|
|
|
in the DMZ.</para>
|
|
|
|
|
|
|
|
<para>The ethernet interface in the Server is configured with IP address
|
2004-12-21 17:55:29 +01:00
|
|
|
206.124.146.177, netmask 255.255.255.0. The server's default gateway is
|
|
|
|
206.124.146.254 (Router at my ISP. This is the same default gateway used
|
|
|
|
by the firewall itself). On the firewall, an entry in my
|
2004-02-14 19:06:39 +01:00
|
|
|
/etc/network/interfaces file (see below) adds a host route to
|
|
|
|
206.124.146.177 through eth1 when that interface is brought up.</para>
|
|
|
|
|
2005-02-06 16:58:52 +01:00
|
|
|
<para>The firewall is configured with OpenVPN for VPN access from our
|
|
|
|
second home in <ulink url="http://www.omakchamber.com/">Omak,
|
2005-10-14 00:38:14 +02:00
|
|
|
Washington</ulink> or when we are otherwise out of town. We run a second
|
|
|
|
instance of OpenVPN that is used to <ulink url="OPENVPN.html">bridge the
|
|
|
|
wireless laptops in the Wifi zone to the local lan</ulink>.</para>
|
2004-05-09 00:31:54 +02:00
|
|
|
|
|
|
|
<para><graphic align="center" fileref="images/network.png" /></para>
|
2004-03-17 16:03:46 +01:00
|
|
|
</section>
|
|
|
|
|
|
|
|
<section>
|
|
|
|
<title>Firewall Configuration</title>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
|
|
|
<section>
|
|
|
|
<title>Shorewall.conf</title>
|
|
|
|
|
|
|
|
<blockquote>
|
2005-09-16 23:04:25 +02:00
|
|
|
<programlisting>STARTUP_ENABLED=Yes
|
|
|
|
LOGFILE=/var/log/messages
|
|
|
|
LOGFORMAT="Shorewall:%s:%s:"
|
|
|
|
LOGTAGONLY=No
|
2004-02-14 19:06:39 +01:00
|
|
|
LOGRATE=
|
|
|
|
LOGBURST=
|
2005-09-16 23:04:25 +02:00
|
|
|
LOGALLNEW=
|
2004-02-14 19:06:39 +01:00
|
|
|
BLACKLIST_LOGLEVEL=
|
|
|
|
MACLIST_LOG_LEVEL=$LOG
|
|
|
|
TCP_FLAGS_LOG_LEVEL=$LOG
|
|
|
|
RFC1918_LOG_LEVEL=$LOG
|
2005-09-16 23:04:25 +02:00
|
|
|
SMURF_LOG_LEVEL=$LOG
|
|
|
|
LOG_MARTIANS=No
|
2004-12-18 18:07:38 +01:00
|
|
|
IPTABLES=
|
2005-10-14 00:38:14 +02:00
|
|
|
PATH=/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/bin:/usr/local/sbin
|
2004-12-18 18:07:38 +01:00
|
|
|
SHOREWALL_SHELL=/bin/dash
|
2004-09-04 22:07:48 +02:00
|
|
|
SUBSYSLOCK=
|
2004-02-14 19:06:39 +01:00
|
|
|
MODULESDIR=
|
2005-09-16 23:04:25 +02:00
|
|
|
CONFIG_PATH=/etc/shorewall:/usr/share/shorewall
|
2004-09-04 22:07:48 +02:00
|
|
|
RESTOREFILE=standard
|
2005-09-16 23:04:25 +02:00
|
|
|
IPSECFILE=zones
|
2005-10-14 00:38:14 +02:00
|
|
|
FW=
|
2004-02-14 19:06:39 +01:00
|
|
|
IP_FORWARDING=On
|
|
|
|
ADD_IP_ALIASES=Yes
|
|
|
|
ADD_SNAT_ALIASES=Yes
|
2004-10-14 21:20:17 +02:00
|
|
|
RETAIN_ALIASES=Yes
|
2005-10-14 00:38:14 +02:00
|
|
|
TC_ENABLED=Internal
|
2004-09-04 22:07:48 +02:00
|
|
|
CLEAR_TC=Yes
|
2005-10-14 00:38:14 +02:00
|
|
|
MARK_IN_FORWARD_CHAIN=Yes
|
2004-02-14 19:06:39 +01:00
|
|
|
CLAMPMSS=Yes
|
|
|
|
ROUTE_FILTER=No
|
|
|
|
DETECT_DNAT_IPADDRS=Yes
|
|
|
|
MUTEX_TIMEOUT=60
|
2005-09-16 23:04:25 +02:00
|
|
|
ADMINISABSENTMINDED=Yes
|
2004-02-14 19:06:39 +01:00
|
|
|
BLACKLISTNEWONLY=Yes
|
2005-09-16 23:04:25 +02:00
|
|
|
DELAYBLACKLISTLOAD=No
|
|
|
|
MODULE_SUFFIX=
|
2004-09-04 22:07:48 +02:00
|
|
|
DISABLE_IPV6=Yes
|
2005-10-14 00:38:14 +02:00
|
|
|
BRIDGING=Yes
|
|
|
|
DYNAMIC_ZONES=No
|
2004-09-04 22:07:48 +02:00
|
|
|
PKTTYPE=No
|
2005-09-16 23:04:25 +02:00
|
|
|
RFC1918_STRICT=Yes
|
|
|
|
MACLIST_TTL=60
|
|
|
|
SAVE_IPSETS=Yes
|
|
|
|
MAPOLDACTIONS=No
|
|
|
|
FASTACCEPT=No
|
2004-02-14 19:06:39 +01:00
|
|
|
BLACKLIST_DISPOSITION=DROP
|
2005-10-14 00:38:14 +02:00
|
|
|
MACLIST_TABLE=mangle
|
|
|
|
MACLIST_DISPOSITION=DROP
|
2004-10-14 21:20:17 +02:00
|
|
|
TCP_FLAGS_DISPOSITION=DROP</programlisting>
|
2004-02-14 19:06:39 +01:00
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
|
|
|
<section>
|
|
|
|
<title>Params File (Edited)</title>
|
|
|
|
|
|
|
|
<blockquote>
|
2005-09-16 23:04:25 +02:00
|
|
|
<para><programlisting>NTPSERVERS=<list of NTP server IP addresses>
|
|
|
|
POPSERVERS=<list of external POP3 servers accessed by fetchmail running on the DMZ server>
|
|
|
|
LOG=info
|
2005-02-06 16:58:52 +01:00
|
|
|
WIFI_IF=eth0
|
|
|
|
EXT_IF=eth2
|
2005-10-14 00:38:14 +02:00
|
|
|
INT_IF=br0
|
2005-09-16 23:04:25 +02:00
|
|
|
DMZ_IF=eth1
|
|
|
|
OMAK=<ip address of the gateway at our second home></programlisting></para>
|
2004-02-14 19:06:39 +01:00
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
|
|
|
<section>
|
|
|
|
<title>Zones File</title>
|
|
|
|
|
|
|
|
<blockquote>
|
2005-09-16 23:04:25 +02:00
|
|
|
<programlisting>#ZONE TYPE OPTTIONS IN OUT
|
|
|
|
# OPTIONS OPTIONS
|
2005-10-14 01:37:22 +02:00
|
|
|
fw firewall
|
2005-09-30 19:58:22 +02:00
|
|
|
net ipv4
|
|
|
|
dmz ipv4
|
|
|
|
loc ipv4
|
|
|
|
vpn ipv4
|
|
|
|
Wifi ipv4
|
2005-10-14 00:38:14 +02:00
|
|
|
#LAST LINE - ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE</programlisting>
|
2004-02-14 19:06:39 +01:00
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
|
|
|
<section>
|
|
|
|
<title>Interfaces File</title>
|
|
|
|
|
|
|
|
<blockquote>
|
2005-09-16 23:04:25 +02:00
|
|
|
<programlisting>#ZONE INTERFACE BROADCAST OPTIONS
|
2005-09-30 19:39:24 +02:00
|
|
|
net $EXT_IF 206.124.146.255 dhcp,norfc1918,logmartians,blacklist,tcpflags,nosmurfs
|
2005-09-16 23:04:25 +02:00
|
|
|
loc $INT_IF detect dhcp,routeback
|
2005-02-06 16:58:52 +01:00
|
|
|
dmz $DMZ_IF -
|
2005-02-06 18:24:23 +01:00
|
|
|
vpn tun+ -
|
2005-09-16 23:04:25 +02:00
|
|
|
Wifi $WIFI_IF - dhcp,maclist
|
2004-09-04 22:07:48 +02:00
|
|
|
#LAST LINE - ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE</programlisting>
|
2004-02-14 19:06:39 +01:00
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
2005-02-06 16:58:52 +01:00
|
|
|
<section>
|
2005-09-16 23:04:25 +02:00
|
|
|
<title>Routestopped File</title>
|
2005-02-19 18:53:51 +01:00
|
|
|
|
2005-09-16 23:04:25 +02:00
|
|
|
<blockquote>
|
|
|
|
<programlisting>#INTERFACE HOST(S) OPTIONS
|
|
|
|
$DMZ_IF 206.124.146.177 source
|
|
|
|
$INT_IF - source,dest
|
|
|
|
$WIFI_IF - source,dest
|
|
|
|
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE</programlisting>
|
|
|
|
</blockquote>
|
2005-02-06 16:58:52 +01:00
|
|
|
</section>
|
|
|
|
|
2004-02-14 19:06:39 +01:00
|
|
|
<section>
|
2005-09-16 23:04:25 +02:00
|
|
|
<title>Providers File</title>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
|
|
|
<blockquote>
|
2005-09-29 00:57:04 +02:00
|
|
|
<para>This entry isn't necessary but it allows me to smoke test
|
|
|
|
parsing of the providers file.</para>
|
|
|
|
|
2005-09-16 23:04:25 +02:00
|
|
|
<programlisting>#NAME NUMBER MARK DUPLICATE INTERFACE GATEWAY OPTIONS COPY
|
|
|
|
Blarg 1 1 main $EXT_IF 206.124.146.254 track,balance=1 $INT_IF,$DMZ_IF,$WIFI_IF,tun0
|
|
|
|
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
|
|
|
|
</programlisting>
|
2004-02-14 19:06:39 +01:00
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
|
|
|
<section>
|
2005-09-16 23:04:25 +02:00
|
|
|
<title>Blacklist File</title>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
|
|
|
<blockquote>
|
2005-09-29 00:57:04 +02:00
|
|
|
<para>I use <ulink url="ipsets.html">ipsets</ulink> to represent my
|
|
|
|
blacklist.</para>
|
|
|
|
|
2004-02-14 19:06:39 +01:00
|
|
|
<programlisting>#ADDRESS/SUBNET PROTOCOL PORT
|
2005-09-16 23:04:25 +02:00
|
|
|
+Blacklistports[dst]
|
|
|
|
+Blacklistnets[src,dst]
|
|
|
|
+Blacklist[src,dst]
|
2004-02-14 19:06:39 +01:00
|
|
|
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE</programlisting>
|
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
2004-07-15 00:06:35 +02:00
|
|
|
<section>
|
|
|
|
<title>RFC1918 File</title>
|
|
|
|
|
|
|
|
<blockquote>
|
|
|
|
<para>Because my DSL modem has an RFC 1918 address (192.168.1.1) and
|
|
|
|
is connected to eth0, I need to make an exception for that address in
|
|
|
|
my rfc1918 file. I copied /usr/share/shorewall/rfc1918 to
|
|
|
|
/etc/shorewall/rfc1918 and changed it as follows:</para>
|
|
|
|
|
2004-11-26 19:53:04 +01:00
|
|
|
<programlisting>#SUBNET TARGET
|
2005-09-16 23:04:25 +02:00
|
|
|
<emphasis role="bold">192.168.1.1 RETURN</emphasis>
|
2004-11-26 19:53:04 +01:00
|
|
|
172.16.0.0/12 logdrop # RFC 1918
|
|
|
|
192.168.0.0/16 logdrop # RFC 1918
|
|
|
|
10.0.0.0/8 logdrop # RFC 1918
|
2004-07-15 00:06:35 +02:00
|
|
|
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE
|
|
|
|
</programlisting>
|
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
2004-02-14 19:06:39 +01:00
|
|
|
<section>
|
|
|
|
<title>Policy File</title>
|
|
|
|
|
|
|
|
<blockquote>
|
|
|
|
<programlisting>#SOURCE DESTINATION POLICY LOG LEVEL BURST:LIMIT
|
2005-09-12 20:43:26 +02:00
|
|
|
$FW $FW ACCEPT
|
2004-09-04 22:07:48 +02:00
|
|
|
loc net ACCEPT
|
2005-02-06 18:24:23 +01:00
|
|
|
$FW vpn ACCEPT
|
|
|
|
vpn net ACCEPT
|
|
|
|
vpn loc ACCEPT
|
2005-09-16 23:04:25 +02:00
|
|
|
fw Wifi ACCEPT
|
2005-02-06 18:24:23 +01:00
|
|
|
loc vpn ACCEPT
|
2005-09-16 23:04:25 +02:00
|
|
|
$FW loc ACCEPT #Firewall to Local
|
2005-09-12 20:43:26 +02:00
|
|
|
loc $FW REJECT $LOG
|
2004-09-04 22:07:48 +02:00
|
|
|
net all DROP $LOG 10/sec:40
|
|
|
|
all all REJECT $LOG
|
2004-02-14 19:06:39 +01:00
|
|
|
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE</programlisting>
|
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
|
|
|
<section>
|
|
|
|
<title>Masq File</title>
|
|
|
|
|
|
|
|
<blockquote>
|
|
|
|
<para>Although most of our internal systems use one-to-one NAT, my
|
2005-03-08 20:31:05 +01:00
|
|
|
wife's system (192.168.1.4) uses IP Masquerading (actually SNAT) as do
|
|
|
|
our wireless network systems and visitors with laptops.</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
2004-07-15 00:06:35 +02:00
|
|
|
<para>The first entry allows access to the DSL modem and uses features
|
2004-12-21 17:55:29 +01:00
|
|
|
introduced in Shorewall 2.1.1. The leading plus sign ("+_") causes the
|
|
|
|
rule to be placed before rules generated by the /etc/shorewall/nat
|
2005-03-08 20:31:05 +01:00
|
|
|
file below. The double colons ("::") cause the entry to be exempt from
|
|
|
|
ADD_SNAT_ALIASES=Yes in my shorewall.conf file above.</para>
|
|
|
|
|
2005-09-16 23:04:25 +02:00
|
|
|
<programlisting>#INTERFACE SUBNET ADDRESS PROTO PORT
|
|
|
|
+$EXT_IF::192.168.1.1 0.0.0.0/0 192.168.1.254
|
2005-10-14 00:38:14 +02:00
|
|
|
$EXT_IF:2 192.168.0.0/22 206.124.146.179
|
2005-09-16 23:04:25 +02:00
|
|
|
$DMZ_IF:: 206.124.146.176 192.168.1.254 tcp 80
|
2004-10-14 21:20:17 +02:00
|
|
|
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE</programlisting>
|
2004-02-14 19:06:39 +01:00
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
|
|
|
<section>
|
|
|
|
<title>NAT File</title>
|
|
|
|
|
|
|
|
<blockquote>
|
2005-09-16 23:04:25 +02:00
|
|
|
<programlisting>#EXTERNAL INTERFACE INTERNAL ALL INTERFACES LOCAL
|
|
|
|
206.124.146.178 $EXT_IF:0 192.168.1.5 No No
|
|
|
|
206.124.146.180 $EXT_IF:1 192.168.1.6 No No
|
2004-02-14 19:06:39 +01:00
|
|
|
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE</programlisting>
|
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
|
|
|
<section id="ProxyARP">
|
|
|
|
<title>Proxy ARP File</title>
|
|
|
|
|
|
|
|
<blockquote>
|
2004-09-07 18:09:11 +02:00
|
|
|
<para>I configure the host route to 206.124.146.177 on <filename
|
2005-01-04 03:52:23 +01:00
|
|
|
class="devicefile">eth1</filename> in <link
|
|
|
|
linkend="debian_interfaces">/etc/network/interfaces</link>.</para>
|
2004-09-07 18:09:11 +02:00
|
|
|
|
2004-02-14 19:06:39 +01:00
|
|
|
<programlisting>#ADDRESS INTERFACE EXTERNAL HAVEROUTE PERSISTENT
|
2005-09-16 23:04:25 +02:00
|
|
|
206.124.146.177 $DMZ_IF $EXT_IF yes
|
|
|
|
192.168.1.1 $EXT_IF $INT_IF yes # Allow access to DSL modem from the local zone
|
2004-02-14 19:06:39 +01:00
|
|
|
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE</programlisting>
|
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
|
|
|
<section>
|
2005-02-19 18:53:51 +01:00
|
|
|
<title>Tunnels</title>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
|
|
|
<blockquote>
|
|
|
|
<programlisting>#TYPE ZONE GATEWAY GATEWAY ZONE PORT
|
2005-10-14 00:38:14 +02:00
|
|
|
openvpnserver:1194 net 0.0.0.0/0
|
|
|
|
openvpnserver:1194 Wifi 192.168.3.0/24
|
2004-02-14 19:06:39 +01:00
|
|
|
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE</programlisting>
|
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
|
|
|
<section id="Actions">
|
|
|
|
<title>Actions File</title>
|
|
|
|
|
|
|
|
<blockquote>
|
|
|
|
<programlisting>#ACTION
|
|
|
|
Mirrors #Accept traffic from the Shorewall Mirror sites
|
2005-09-16 23:04:25 +02:00
|
|
|
SSHKnock #Port Knocking
|
2004-02-14 19:06:39 +01:00
|
|
|
#LAST LINE - ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE</programlisting>
|
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
|
|
|
<section>
|
|
|
|
<title>action.Mirrors File</title>
|
|
|
|
|
|
|
|
<blockquote>
|
2005-09-16 23:04:25 +02:00
|
|
|
<para>The <emphasis>Mirrors</emphasis> and
|
|
|
|
<emphasis>Mirrornets</emphasis> <ulink
|
|
|
|
url="ipsets.html">ipsets</ulink> define the set of Shorewall
|
|
|
|
mirrors.</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
|
|
|
<programlisting>#TARGET SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE
|
|
|
|
# PORT PORT(S) DEST LIMIT
|
2005-09-16 23:04:25 +02:00
|
|
|
ACCEPT +Mirrors
|
|
|
|
ACCEPT +Mirrornets
|
2004-02-14 19:06:39 +01:00
|
|
|
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE</programlisting>
|
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
|
|
|
<section>
|
2004-12-21 17:55:29 +01:00
|
|
|
<title>Rules File (The shell variables are set in
|
|
|
|
/etc/shorewall/params)</title>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
|
|
|
<blockquote>
|
2005-09-16 23:04:25 +02:00
|
|
|
<programlisting>###############################################################################################################################################################################
|
|
|
|
#ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE USER/
|
|
|
|
# PORT PORT(S) DEST LIMIT GROUP
|
|
|
|
###############################################################################################################################################################################
|
|
|
|
SECTION NEW
|
2005-02-06 16:58:52 +01:00
|
|
|
REJECT:$LOG loc net tcp 25
|
2004-09-04 22:07:48 +02:00
|
|
|
REJECT:$LOG loc net udp 1025:1031
|
2004-02-14 19:06:39 +01:00
|
|
|
#
|
2004-10-14 21:20:17 +02:00
|
|
|
# Stop NETBIOS crap
|
2004-02-14 19:06:39 +01:00
|
|
|
#
|
2004-09-04 22:07:48 +02:00
|
|
|
REJECT loc net tcp 137,445
|
|
|
|
REJECT loc net udp 137:139
|
2005-10-14 00:38:14 +02:00
|
|
|
|
2004-02-14 19:06:39 +01:00
|
|
|
#
|
2005-09-16 23:04:25 +02:00
|
|
|
# Stop my idiotic work laptop from sending to the net with an HP source/dest IP address
|
2004-10-14 21:20:17 +02:00
|
|
|
#
|
|
|
|
DROP loc:!192.168.0.0/22 net
|
2005-09-16 23:04:25 +02:00
|
|
|
DROP Wifi net:15.0.0.0/8
|
|
|
|
DROP Wifi net:16.0.0.0/8
|
|
|
|
###############################################################################################################################################################################
|
|
|
|
# Local Network to Firewall
|
|
|
|
#
|
|
|
|
DROP loc:!192.168.0.0/22 fw # Silently drop traffic with an HP source IP from my XP box
|
|
|
|
ACCEPT loc fw tcp ssh,time,631,8080
|
|
|
|
ACCEPT loc fw udp 161,ntp,631
|
|
|
|
DROP loc fw tcp 3185 #SuSE Meta pppd
|
|
|
|
Ping/ACCEPT loc fw
|
|
|
|
###############################################################################################################################################################################
|
|
|
|
# Roadwarriors to Firewall
|
|
|
|
#
|
|
|
|
ACCEPT vpn fw tcp ssh,time,631,8080
|
|
|
|
ACCEPT vpn fw udp 161,ntp,631
|
|
|
|
Ping/ACCEPT vpn fw
|
|
|
|
###############################################################################################################################################################################
|
2004-02-14 19:06:39 +01:00
|
|
|
# Local Network to DMZ
|
|
|
|
#
|
2005-09-16 23:04:25 +02:00
|
|
|
DNAT- loc dmz:206.124.146.177:3128 \
|
2005-09-17 17:15:55 +02:00
|
|
|
tcp www - !206.124.146.177,192.168.1.1
|
2004-10-14 21:20:17 +02:00
|
|
|
DROP loc:!192.168.0.0/22 dmz
|
2004-09-04 22:07:48 +02:00
|
|
|
ACCEPT loc dmz udp domain,xdmcp
|
2005-09-16 23:04:25 +02:00
|
|
|
ACCEPT loc dmz tcp www,smtp,smtps,domain,ssh,imap,https,imaps,ftp,10023,pop3,3128 -
|
|
|
|
Ping/ACCEPT loc dmz
|
|
|
|
###############################################################################################################################################################################
|
2005-02-06 16:58:52 +01:00
|
|
|
# Insecure Wireless to DMZ
|
|
|
|
#
|
2005-09-16 23:04:25 +02:00
|
|
|
|
2005-02-06 16:58:52 +01:00
|
|
|
ACCEPT Wifi dmz udp domain
|
|
|
|
ACCEPT Wifi dmz tcp domain
|
2005-09-16 23:04:25 +02:00
|
|
|
###############################################################################################################################################################################
|
|
|
|
# Insecure Wireless to Internet
|
|
|
|
#
|
|
|
|
ACCEPT Wifi net udp 500
|
|
|
|
ACCEPT Wifi net udp 4500
|
|
|
|
Ping/ACCEPT Wifi net
|
|
|
|
###############################################################################################################################################################################
|
2005-02-06 16:58:52 +01:00
|
|
|
# Road Warriors to DMZ
|
|
|
|
#
|
2005-02-06 18:24:23 +01:00
|
|
|
ACCEPT vpn dmz udp domain
|
2005-09-16 23:04:25 +02:00
|
|
|
ACCEPT vpn dmz tcp www,smtp,smtps,domain,ssh,imap,https,imaps,ftp,10023,pop3 -
|
|
|
|
Ping/ACCEPT vpn dmz
|
|
|
|
###############################################################################################################################################################################
|
2004-07-15 00:06:35 +02:00
|
|
|
# Internet to ALL -- drop NewNotSyn packets
|
|
|
|
#
|
2005-09-16 23:04:25 +02:00
|
|
|
dropNotSyn net fw tcp
|
2004-09-04 22:07:48 +02:00
|
|
|
dropNotSyn net loc tcp
|
|
|
|
dropNotSyn net dmz tcp
|
2005-09-16 23:04:25 +02:00
|
|
|
###############################################################################################################################################################################
|
|
|
|
# Internet to DMZ
|
2004-09-04 22:07:48 +02:00
|
|
|
#
|
|
|
|
ACCEPT net dmz udp domain
|
2005-09-16 23:04:25 +02:00
|
|
|
ACCEPT net dmz tcp smtps,www,ftp,imaps,domain,https -
|
|
|
|
ACCEPT net dmz tcp smtp - 206.124.146.177,206.124.146.178
|
2005-02-06 16:58:52 +01:00
|
|
|
ACCEPT net dmz udp 33434:33454
|
2004-09-04 22:07:48 +02:00
|
|
|
Mirrors net dmz tcp rsync
|
2005-09-16 23:04:25 +02:00
|
|
|
ACCEPT net dmz tcp 22
|
|
|
|
Ping/ACCEPT net dmz
|
|
|
|
###############################################################################################################################################################################
|
2004-02-14 19:06:39 +01:00
|
|
|
#
|
|
|
|
# Net to Local
|
|
|
|
#
|
2005-02-19 18:53:51 +01:00
|
|
|
# When I'm "on the road", the following two rules allow me VPN access back home using PPTP.
|
2004-02-14 19:06:39 +01:00
|
|
|
#
|
2005-09-16 23:04:25 +02:00
|
|
|
DNAT net loc:192.168.1.4 tcp 1729
|
|
|
|
DNAT net loc:192.168.1.4 gre
|
|
|
|
ACCEPT net:$OMAK loc:192.168.1.5 tcp 22
|
2004-02-14 19:06:39 +01:00
|
|
|
#
|
2005-09-29 00:57:04 +02:00
|
|
|
# Auth for IRC
|
2004-02-14 19:06:39 +01:00
|
|
|
#
|
2005-09-29 00:57:04 +02:00
|
|
|
ACCEPT net loc:192.168.1.5 tcp 113
|
2004-02-14 19:06:39 +01:00
|
|
|
#
|
|
|
|
# Real Audio
|
|
|
|
#
|
2004-09-04 22:07:48 +02:00
|
|
|
ACCEPT net loc:192.168.1.5 udp 6970:7170
|
2004-02-14 19:06:39 +01:00
|
|
|
#
|
|
|
|
# Overnet
|
|
|
|
#
|
2004-09-04 22:07:48 +02:00
|
|
|
#ACCEPT net loc:192.168.1.5 tcp 4662
|
|
|
|
#ACCEPT net loc:192.168.1.5 udp 12112
|
2004-07-15 00:06:35 +02:00
|
|
|
#
|
2005-02-06 16:58:52 +01:00
|
|
|
# OpenVPN
|
|
|
|
#
|
|
|
|
ACCEPT net loc:192.168.1.5 udp 1194
|
|
|
|
#
|
2004-07-15 00:06:35 +02:00
|
|
|
# Silently Handle common probes
|
|
|
|
#
|
2004-09-04 22:07:48 +02:00
|
|
|
REJECT net loc tcp www,ftp,https
|
2005-09-16 23:04:25 +02:00
|
|
|
DROP net loc icmp 8
|
|
|
|
###############################################################################################################################################################################
|
2004-02-14 19:06:39 +01:00
|
|
|
# DMZ to Internet
|
|
|
|
#
|
2005-02-06 16:58:52 +01:00
|
|
|
ACCEPT dmz net udp domain,ntp
|
2005-09-16 23:04:25 +02:00
|
|
|
ACCEPT dmz net tcp smtp,domain,www,81,https,whois,echo,2702,21,2703,ssh,8080,cvspserver
|
2004-07-15 00:06:35 +02:00
|
|
|
REJECT:$LOG dmz net udp 1025:1031
|
2004-09-04 22:07:48 +02:00
|
|
|
ACCEPT dmz net:$POPSERVERS tcp pop3
|
2004-02-14 19:06:39 +01:00
|
|
|
#
|
|
|
|
#
|
2005-09-16 23:04:25 +02:00
|
|
|
# OpenVPN
|
|
|
|
#
|
|
|
|
ACCEPT net loc:192.168.1.5 udp 1194
|
|
|
|
#
|
|
|
|
# Silently Handle common probes
|
|
|
|
#
|
|
|
|
REJECT net loc tcp www,ftp,https
|
|
|
|
DROP net loc icmp 8
|
|
|
|
###############################################################################################################################################################################
|
2004-12-21 17:55:29 +01:00
|
|
|
# DMZ to Firewall -- ntp & snmp, Silently reject Auth
|
2004-02-14 19:06:39 +01:00
|
|
|
#
|
2005-09-16 23:04:25 +02:00
|
|
|
ACCEPT dmz fw udp ntp ntp
|
|
|
|
ACCEPT dmz fw tcp 161,ssh
|
|
|
|
ACCEPT dmz fw udp 161
|
|
|
|
REJECT dmz fw tcp auth
|
|
|
|
Ping/ACCEPT dmz fw
|
|
|
|
###############################################################################################################################################################################
|
|
|
|
# DMZ to Local Network
|
2004-02-14 19:06:39 +01:00
|
|
|
#
|
2004-09-04 22:07:48 +02:00
|
|
|
ACCEPT dmz loc tcp smtp,6001:6010
|
2005-09-29 00:57:04 +02:00
|
|
|
ACCEPT dmz:206.124.146.177 loc:192.168.1.5,192.168.1.3 \
|
|
|
|
tcp 111
|
|
|
|
ACCEPT dmz:206.124.146.177 loc:192.168.1.5,192.168.1.3 \
|
|
|
|
udp
|
2005-09-16 23:04:25 +02:00
|
|
|
Ping/ACCEPT dmz loc
|
|
|
|
###############################################################################################################################################################################
|
2004-02-14 19:06:39 +01:00
|
|
|
# Internet to Firewall
|
|
|
|
#
|
2005-09-16 23:04:25 +02:00
|
|
|
REJECT net fw tcp www,ftp,https
|
|
|
|
DROP net fw icmp 8
|
2005-09-29 00:57:04 +02:00
|
|
|
ACCEPT net fw udp 33434:33454
|
2005-09-16 23:04:25 +02:00
|
|
|
ACCEPT net:$OMAK fw udp ntp
|
|
|
|
ACCEPT net fw tcp auth
|
|
|
|
SSHKnock:info net fw tcp 22,4320,4321,4322
|
|
|
|
###############################################################################################################################################################################
|
2004-02-14 19:06:39 +01:00
|
|
|
# Firewall to Internet
|
|
|
|
#
|
2005-09-16 23:04:25 +02:00
|
|
|
ACCEPT fw net:$NTPSERVERS udp ntp ntp
|
|
|
|
#ACCEPT fw net:$POPSERVERS tcp pop3
|
|
|
|
ACCEPT fw net udp domain
|
|
|
|
ACCEPT fw net tcp domain,www,https,ssh,1723,whois,1863,ftp,2702,2703,7
|
|
|
|
ACCEPT fw net udp 33435:33535
|
|
|
|
ACCEPT fw net icmp
|
|
|
|
REJECT:$LOG fw net udp 1025:1031
|
|
|
|
DROP fw net udp ntp
|
|
|
|
Ping/ACCEPT fw net
|
|
|
|
###############################################################################################################################################################################
|
2004-02-14 19:06:39 +01:00
|
|
|
# Firewall to DMZ
|
|
|
|
#
|
2005-09-16 23:04:25 +02:00
|
|
|
ACCEPT fw dmz tcp www,ftp,ssh,smtp,993,465
|
|
|
|
ACCEPT fw dmz udp domain
|
|
|
|
REJECT fw dmz udp 137:139
|
|
|
|
Ping/ACCEPT fw dmz
|
|
|
|
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE
|
|
|
|
|
2005-09-29 00:57:04 +02:00
|
|
|
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE</programlisting>
|
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
|
|
|
<section>
|
|
|
|
<title>/etc/shorewall/tcdevices</title>
|
|
|
|
|
|
|
|
<blockquote>
|
|
|
|
<programlisting>#INTERFACE IN-BANDWITH OUT-BANDWIDTH
|
|
|
|
$EXT_IF 1.5mbit 384kbit
|
|
|
|
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE</programlisting>
|
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
|
|
|
<section>
|
|
|
|
<title>/etc/shorewall/tcclasses</title>
|
|
|
|
|
|
|
|
<blockquote>
|
2005-09-29 01:01:14 +02:00
|
|
|
<para>My traffic shaping configuration is the "WonderShaper" <ulink
|
|
|
|
url="http://www1.shorewall.net/pub/shorewall/Samples/tc4shorewall">example
|
|
|
|
from tc4shorewall</ulink>.</para>
|
2005-09-29 00:57:04 +02:00
|
|
|
|
2005-09-29 21:20:36 +02:00
|
|
|
<programlisting>#INTERFACE MARK RATE CEIL PRIORITY OPTIONS
|
2005-10-04 19:18:46 +02:00
|
|
|
$EXT_IF 10 full ful 1 tcp-ack,tos-minimize-delay
|
2005-09-29 21:20:36 +02:00
|
|
|
$EXT_IF 20 9*full/10 9*full/10 2 default
|
2005-10-04 19:18:46 +02:00
|
|
|
$EXT_IF 30 6*full/10 6*full/10 3
|
2005-09-29 00:57:04 +02:00
|
|
|
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE</programlisting>
|
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
|
|
|
<section>
|
|
|
|
<title>/etc/shorewall/tcrules</title>
|
|
|
|
|
|
|
|
<blockquote>
|
2005-09-29 21:20:36 +02:00
|
|
|
<para>I give full bandwidth to my local systems -- the server gets
|
2005-10-04 19:18:46 +02:00
|
|
|
throttled and rsync gets throttled even more.</para>
|
|
|
|
|
|
|
|
<note>
|
|
|
|
<para>The class id for tc4shorewall-generated classes is 1:<100 +
|
|
|
|
mark value>. The rules below are using the Netfilter CLASSIFY
|
|
|
|
target to classify the traffic directly without having to first mark
|
|
|
|
then classify based on the marks.</para>
|
|
|
|
</note>
|
2005-09-29 00:57:04 +02:00
|
|
|
|
|
|
|
<programlisting>#MARK SOURCE DEST PROTO PORT(S) CLIENT USER TEST
|
|
|
|
# PORT(S)
|
2005-10-04 19:18:46 +02:00
|
|
|
1:110 192.168.0.0/22 $EXT_IF
|
|
|
|
1:130 206.124.146.177 $EXT_IF tcp - 873
|
2005-02-06 18:24:23 +01:00
|
|
|
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE</programlisting>
|
2004-12-18 18:07:38 +01:00
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
2005-01-04 03:52:23 +01:00
|
|
|
<section id="debian_interfaces">
|
2004-12-18 18:07:38 +01:00
|
|
|
<title>/etc/network/interfaces</title>
|
|
|
|
|
|
|
|
<para>This file is Debian-specific and defines the configuration of the
|
|
|
|
network interfaces.</para>
|
|
|
|
|
|
|
|
<blockquote>
|
|
|
|
<programlisting># The loopback network interface
|
|
|
|
auto lo
|
|
|
|
iface lo inet loopback
|
|
|
|
|
2005-10-14 00:38:14 +02:00
|
|
|
# DMZ interface
|
2004-12-18 18:07:38 +01:00
|
|
|
auto eth1
|
|
|
|
iface eth1 inet static
|
2005-02-06 16:58:52 +01:00
|
|
|
address 206.124.146.176
|
|
|
|
netmask 255.255.255.255
|
|
|
|
broadcast 0.0.0.0
|
|
|
|
up ip route add 206.124.146.177 dev eth1
|
2004-12-18 18:07:38 +01:00
|
|
|
|
2005-10-14 00:38:14 +02:00
|
|
|
# Internet interface
|
2004-12-18 18:07:38 +01:00
|
|
|
auto eth2
|
|
|
|
iface eth2 inet static
|
2005-02-06 16:58:52 +01:00
|
|
|
address 206.124.146.176
|
|
|
|
netmask 255.255.255.0
|
|
|
|
gateway 206.124.146.254
|
|
|
|
up ip route add 192.168.1.1 dev eth2
|
|
|
|
|
2005-10-14 00:38:14 +02:00
|
|
|
# Wireless network
|
2005-02-06 18:24:23 +01:00
|
|
|
|
2005-02-06 16:58:52 +01:00
|
|
|
auto eth0
|
|
|
|
iface eth0 inet static
|
|
|
|
address 192.168.3.254
|
|
|
|
netmask 255.255.255.0
|
|
|
|
|
|
|
|
# LAN interface
|
2005-10-14 00:38:14 +02:00
|
|
|
auto br0
|
|
|
|
iface br0 inet static
|
|
|
|
address 192.168.1.254
|
|
|
|
netmask 255.255.255.0
|
|
|
|
pre-up /usr/sbin/openvpn --mktun --dev tap0
|
|
|
|
pre-up /sbin/ip link set tap0 up
|
|
|
|
pre-up /sbin/ip link set eth3 up
|
|
|
|
pre-up /usr/sbin/brctl addbr br0
|
|
|
|
pre-up /usr/sbin/brctl addif br0 eth3
|
|
|
|
pre-up /usr/sbin/brctl addif br0 tap0
|
|
|
|
up ip route add 224.0.0.0/4 dev br0
|
|
|
|
post-down /usr/sbin/brctl delif br0 eth3
|
|
|
|
post-down /usr/sbin/brctl delif br0 tap0
|
|
|
|
post-down /usr/sbin/brctl delbr br0
|
|
|
|
post-down /usr/sbin/openvpn --rmtun --dev tap0
|
|
|
|
|
|
|
|
# Unbrided LAN interface
|
2005-02-06 18:24:23 +01:00
|
|
|
|
2005-02-06 16:58:52 +01:00
|
|
|
iface eth3 inet static
|
|
|
|
address 192.168.1.254
|
2005-10-14 00:38:14 +02:00
|
|
|
netmask 255.255.255.0
|
|
|
|
up ip route add 224.0.0.0/4 dev eth3
|
2004-10-14 21:20:17 +02:00
|
|
|
|
2005-10-14 00:38:14 +02:00
|
|
|
# Second Internet interface
|
2004-10-14 21:20:17 +02:00
|
|
|
|
2005-10-14 00:38:14 +02:00
|
|
|
iface eth4 inet static
|
|
|
|
pre-up modprobe ne io=0x300 irq=10
|
|
|
|
address 206.124.146.179
|
|
|
|
netmask 255.255.255.0
|
2004-10-14 21:20:17 +02:00
|
|
|
</programlisting>
|
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
|
|
|
<section>
|
2005-10-14 00:38:14 +02:00
|
|
|
<title>/etc/openvpn/server.conf</title>
|
2004-03-17 16:03:46 +01:00
|
|
|
|
2005-10-14 00:38:14 +02:00
|
|
|
<para>Only the tunnel-mode OpenVPN configuration is described here --
|
|
|
|
the bridge is described in the <ulink url="OPENVPN.html">OpenVPN
|
|
|
|
documentation</ulink>.</para>
|
2004-03-17 16:03:46 +01:00
|
|
|
|
|
|
|
<blockquote>
|
2005-10-14 00:38:14 +02:00
|
|
|
<programlisting>dev tun
|
2004-03-17 16:03:46 +01:00
|
|
|
|
2005-10-14 00:38:14 +02:00
|
|
|
local 206.124.146.176
|
2004-10-14 21:20:17 +02:00
|
|
|
|
2005-10-14 00:38:14 +02:00
|
|
|
server 192.168.2.0 255.255.255.0
|
2004-03-17 16:03:46 +01:00
|
|
|
|
2005-10-14 00:38:14 +02:00
|
|
|
dh dh1024.pem
|
2004-03-17 16:03:46 +01:00
|
|
|
|
2005-10-14 00:38:14 +02:00
|
|
|
ca /etc/certs/cacert.pem
|
2004-10-14 21:20:17 +02:00
|
|
|
|
2005-10-14 00:38:14 +02:00
|
|
|
crl-verify /etc/certs/crl.pem
|
2004-10-14 21:20:17 +02:00
|
|
|
|
2005-10-14 00:38:14 +02:00
|
|
|
cert /etc/certs/gateway.pem
|
|
|
|
key /etc/certs/gateway_key.pem
|
2004-10-14 21:20:17 +02:00
|
|
|
|
2005-10-14 00:38:14 +02:00
|
|
|
port 1194
|
2004-10-14 21:20:17 +02:00
|
|
|
|
2005-10-14 00:38:14 +02:00
|
|
|
comp-lzo
|
2004-10-14 21:20:17 +02:00
|
|
|
|
2005-10-14 00:38:14 +02:00
|
|
|
user nobody
|
|
|
|
group nogroup
|
2004-10-14 21:20:17 +02:00
|
|
|
|
2005-10-14 00:38:14 +02:00
|
|
|
keepalive 15 45
|
|
|
|
ping-timer-rem
|
|
|
|
persist-tun
|
|
|
|
persist-key
|
2004-10-14 21:20:17 +02:00
|
|
|
|
2005-10-14 00:38:14 +02:00
|
|
|
client-config-dir /etc/openvpn/clients
|
|
|
|
ccd-exclusive
|
|
|
|
client-to-client
|
2004-10-14 21:20:17 +02:00
|
|
|
|
2005-10-14 00:38:14 +02:00
|
|
|
verb 3
|
|
|
|
</programlisting>
|
2004-03-17 16:03:46 +01:00
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
</section>
|
2004-12-20 20:52:11 +01:00
|
|
|
|
|
|
|
<section>
|
2005-10-14 00:38:14 +02:00
|
|
|
<title>Tipper Configuration while on the Road</title>
|
|
|
|
|
|
|
|
<para>This laptop is either configured on our wireless network
|
|
|
|
(192.168.3.8) or as a standalone system on the road.</para>
|
2004-12-20 20:52:11 +01:00
|
|
|
|
2005-10-14 00:38:14 +02:00
|
|
|
<para>Tipper's view of the world is shown in the following diagram:</para>
|
|
|
|
|
|
|
|
<graphic align="center" fileref="images/network2.png" valign="middle" />
|
2004-12-20 20:52:11 +01:00
|
|
|
|
|
|
|
<section>
|
|
|
|
<title>zones</title>
|
|
|
|
|
|
|
|
<blockquote>
|
|
|
|
<programlisting>#ZONE DISPLAY COMMENTS
|
|
|
|
home Home Shorewall Network
|
|
|
|
net Net Internet
|
|
|
|
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
|
|
|
|
</programlisting>
|
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
|
|
|
<section>
|
|
|
|
<title>policy</title>
|
|
|
|
|
|
|
|
<blockquote>
|
|
|
|
<programlisting>#SOURCE DEST POLICY LOG LEVEL LIMIT:BURST
|
2005-09-12 20:43:26 +02:00
|
|
|
$FW net ACCEPT
|
|
|
|
$FW home ACCEPT
|
|
|
|
home $FW ACCEPT
|
2004-12-20 20:52:11 +01:00
|
|
|
net home NONE
|
|
|
|
home net NONE
|
|
|
|
net all DROP info
|
|
|
|
# The FOLLOWING POLICY MUST BE LAST
|
|
|
|
all all REJECT info
|
|
|
|
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE</programlisting>
|
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
|
|
|
<section>
|
|
|
|
<title>interfaces</title>
|
|
|
|
|
|
|
|
<blockquote>
|
|
|
|
<programlisting>#ZONE INTERFACE BROADCAST OPTIONS
|
|
|
|
net eth0 detect dhcp,tcpflags
|
|
|
|
home tun0 -
|
|
|
|
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE</programlisting>
|
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
|
|
|
<section>
|
|
|
|
<title>rules</title>
|
|
|
|
|
|
|
|
<blockquote>
|
|
|
|
<programlisting>#ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE USER/
|
|
|
|
# PORT PORT(S) DEST LIMIT GROUP
|
2005-09-12 20:43:26 +02:00
|
|
|
ACCEPT net $FW icmp 8
|
|
|
|
ACCEPT net $FW tcp 22
|
|
|
|
ACCEPT net $FW tcp 4000:4100
|
2004-12-20 20:52:11 +01:00
|
|
|
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE</programlisting>
|
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
|
|
|
<section>
|
|
|
|
<title>/etc/openvpn/home.conf</title>
|
|
|
|
|
|
|
|
<blockquote>
|
2004-12-21 17:55:29 +01:00
|
|
|
<programlisting>dev tun
|
2005-02-10 02:34:40 +01:00
|
|
|
remote gateway.shorewall.net
|
2004-12-21 17:55:29 +01:00
|
|
|
up /etc/openvpn/home.up
|
|
|
|
|
|
|
|
tls-client
|
|
|
|
pull
|
|
|
|
|
|
|
|
ca /etc/certs/cacert.pem
|
|
|
|
|
|
|
|
cert /etc/certs/tipper.pem
|
|
|
|
key /etc/certs/tipper_key.pem
|
|
|
|
|
|
|
|
port 1194
|
|
|
|
|
|
|
|
user nobody
|
|
|
|
group nogroup
|
|
|
|
|
|
|
|
comp-lzo
|
|
|
|
|
|
|
|
ping 15
|
|
|
|
ping-restart 45
|
|
|
|
ping-timer-rem
|
|
|
|
persist-tun
|
|
|
|
persist-key
|
|
|
|
|
|
|
|
verb 3</programlisting>
|
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
|
|
|
|
<section>
|
|
|
|
<title>/etc/openvpn/home.up</title>
|
2004-12-20 20:52:11 +01:00
|
|
|
|
2004-12-21 17:55:29 +01:00
|
|
|
<blockquote>
|
|
|
|
<programlisting>#!/bin/bash
|
|
|
|
|
|
|
|
ip route add 192.168.1.0/24 via $5 #Access to Home Network
|
|
|
|
ip route add 206.124.146.177/32 via $5 #So that DNS names will resolve in my
|
2004-12-27 19:25:00 +01:00
|
|
|
#Internal Bind 9 view because the source IP will
|
2004-12-21 17:55:29 +01:00
|
|
|
#be in 192.168.2.0/24</programlisting>
|
2004-12-20 20:52:11 +01:00
|
|
|
</blockquote>
|
|
|
|
</section>
|
|
|
|
</section>
|
2004-12-21 17:55:29 +01:00
|
|
|
</article>
|