If a packet is entering the Internet NIC src from somewhere on the Internet,
destined for the address of the DMZ nic, does the packets follow the FORWARD
chain and then the INPUT chain, or is it just the FORWARD or just the INPUT
chain.
Alex
--
/**
* @author Moth
* @param http://users.bigpond.net.au/LinuxRouter
* @return rcod...@SPAMbigpond.net.au
*/
"Moth" <rcod...@SPAMbigpond.net.au> wrote in message
news:gpwi8.2784$mp.1...@news-server.bigpond.net.au...
> PREROUTING -> FORWARD -> POSTROUTING
>
> --
> /**
> * @author Moth
> * @param http://users.bigpond.net.au/LinuxRouter
> * @return rcod...@SPAMbigpond.net.au
> */
> "Alex Samad" <asa...@bigpond.net.auNOSPAM> wrote in message
> news:Aqvi8.2598$mp.1...@news-server.bigpond.net.au...
--
/**
* @author Moth
* @param http://users.bigpond.net.au/LinuxRouter
* @return rcod...@SPAMbigpond.net.au
*/
"Alex Samad" <asa...@bigpond.net.auNOSPAM> wrote in message
news:Aqvi8.2598$mp.1...@news-server.bigpond.net.au...
Jason
So if I explicitly disallowed all access to the DMZ nic as in default rule
for the INPUT was drop, but had default policy for FORWARD as accept, I
could create a connection from the internet side.
Is this a black spot ?
Alex
"Moth" <rcod...@SPAMbigpond.net.au> wrote in message
news:gpwi8.2784$mp.1...@news-server.bigpond.net.au...
A - Internet nic
B - DMZ nic
C - local LAN nic
I have pinged from a node on the networked attached to C through to the ip
address of B.
It doesn't show on the packet count of any of the tables apart from
PREROUTING, is this the right behaviour ?
Alex
"Moth" <rcod...@SPAMbigpond.net.au> wrote in message
news:gpwi8.2784$mp.1...@news-server.bigpond.net.au...
--
/**
* @author Moth
* @param http://users.bigpond.net.au/LinuxRouter
* @return rcod...@SPAMbigpond.net.au
*/
"JASON" <iexp...@ozemail.com.au> wrote in message
news:3c8a9fbd...@news-server.bigpond.net.au...
--
/**
* @author Moth
* @param http://users.bigpond.net.au/LinuxRouter
* @return rcod...@SPAMbigpond.net.au
*/
"Alex Samad" <asa...@bigpond.net.auNOSPAM> wrote in message
news:Wvyi8.3044$mp.1...@news-server.bigpond.net.au...
A
"Moth" <rcod...@SPAMbigpond.net.au> wrote in message
news:37Hi8.4797$mp.1...@news-server.bigpond.net.au...
This is different to ipchains, and the author specifically mentions it
in the readme's, saying he has finally corrected a design 'error' in
ipchains.
So what you are seeing is correct for packets destined for your DMZ
interface IP. Packets to other DMZ hosts would appear in the forward
chain.
--
Dougal Holmes (at home)
mailto:dho...@bigpond.net.au
"Alex Samad" <asa...@bigpond.net.auNOSPAM> wrote in message
news:D0Yi8.6475$mp.2...@news-server.bigpond.net.au...
that is what I was seeing
"Dougal Holmes" <dho...@bigpond.net.au> wrote in message
news:24mj8.10139$mp.4...@news-server.bigpond.net.au...