[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: How to route



Marco Tassinari writes:
 > 
 > 
 > Hallo,
 >  I wonder what is the best solution for security in this ascii-art
 > network:
 > 
 > 
 >            [router]
 >               |
 >            [let's call it firewall even if it's not one for the moment]
 >               |
 >               +--------------|-------------|----....----|
 >               |              |             |            |
 >            [server]         [PC]          [PC]         [PC]
 > 
 > 
 >  The toplogy is untouchable: this is a marketing request.
 >   In the empty space I put my firewall: a filter and proxy (squid)
 >   server, debian potato with kernel 2.2.19, ipchains made.
 >   It seems a good solution to me.
Hum, it seems to be good, but you should take great care this machine
would become your main headache for security purposes. Evidence is
all your connected pc are in local subnets and router is configured
to drop any local subnet paquets attempting to go out.

 >   The trouble is a preimposted NAT table in the router: the unique
 >   external IP is remapped to the internal address of the server.
Maybe you could give server's address to firewall ;-) Then you don't
have to touch router's configuration.

 >   I don't know how to say the router 'route add default gw firewall'...
You should never do that since i suppose router is your external access, default
route must be another router ... But you can tell router to redirect all stuff
for server to firewall.

 >   and my manager said: <<router is preferibly not to modify>>.
He could just change router's configuration to whatever you choose for firewall address
and remap all public traffic (filtering all you dont need) to your firewall. Then configuring
your firewall would act as you configuring the router directly, except there is another
gate beetween you and the wild wild internet. It's a good thing. Anyway, for more
security, you should try to configure your router to drop all incomming connection
on critical services running on firewall 

 > 
 >   So i thougth:
 > 
 >   First solution: to make the firewall be a bridge for incoming
 >                   connections to the server, and normal filter+proxy for
 >                   outgoing ones. It seems not so good to me.
 > 
 >   Or: to make the firewall use a 2.4.5 kernel, and use NAT iptable to
 >       redirect in some way the router --> server connection. I think (but
 >       I'm not sure) it should work. It costs a lot to me in upgrading to
 >       iptables.
They're not so different and some existing tools do convert your old rules to
the new iptables ones. You can also keep ipchains compatibility within your
2.4 kernel (i've never tested it, but i undestood was possible)

Last thing, your two solutions are nearly the same solution, making your
firewall a bridge for server's connections reflects it acts as a nat for
servers address, you can do it with ipchains / iptables.

see nat and port forwarding howtos for a complete explaination ...
 > 
 > 
 >  What do you suggest?
As a conclusion, you'll ask your manager to modify router's configuration
anyway.

 > Thanks!, Marco

Regards.

-- 
Davy Gigan
System & Network Administration
University Of Caen (France)



Reply to: