Why is there no MASQing involved?
I'm not a 100% on those rules.  Please verify my descriptions below...

> -----Original Message-----
> From: Mikkel L. Ellertson [mailto:[EMAIL PROTECTED]]
> Sent: Monday, February 19, 2001 7:07 PM
> To: '[EMAIL PROTECTED]'
> Subject: Re: FTP Through Firewall
> 
> 
> On Mon, 19 Feb 2001, Tanner, Robby wrote:
> 
> >     I am using IPCHAINS and IPMASQ to provide internet access to our
> > LAN.  I am sure you've all seen THIS before.  The windows 
> FTP clients are
> > having a difficult time retrieving the folder listing.  I have the
> > ip_masq_ftp loaded but I am still getting the following log 
> messages:
> >
> [snip]
> >
> > My understanding so far is that the FTP server is trying to 
> create an
> > inbound connection to my LAN address which it should not be 
> requesting.
> > Clearly, the MASQing is not taking place, although it 
> should be as far as I
> > can tell.  The 204.112.*.* is my LAN address.
> >
> > How can I get FTP through my firewall?  Is the client 
> simply misconfigured?
> > I am using WS_FTP LE.
> >
> > Regards,
> > Rob
> >
> A good starting point would "modprobe ip_masq_ftp".  Then you may want
> to make sure you have firewall rules like this:
> 
> IPADDR = <internet address of your firewall>
> EXTERNAL_INTERFACE = <interface connected to the internet 
> eth0, eth1, or
> ppp0>
> UNPRIVPORTS = "1024:65535"
> 
>     # FTP client (21)
>     # ---------------
> 
>     # outgoing request
>     ipchains -A output -i $EXTERNAL_INTERFACE -p tcp  \
>              -s $IPADDR $UNPRIVPORTS \
>              --destination-port 21 -j ACCEPT
> 

Why would I include an output rule?  My default is to ACCEPT, should I
change that?


>     ipchains -A input  -i $EXTERNAL_INTERFACE -p tcp ! -y \
>              --source-port 21 \
>              -d $IPADDR $UNPRIVPORTS -j ACCEPT

I accept packets on my internet card that are not connection requests and
are coming from port 21 bound for my internet card anywhere in the range
1024:65535 (right?). 



>     # PORT mode data channel
>     ipchains -A input  -i $EXTERNAL_INTERFACE -p tcp  \
>              --source-port 20 \
>              -d $IPADDR $UNPRIVPORTS -j ACCEPT

Accept tcp packets (even connection requests?) to my internet card, from any
server:port 20 that are bound for my internet address anywhere in the port
range 1024:65535.
 
>     ipchains -A output -i $EXTERNAL_INTERFACE -p tcp ! -y \
>              -s $IPADDR $UNPRIVPORTS \
>              --destination-port 20 -j ACCEPT

Send packets out the internet card, that are not connection requests from my
internet address (1024:65535) bound for port 20.  

> Mikkel
> -- 
> 
>     Do not meddle in the affairs of dragons,
>  for you are crunchy and taste good with ketchup.
> 
> 
> 
> _______________________________________________
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list
> 



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to