Yowza,

        I'm trying to set up a conservative INNER firewall for our public
workstations. Rules that, via NAT, will allow them to get out to the
Internet to their heart's content, but won't allow them to do much but
telnet to our catalog and pull port 80 requests from our web server WITHIN
our network
        I've initially set up the firewall with dhcpd and think I've got a
problem with the OUTPUT statement. When I issue the rules below I get:

dhcpd: send_packet: Operation not permitted

        Any hints?

Brett Charbeneau, Network Administrator         Tel: 757-259-7750
Williamsburg Regional Library                   FAX: 757-259-7798
7770 Croaker Road                               [EMAIL PROTECTED]
Williamsburg, VA 23188-7064                     http://www.wrl.org


## Change source addresses to 209.96.157.155.
iptables -t nat -A POSTROUTING -o eth0 -j SNAT --to 209.96.157.155
## Allow DHCP traffic to pass through to the eth1 network
iptables -A INPUT  -s 192.168.5.0/255.255.255.0 -d 192.168.5.0/255.255.255.0 -i eth1 
-p udp --sport 67 --dport 68 -j ACCEPT
iptables -A OUTPUT -s 192.168.5.0/255.255.255.0 -d 192.168.5.0/255.255.255.0 -o eth1 
-p udp --sport 68 --dport 67 -j ACCEPT
iptables -A INPUT -s 192.168.5.0/255.255.255.0 -d 192.168.5.0/255.255.255.0 -i eth1 -j 
ACCEPT
iptables -A OUTPUT -s 192.168.5.0/255.255.255.0 -d 192.168.5.0/255.255.255.0 -o eth0 
-j ACCEPT
## Makes passive FTP possible, but creates security hole as of 5/23/01
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
## Allow new traffic to be accepted from eth1
iptables -A INPUT -m state --state NEW -i ! eth0 -j ACCEPT
# establish policies
iptables -P INPUT DROP
iptables -P FORWARD ACCEPT
iptables -P OUTPUT DROP
# log all dropped packets on eth1
iptables -A INPUT -p all -j LOG --log-level warning --log-prefix "IPT DROP: " -i eth1





_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to