Good morning,

First, I would like to thank everyone in advance for any assistance or insight 
that can be provided with what I am trying to accomplish.  The server I am 
attempting to build is basically a bastion host server in which users can 
access to SSH out to other firewalled connections.  However, my goal is to take 
three existing stand-alone servers which all have different access restrictions 
and combine them into a single box.

I will restrict incoming access with Radius based on the IP address assigned to 
each virtual interface.

In my current configuration I have an OpenBSD machine which has a single 
interface connected to the network (bnx0) on a single /29 network directly 
connected to a Cisco switch.  I have created three bridge interfaces (bridge0, 
bridge1, and bridge2) which bind three virtual interfaces (vether0, vether1, 
and vether2) to the single physical interface.  My network connections are all 
active and working on each virtual interface, and I have OpenSSH configured to 
allow incoming connections on all IP addresses which also works.

My problem is, I am separating users based on interface IP and radius, and 
therefore need to force their outbound SSH sessions to bind to the IP address 
of the interface they came in on (or at least a different IP) so I can create 
firewall rules to restrict outbound access.  However, all outbound SSH sessions 
are sourced through the default (bnx0) interface and therefore hamper my 
ability to effectively firewall the outbound SSH requests since the user could 
be in one of three firewall groups.  I may be just thinking too hard about this 
but it seems to me there should be (and likely is) a simple way to bind the 
outgoing connection from the source address.

Any ideas, or should I just create three virtual machines and be done with it?

Again, thanks in advance for any guidance!

James

Reply via email to