I've recently changed all my LAN addresses from 192.168.111.0/24 to
10.1.1.0/24, for simplicity and refinement. 

One odd thing I found was that I could not assign 10.1.1.1 because it
said some MAC address already had that.  So I worked around that.

Suddenly I started getting Shorewall DROPs on my LAN members from
various _public_ IPs to ports 80, 443, and so on!  This has never
happened in 10+ years of using Shorewall.  I realized that it must be my
Frontier Communications fiber ONT that has 10.1.1.1 and it's letting
everyone and their brother into my LAN.

So now I have to change everything to something else.  But I also want
to exclude any possibility of outsiders getting in.  Studying the docs
it seems the right way is in the router:

?SECTION ALL
DROP            all   
local:10.0.0.0/8,local:172.0.0.0/8,local:192.168.0.0/16           
all     all

Am I on the right track here?

Also I have IPV6 disabled.  Frontier doesn't support it and I've made
several failed attempts to tunnel it.  Assuming I have it turned off in
shorewall.conf and in sysctl.conf net.ipv6.conf.all.disable_ipv6 = 1
net.ipv6.conf.default.disable_ipv6 = 1

... am I good there?

I can't exclude all public IPs as remote VPN clients will be coming in
from all directions.  They'll be connecting to the public IP of the
router, which then port-forwards that port to the WireGuard server
inside the LAN.


_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to