On 2/11/19 6:16 AM, Rommel Rodriguez Toirac wrote:
>  I have a DMZ with several hosts providing some services such as email, FTP, 
> jabber, web and others. These services can be accessed both of all from the 
> local network and from outside my network. 
> 
>  Until now in the DMZ I had only one host that provided the web service (with 
> apache), but now in the host where run email service I installed an 
> application to serve webmail access (rainloop), it is configured using a web 
> server (apache); also, in other host I installed the Nextcloud+ONLYOFFICE 
> combination as a server in the clouds and it is hosted on an Apache server to.
>  These mean that in the DMZ are different hosts listening to ports 80 and 443.
>  Until now I had used a simple DNAT rule to forward all traffic coming from 
> outside of my network to ports 80 and 443, to the IP of the host where the 
> web service is running in DMZ:
> 
> DNAT:info net dmz:192.168.14.8 tcp 80,443
> 
>  But now there are three different hosts running apache listenig on port 80 
> and 443, so when I try to access from outside of my local network or DMZ, to 
> the host where is running Nextcloud, the webpage that respond is the webpage 
> hosted in the host running the web service, not the Nextcloud webpage.
> 
>  How can I prevent that this happen? I mean, when someone outside of my 
> network try to access the webmail (rainloop) that is running in a host 
> different (different IP) than the host where run the web services the page 
> that the user see in the browser correspond with the rainloop webpage, or 
> maybe when try to access to Nextcloud the web page correspond whit the 
> service that try to access.
> 
> This is the configuration of /etc/zones:
> 
> fw  firewall
> net ipv4
> loc ipv4
> dmz ipv4
> 
>  
> /etc/interfaces
> 
> net enp4s1  tcpflags,nosmurfs,routefilter,logmartians,sourceroute=0
> loc enp5s0  tcpflags,nosmurfs,routefilter,logmartians
> dmz enp7s0  tcpflags,nosmurfs,routefilter,logmartians
> 
> 
>  /etc/policy
> 
> loc net ACCEPT  info
> net all DROP    info
> all all REJECT  info
> 
> 
> The network interfaces use static IP:
> 
> enp4s1: 10.10.120.254
> enp7s0: 192.168.14.1
> enp5s0: 192.168.41.1
> 
> 
> The server IP address are:
> 
> gtmem.gtm.onat.gob.cu - 192.168.14.3
> gtmd.gtm.onat.gob.cu - 192.168.14.8
> gtmnb.gtm.onat.gob.cu - 192.168.14.11
> gtmoffice1.gtm.onat.gob.cu - 192.168.14.14
> 

Given that you only have one external IP address and you apparently want
to run the web servers on separate hosts, a reverse proxy is probably
the best way to go. Both Apache and Ngnix can be configured as a reverse
proxy which would run on the Shorewall system. The proxy accepts
incoming connections and forwards them based on the host name being
connected to.

-Tom
-- 
Tom Eastep        \   Q: What do you get when you cross a mobster with
Shoreline,         \     an international standard?
Washington, USA     \ A: Someone who makes you an offer you can't
http://shorewall.org \   understand
                      \_______________________________________________

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to