El 11 de febrero de 2019 2:46:47 PM GMT-05:00, Tom Eastep <teas...@shorewall.net> escribió: >On 2/11/19 6:16 AM, Rommel Rodriguez Toirac wrote: >> I have a DMZ with several hosts providing some services such as >email, FTP, jabber, web and others. These services can be accessed both >of all from the local network and from outside my network. >> >> Until now in the DMZ I had only one host that provided the web >service (with apache), but now in the host where run email service I >installed an application to serve webmail access (rainloop), it is >configured using a web server (apache); also, in other host I installed >the Nextcloud+ONLYOFFICE combination as a server in the clouds and it >is hosted on an Apache server to. >> These mean that in the DMZ are different hosts listening to ports 80 >and 443. >> Until now I had used a simple DNAT rule to forward all traffic >coming from outside of my network to ports 80 and 443, to the IP of the >host where the web service is running in DMZ: >> >> DNAT:info net dmz:192.168.14.8 tcp 80,443 >> >> But now there are three different hosts running apache listenig on >port 80 and 443, so when I try to access from outside of my local >network or DMZ, to the host where is running Nextcloud, the webpage >that respond is the webpage hosted in the host running the web service, >not the Nextcloud webpage. >> >> How can I prevent that this happen? I mean, when someone outside of >my network try to access the webmail (rainloop) that is running in a >host different (different IP) than the host where run the web services >the page that the user see in the browser correspond with the rainloop >webpage, or maybe when try to access to Nextcloud the web page >correspond whit the service that try to access. >> >> This is the configuration of /etc/zones: >> >> fw firewall >> net ipv4 >> loc ipv4 >> dmz ipv4 >> >> >> /etc/interfaces >> >> net enp4s1 tcpflags,nosmurfs,routefilter,logmartians,sourceroute=0 >> loc enp5s0 tcpflags,nosmurfs,routefilter,logmartians >> dmz enp7s0 tcpflags,nosmurfs,routefilter,logmartians >> >> >> /etc/policy >> >> loc net ACCEPT info >> net all DROP info >> all all REJECT info >> >> >> The network interfaces use static IP: >> >> enp4s1: 10.10.120.254 >> enp7s0: 192.168.14.1 >> enp5s0: 192.168.41.1 >> >> >> The server IP address are: >> >> gtmem.gtm.onat.gob.cu - 192.168.14.3 >> gtmd.gtm.onat.gob.cu - 192.168.14.8 >> gtmnb.gtm.onat.gob.cu - 192.168.14.11 >> gtmoffice1.gtm.onat.gob.cu - 192.168.14.14 >> > >Given that you only have one external IP address and you apparently >want >to run the web servers on separate hosts, a reverse proxy is probably >the best way to go. Both Apache and Ngnix can be configured as a >reverse >proxy which would run on the Shorewall system. The proxy accepts >incoming connections and forwards them based on the host name being >connected to. > >-Tom
Hello Tom; yes, I want to run different web servers, in different hosts in the DMZ. You propouse me to install in the Firewall a reverse proxy. In the DMZ I have a host configured as proxy using squid, with this I provide the Internet access to my local lan and others hosts outside of my network. This is a problem or not to the solution you provide me? Thanks fo your attention. -- Rommel Rodriguez Toirac romme...@nauta.cu _______________________________________________ Shorewall-users mailing list Shorewall-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/shorewall-users