El 14 de febrero de 2019 1:10:43 PM GMT-05:00, Tom Eastep <teas...@shorewall.net> escribió: >On 2/12/19 6:46 AM, Rommel Rodriguez Toirac wrote: >> El 11 de febrero de 2019 2:46:47 PM GMT-05:00, Tom Eastep ><teas...@shorewall.net> escribió: >>> On 2/11/19 6:16 AM, Rommel Rodriguez Toirac wrote: >>>> I have a DMZ with several hosts providing some services such as >>> email, FTP, jabber, web and others. These services can be accessed >both >>> of all from the local network and from outside my network. >>>> >>>> Until now in the DMZ I had only one host that provided the web >>> service (with apache), but now in the host where run email service I >>> installed an application to serve webmail access (rainloop), it is >>> configured using a web server (apache); also, in other host I >installed >>> the Nextcloud+ONLYOFFICE combination as a server in the clouds and >it >>> is hosted on an Apache server to. >>>> These mean that in the DMZ are different hosts listening to ports >80 >>> and 443. >>>> Until now I had used a simple DNAT rule to forward all traffic >>> coming from outside of my network to ports 80 and 443, to the IP of >the >>> host where the web service is running in DMZ: >>>> >>>> DNAT:info net dmz:192.168.14.8 tcp 80,443 >>>> >>>> But now there are three different hosts running apache listenig on >>> port 80 and 443, so when I try to access from outside of my local >>> network or DMZ, to the host where is running Nextcloud, the webpage >>> that respond is the webpage hosted in the host running the web >service, >>> not the Nextcloud webpage. >>>> >>>> How can I prevent that this happen? I mean, when someone outside >of >>> my network try to access the webmail (rainloop) that is running in a >>> host different (different IP) than the host where run the web >services >>> the page that the user see in the browser correspond with the >rainloop >>> webpage, or maybe when try to access to Nextcloud the web page >>> correspond whit the service that try to access. >>>> >>>> This is the configuration of /etc/zones: >>>> >>>> fw firewall >>>> net ipv4 >>>> loc ipv4 >>>> dmz ipv4 >>>> >>>> >>>> /etc/interfaces >>>> >>>> net enp4s1 tcpflags,nosmurfs,routefilter,logmartians,sourceroute=0 >>>> loc enp5s0 tcpflags,nosmurfs,routefilter,logmartians >>>> dmz enp7s0 tcpflags,nosmurfs,routefilter,logmartians >>>> >>>> >>>> /etc/policy >>>> >>>> loc net ACCEPT info >>>> net all DROP info >>>> all all REJECT info >>>> >>>> >>>> The network interfaces use static IP: >>>> >>>> enp4s1: 10.10.120.254 >>>> enp7s0: 192.168.14.1 >>>> enp5s0: 192.168.41.1 >>>> >>>> >>>> The server IP address are: >>>> >>>> gtmem.gtm.onat.gob.cu - 192.168.14.3 >>>> gtmd.gtm.onat.gob.cu - 192.168.14.8 >>>> gtmnb.gtm.onat.gob.cu - 192.168.14.11 >>>> gtmoffice1.gtm.onat.gob.cu - 192.168.14.14 >>>> >>> >>> Given that you only have one external IP address and you apparently >>> want >>> to run the web servers on separate hosts, a reverse proxy is >probably >>> the best way to go. Both Apache and Ngnix can be configured as a >>> reverse >>> proxy which would run on the Shorewall system. The proxy accepts >>> incoming connections and forwards them based on the host name being >>> connected to. >>> >>> -Tom >> >> >> Hello Tom; >> >> yes, I want to run different web servers, in different hosts in the >DMZ. >> >> You propouse me to install in the Firewall a reverse proxy. In the >DMZ I have a host configured as proxy using squid, with this I provide >the Internet access to my local lan and others hosts outside of my >network. >> This is a problem or not to the solution you provide me? >> >> Thanks fo your attention. >> >> > >Reverse proxies are something different. You can accomplish a similar >thing with multiple DNAT rules per server. For gtmem.gtm.onat.gob.cu: > >DNAT net dmz:192.168.14.3:80 tcp 10080 >DNAT net dmz:192.168.14.3:443 tcp 10443 >... > >The problem with both approaches (DNAT and reverse proxy) is that >external users will have to specify a non-standard port. To access >gtmem.gtm.onat.gob.cu, the user would have to connect to: > > http://gtmem.gtm.onat.gob.cu:10080 > >or > > https://gtmem.gtm.onat.gob.cu:10443 > >-Tom
I undestand. Thank Tom for answer me. Ask to external user to change the standart port is not an option for me, sorry. And if change the port in service? I mean something like this in the DNAT approach: DNAT net dmz:192.168.14.3:10080 tcp 80 DNAT net dmz:192.168.14.3:10443 tcp 443 It work? -- Rommel Rodriguez Toirac romme...@nauta.cu _______________________________________________ Shorewall-users mailing list Shorewall-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/shorewall-users