Soooo ... if Shorewall is acting as your "bridge", what does this mean?

It means that the Shorewall device has "an IP" on both networks ... AND
it's configured to act as Bridge. I would have to check my Firewall
settings to remember how I did that. My Firewall acts as my ROUTER which is
essentially a "SMART BRIDGE".

For my setup ... I built a Firewall and it's configured with a Class C that
I have subdivided into subnets. For each Subnet, my Firewall needs to "have
an IP in each network" in order to "Bridge"  data from one network to
another. I also have ports "open" for Remote access and I built a VPN using
Wireguard to allow Remote access with Encryption.

Is this good enough?  Or do you need something more explicit?

Bill



On Mon, Jan 24, 2022 at 2:42 PM William Papolis <wpapo...@gmail.com> wrote:

> When you move across a "Network" to another "Network", you need a "Bridge"
>
> Is your Firewall acting as a Bridge across those two "Networks"?
>
> I'm assuming those IP's are on your "internal" network.
>
> Bill
>
> On Mon, Jan 24, 2022 at 1:55 PM Vieri Di Paola <vieridipa...@gmail.com>
> wrote:
>
>> Hi,
>>
>> I'm puzzled as to why I cannot ping a host with IP addr.
>> 10.215.144.251 from a host with IP addr. 10.215.111.210. They are two
>> different vlans, but traffic should be allowed.
>> The tcpdump on the FW shows that the ICMP replies are ot seen from FW
>> to lan.1. I just don't know why.
>>
>> This is my rule:
>>
>> ACCEPT    lan1:10.215.111.210    lan18:10.215.144.251-10.215.144.253
>> all
>>
>> # tcpdump -n -i lan.18 host 10.215.144.251
>> dropped privs to pcap
>> tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
>> listening on lan.18, link-type EN10MB (Ethernet), snapshot length 262144
>> bytes
>> 13:38:24.465826 IP 10.215.111.210 > 10.215.144.251: ICMP echo request,
>> id 1, seq 3381, length 40
>> 13:38:24.466057 IP 10.215.144.251 > 10.215.111.210: ICMP echo reply,
>> id 1, seq 3381, length 40
>> 13:38:29.452923 IP 10.215.111.210 > 10.215.144.251: ICMP echo request,
>> id 1, seq 3382, length 40
>> 13:38:29.453124 IP 10.215.144.251 > 10.215.111.210: ICMP echo reply,
>> id 1, seq 3382, length 40
>> ^C
>> 4 packets captured
>> 4 packets received by filter
>> 0 packets dropped by kernel
>>
>> # tcpdump -n -i lan.1 host 10.215.144.251
>> dropped privs to pcap
>> tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
>> listening on lan.1, link-type EN10MB (Ethernet), snapshot length 262144
>> bytes
>> 13:38:39.453736 IP 10.215.111.210 > 10.215.144.251: ICMP echo request,
>> id 1, seq 3384, length 40
>> 13:38:44.462989 IP 10.215.111.210 > 10.215.144.251: ICMP echo request,
>> id 1, seq 3385, length 40
>> 13:38:49.453419 IP 10.215.111.210 > 10.215.144.251: ICMP echo request,
>> id 1, seq 3386, length 40
>> 13:38:54.462301 IP 10.215.111.210 > 10.215.144.251: ICMP echo request,
>> id 1, seq 3387, length 40
>> ^C
>> 4 packets captured
>> 17 packets received by filter
>> 0 packets dropped by kernel
>>
>> This is a dump taken while pinging:
>>
>>
>> https://drive.google.com/file/d/1vEuySlF4SQVMREJBztncRy2a2P2SuD2K/view?usp=sharing
>>
>> Any ideas?
>>
>> Regards,
>>
>> Vieri
>>
>>
>> _______________________________________________
>> Shorewall-users mailing list
>> Shorewall-users@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/shorewall-users
>>
>
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to