Setting Up The Router
The sample hardware configuration considered in this article is a computer
with two network adapters. These interfaces are assumed to be eth0 and eth1.
A D V E R T I S E M E N T
Likewise, it is assumed that the IP address given by an ISP for the Internet
connection is fixed. Dynamic IP addresses will be considered in the next
article.
There are a number of variables defined in the following script. In
particular, the external network interface variable, extif, is set to the second
Ethernet adapter, eth1. The internal network interface variable, intif, is set
to eth0. The fixed IP address for the router on the external network is in the
variable extip while the internal network address and mask are
saved in intnet.
The following script file is assumed to be saved as
/etc/rc.d/rc.firewall. It must be set up as an executable file and it
should be run when the system boots. This can be done by running the script from
/etc/rc.d/rc.local. Keeping the firewall file separate from
rc.local allows it to be run after the computer has been booted. This is
usually required when a dynamic IP address is obtained from an ISP as considered
in the next article. Here's the script file:
#!/bin/sh
# A simple example of ipchains saved as /etc/rc.d/rc.firewall
#
PATH=/sbin:/bin:/usr/sbin:/usr/bin
# Load required ip_masq modules (FTP included here)
/sbin/depmod -a
/sbin/modprobe ip_masq_ftp
# Enable IP forwarding
echo "1" > /proc/sys/net/ipv4/ip_forward
# Assign external IP variables
extip="64.66.99.123"
extif="eth1"
# Assign internal IP variables
intif="eth0"
intnet="192.168.1.0/24"
# Initialize MASQ timeout and standard chains
ipchains -M -S 7200 10 60
ipchains -F input
ipchains -P input REJECT
ipchains -F output
ipchains -P output REJECT
ipchains -F forward
ipchains -P forward DENY
# Setup input policy
# local interface, local machines, going anywhere is valid
ipchains -A input -i $intif -s $intnet -d 0.0.0.0/0 -j ACCEPT
# reject IP spoofing where external computer claims to be a local
ipchains -A input -i $extif -s $intnet -d 0.0.0.0/0 -l -j REJECT
# allow external access via external interface
ipchains -A input -i $extif -s 0.0.0.0/0 -d $extip/32 -j ACCEPT
# loopback interface is valid
ipchains -A input -i lo -s 0.0.0.0/0 -d 0.0.0.0/0 -j ACCEPT
# Setup output policy
# all outgoing traffic is allowed
ipchains -A output -i $intif -s 0.0.0.0/0 -d $intnet -j ACCEPT
# prevent traffic for local network from using external interface
ipchains -A output -i $extif -s 0.0.0.0/0 -d $intnet -l -j REJECT
# prevent traffic from local network from using external interface
ipchains -A output -i $extif -s $intnet -d 0.0.0.0/0 -l -j REJECT
# anything else can go out
ipchains -A output -i $extif -s $extip/32 -d 0.0.0.0/0 -j ACCEPT
# loopback interface is valid
ipchains -A output -i lo -s 0.0.0.0/0 -d 0.0.0.0/0 -j ACCEPT
# Setup forwarding policy
# Masquerade local net traffic to anywhere
ipchains -A forward -i $extif -s $intnet -d 0.0.0.0/0 -j MASQ
The lo interface is a local loopback found on all computers. The masquerade
support is strictly for local computers communicating with the Internet through
the router. Access from the Internet is restricted to the router. If there is a
Web server running on the router then this may be accessible from the Internet.
Check out the next section for details.
|