natd not port forwarding after ip change freebsd 4.8

Posted on 2004-09-07
Medium Priority
Last Modified: 2013-12-23
This whole configuration of a DSL firewall/router using freebsd 4.8 was built based on way too many tutorials.
The port forwarding worked correctly when the tun adapter only had 1 ip address.  Since my provider dynamically allocates my ip address to my site, a new one was given to me.  With the new ip address (second in the adapter information) i am unable to get any port forwarding to work correctly. Internet access does work from the private hosts behind the firewall.  I think they are working correctly because of the dynamic flag in the natd.conf but i'm not too sure.  When connecting to my site on ports 80 and 22 from remote sites, i just get my firewall machine instead of the proper hosts behind my firewall.  This all works fine when the tun adapter only has one ip address.

Another funny note is that when using pppnat instead of natd.  Port forwarding working perfectly no matter how many ip address's are listed in the tun adapter.  I switched to natd for ppptp forwarding support.  I'm having a hard time finding documentation on pptp forwarding with pppnat.

i have exhausted myself looking for similiar problems on the internet.  I really hope this is a misconfiguration because i really enjoy using pptp from work and etc.

        set timeout 0
        set device PPPoE:xl0
        enable lqr
        set mru 1492
        set mtu 1492
        set speed sync
        set dial
        set login
        set timeout 0
        set authname *******
        set authkey  *******
        set ifaddr
        add 0 0 HISADDR
        set redial 0 0
        enable dns
natd_flags="-f /etc/natd.conf"

#####ipfw rules (ipfw.rules)########
add divert natd all from any to any via tun0
add allow 47 from to any in recv fxp0
add allow 47 from any to in recv tun0
add allow tcp from any to 1723 in recv tun0
add allow tcp from any to 80 in recv tun0
add allow tcp from any to 22 in recv tun0
add allow tcp from any to 21 in recv tun0
add allow ip from any to any

interface tun0
use_sockets yes
same_ports yes
dynamic yes
redirect_proto gre
redirect_port tcp 1723
redirect_port tcp 80
redirect_port tcp 21
redirect_port tcp 22
redirect_port tcp 23

####ifconfig output for tun0 adapter####
        inet 65.95.X.X --> 65.95.X.X netmask 0xffffff00
        inet 65.95.X.X --> 65.95.X.X netmask 0xffffff00
        Opened by PID 50
Question by:thetherington
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 4
LVL 62

Expert Comment

ID: 11999890
Yes - ipfw uses first address of interface somehow.
Same with ipf, so I use ipfmeta ( /usr/ports/security/ipfmeta ) to generate ruleset for either.
pf in OpenBSD has much better logic to handle such situations, lets hope this feature will come along with import of pf in 5.3 release and hope 5.3 will be production release at least...

Author Comment

ID: 12000440
gheist, thanks!
to clarify, i can use ipfmeta with ipfw?  Can provide like a few line examples of the ipf.metarules file that uses ipfw? the example
only demonstrates from what it looks like to me is ip filter.

LVL 62

Expert Comment

ID: 12000748
Your link is right, same app.
It does not care about content of input much, it simply looks via input stream, and multiplies lines, whenever object string is found.

given object file ( call it ipfw.objs )


Metarules for ipfw ( call it ipf.metarules )

add allow tcp from any to TUN0 port PUBLICPORTS via tun0

ipfmeta ipfw.objs < ipfw.metarules

will simply expand to 4 respective rules

add allow tcp from any to 65.95.X.X port 80 via tun0
add allow tcp from any to 65.95.Y.Y port 80 via tun0
add allow tcp from any to 65.95.X.X port 443 via tun0
add allow tcp from any to 65.95.Y.Y port 443 via tun0

btw tracking tcp states adds more to security than simply filtering on port numbers
Get MongoDB database support online, now!

At Percona’s web store you can order your MongoDB database support needs in minutes. No hassles, no fuss, just pick and click. Pay online with a credit card. Handle your MongoDB database support now!

LVL 62

Expert Comment

ID: 12000764
As you can see objects file can be reused to make up many config files where such hosts need to be listed like resolv.conf etc, some acls for login services etc.
And you can put it all in some kind of Makefile to make adjusting all access lists on system at once very easy

Author Comment

ID: 12005172
gheist, this sounds pretty good.  I guess that i would have to create a script to update the TUN0 object with all the ip address's for the tun interface and cron  (ipfmeta ipfw.objs < ipfw.metarules) like every half hour?

Author Comment

ID: 12005459
wraping this all up, explicitly allowing the port traffic to enter each specific network ip address(or the last) on the tun0 interface with make the following rules work?
add allow 47 from any to in recv tun0
add allow tcp from any to 1723 in recv tun0
add allow tcp from any to 80 in recv tun0
add allow tcp from any to 22 in recv tun0
add allow tcp from any to 21 in recv tun0

without even using ipfmeta i have full access to my firewall because of the explicit permit all statement.
add allow ip from any to any

it really doesn't look logical to me that "any" means first ip address of the interface.


Author Comment

ID: 12005515

my look at logic was a bit off at the time i wrote it

the explicit permit all statement is after the port rules.

but i'm thinking again, if port forwarding was specified in my natd.conf that anything on port 80 should go to host. shouldn't i have got access denied rather than my firewall box?
LVL 62

Accepted Solution

gheist earned 1600 total points
ID: 12008245
You do not need that cron job, just some script which completes the rulesets or so.

Featured Post

NFR key for Veeam Agent for Linux

Veeam is happy to provide a free NFR license for one year.  It allows for the non‑production use and valid for five workstations and two servers. Veeam Agent for Linux is a simple backup tool for your Linux installations, both on‑premises and in the public cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Short answer to this question: there is no effective WiFi manager in iOS devices as seen in Windows WiFi or Macbook OSx WiFi management, but this article will try and provide some amicable solutions to better suite your needs.
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question