[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now


natd not port forwarding after ip change freebsd 4.8

Posted on 2004-09-07
Medium Priority
Last Modified: 2013-12-23
This whole configuration of a DSL firewall/router using freebsd 4.8 was built based on way too many tutorials.
The port forwarding worked correctly when the tun adapter only had 1 ip address.  Since my provider dynamically allocates my ip address to my site, a new one was given to me.  With the new ip address (second in the adapter information) i am unable to get any port forwarding to work correctly. Internet access does work from the private hosts behind the firewall.  I think they are working correctly because of the dynamic flag in the natd.conf but i'm not too sure.  When connecting to my site on ports 80 and 22 from remote sites, i just get my firewall machine instead of the proper hosts behind my firewall.  This all works fine when the tun adapter only has one ip address.

Another funny note is that when using pppnat instead of natd.  Port forwarding working perfectly no matter how many ip address's are listed in the tun adapter.  I switched to natd for ppptp forwarding support.  I'm having a hard time finding documentation on pptp forwarding with pppnat.

i have exhausted myself looking for similiar problems on the internet.  I really hope this is a misconfiguration because i really enjoy using pptp from work and etc.

        set timeout 0
        set device PPPoE:xl0
        enable lqr
        set mru 1492
        set mtu 1492
        set speed sync
        set dial
        set login
        set timeout 0
        set authname *******
        set authkey  *******
        set ifaddr
        add 0 0 HISADDR
        set redial 0 0
        enable dns
natd_flags="-f /etc/natd.conf"

#####ipfw rules (ipfw.rules)########
add divert natd all from any to any via tun0
add allow 47 from to any in recv fxp0
add allow 47 from any to in recv tun0
add allow tcp from any to 1723 in recv tun0
add allow tcp from any to 80 in recv tun0
add allow tcp from any to 22 in recv tun0
add allow tcp from any to 21 in recv tun0
add allow ip from any to any

interface tun0
use_sockets yes
same_ports yes
dynamic yes
redirect_proto gre
redirect_port tcp 1723
redirect_port tcp 80
redirect_port tcp 21
redirect_port tcp 22
redirect_port tcp 23

####ifconfig output for tun0 adapter####
        inet 65.95.X.X --> 65.95.X.X netmask 0xffffff00
        inet 65.95.X.X --> 65.95.X.X netmask 0xffffff00
        Opened by PID 50
Question by:thetherington
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 4
LVL 62

Expert Comment

ID: 11999890
Yes - ipfw uses first address of interface somehow.
Same with ipf, so I use ipfmeta ( /usr/ports/security/ipfmeta ) to generate ruleset for either.
pf in OpenBSD has much better logic to handle such situations, lets hope this feature will come along with import of pf in 5.3 release and hope 5.3 will be production release at least...

Author Comment

ID: 12000440
gheist, thanks!
to clarify, i can use ipfmeta with ipfw?  Can provide like a few line examples of the ipf.metarules file that uses ipfw? the example
only demonstrates from what it looks like to me is ip filter.

LVL 62

Expert Comment

ID: 12000748
Your link is right, same app.
It does not care about content of input much, it simply looks via input stream, and multiplies lines, whenever object string is found.

given object file ( call it ipfw.objs )


Metarules for ipfw ( call it ipf.metarules )

add allow tcp from any to TUN0 port PUBLICPORTS via tun0

ipfmeta ipfw.objs < ipfw.metarules

will simply expand to 4 respective rules

add allow tcp from any to 65.95.X.X port 80 via tun0
add allow tcp from any to 65.95.Y.Y port 80 via tun0
add allow tcp from any to 65.95.X.X port 443 via tun0
add allow tcp from any to 65.95.Y.Y port 443 via tun0

btw tracking tcp states adds more to security than simply filtering on port numbers
What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

LVL 62

Expert Comment

ID: 12000764
As you can see objects file can be reused to make up many config files where such hosts need to be listed like resolv.conf etc, some acls for login services etc.
And you can put it all in some kind of Makefile to make adjusting all access lists on system at once very easy

Author Comment

ID: 12005172
gheist, this sounds pretty good.  I guess that i would have to create a script to update the TUN0 object with all the ip address's for the tun interface and cron  (ipfmeta ipfw.objs < ipfw.metarules) like every half hour?

Author Comment

ID: 12005459
wraping this all up, explicitly allowing the port traffic to enter each specific network ip address(or the last) on the tun0 interface with make the following rules work?
add allow 47 from any to in recv tun0
add allow tcp from any to 1723 in recv tun0
add allow tcp from any to 80 in recv tun0
add allow tcp from any to 22 in recv tun0
add allow tcp from any to 21 in recv tun0

without even using ipfmeta i have full access to my firewall because of the explicit permit all statement.
add allow ip from any to any

it really doesn't look logical to me that "any" means first ip address of the interface.


Author Comment

ID: 12005515

my look at logic was a bit off at the time i wrote it

the explicit permit all statement is after the port rules.

but i'm thinking again, if port forwarding was specified in my natd.conf that anything on port 80 should go to host. shouldn't i have got access denied rather than my firewall box?
LVL 62

Accepted Solution

gheist earned 1600 total points
ID: 12008245
You do not need that cron job, just some script which completes the rulesets or so.

Featured Post

Ask an Anonymous Question!

Don't feel intimidated by what you don't know. Ask your question anonymously. It's easy! Learn more and upgrade.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I had an issue with InstallShield not being able to use Computer Browser service on Windows Server 2012. Here is the solution I found.
Make the most of your online learning experience.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…

656 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question