Linux NAT the easy way

Experts,

I'd like to use a linux box as a network address translator, but for external IP addresses, and preferably without the use of IPTables

I like to use APF, but they (advanced policy firewall) don't seem to have the functionality I'm interested in.

I'm only interested in one thing, passing all data intended for ip:port -> alternate_ip:port and back again

So:

4.4.4.4 -> connects to my linux box on 5.5.5.5:400 -> is network address translated and all packets intended for 5.5.5.5:400 are sent to -> 6.6.6.6:500 <> then from 6.6.6.6:500 -> the response is sent to 5.5.5.5:400 -> back to 4.4.4.4:[on incoming port]

So exactly like a NAT on a local router, only internet based.

I'm familiar with nginx, pound, apache methods, but they are much more complicated than what I want.

I want simple. Because simple works on any IP and any port with any service.

I'm a Perl guy, so if there is a Perl method I'd be interested too.

Thanks for any help!
LVL 1
dr34m3rsAsked:
Who is Participating?

Improve company productivity with a Business Account.Sign Up

x
 
PapertripConnect With a Mentor Commented:
Hmm that's quite possible, I wouldn't be the least bit surprised if it did.  APF probably wants complete control to avoid manual errors and maybe flushes the table and rewrites it via cron.  That's just a guess though, I've never used APF.

Are you just using APF for "simple" things like blocking all incoming ports except maybe 80 and 443 ?

If so, and you switched to managing iptables directly, once you setup a single rule to say allow TCP/80, you can just copy the entire rule and change the port to say 443.  Basically what I'm saying is, if you need just basic firewalling then the rules are easy and there are TONS of links out there, along with lots of experts here ;)
0
 
PapertripCommented:
NAT does not forward ports, that is what PAT is for.

This is easily achieved with iptables, but I know you said you prefer not to use it.  Any specific reason for that?  I can't think of anything to do this that would give you less headaches than a few iptables rules.

iptables IS the easy way, and many experts here can help with that.
0
 
dr34m3rsAuthor Commented:
Would I be able to use custom IPTables rules with APF? Since APF configures IPTables? Or would my custom rules be overwritten when APF is restarted?
0
What Kind of Coding Program is Right for You?

There are many ways to learn to code these days. From coding bootcamps like Flatiron School to online courses to totally free beginner resources. The best way to learn to code depends on many factors, but the most important one is you. See what course is best for you.

 
dr34m3rsAuthor Commented:
Cool, thanks for your help and advice in this matter. Really appreciate it.

I'm considering all aspects of this and will do a little research on my own.

I use APF because it's very easy to setup and I've not had time to learn the iptables syntax. I don't generally do anything fancy with my firewall rules. APF rocks because you can setup allow / deny lists and it works beautifully with custom scripts and a program called "brute force defender" which basically just scans logs and blocks brute force attacks to ports using APF.

I use APF for closing everything but the ports needed by services I use.

I did a quick scan of google before going out for the night and found some references to custom iptables - so we'll see how that goes.

0
 
hvillanuCommented:
Hi,
The "easy" way could be using a GUI to configure iptables... check this: http://www.fwbuilder.org/
-regards-
0
 
dr34m3rsAuthor Commented:
hvillanu: Thanks for the idea, but no gui on my linux boxes. Could do webmin or something I suppose.

And an idea I had was: if APF does reset the custom iptables, I could just write a custom start script that adds them at boot and upon manual restarts...
0
 
hvillanuConnect With a Mentor Commented:
Hi,

Well you can " construct/built/test " the Script on a Linux with KDE, Gnome, or whatever you like, then export to script, and finally run it on Production with iptables-restore or shell to import it.
Webmin it's ok too, but I prefer fwbuilder.
-regards-
0
 
dr34m3rsAuthor Commented:
Alright, I had some time and googled:

APF uses a preroute.rules file and you can do things like

$IPT -t nat -I PREROUTING -p tcp --dport 3625 -j REDIRECT --to-port 25
$IPT -t nat -I PREROUTING -p tcp --dport 3636 -j REDIRECT --to-port 8443

Although the above example is port related and not ip:port combo, I'm confident I'll be able to find my answer. If I run into issues I'll ask another question here in the correct area.

Thanks for all the help Paper and Villa
0
 
dr34m3rsAuthor Commented:
Thanks again!
0
 
dr34m3rsAuthor Commented:
Followup:

Fooling around with this I was able to determine the following:

This works on CentOS 6 64-bit linux running Advanced Policy Firewall (APF)

1) Turn on IP forwarding
# echo 1 >/proc/sys/net/ipv4/ip_forward

2) Place the following rule into your /etc/apf/preroute.rules file:

$IPT -t nat -A PREROUTING -p tcp --dport PORTNUMBER-i eth0 -j DNAT --to-destination X.X.X.X:PORT

# PORTNUMBER = the port number on your eth0 interface (incoming)
# eth0 = the interface you'd like to use
# x.x.x.x:port (your ip:port) example = 10.0.0.10:81 (can be intranet or internet it seems)

3) Place the following rule into your /etc/apf/postroute.rules file:

$IPT -t nat -A POSTROUTING -j MASQUERADE


4) Restart APF and look for any errors near the top of the output near
"loading preroute.rules"

# apf --restart



Hope this helps someone out as much as it has helped me!
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.