Temporary redirection with DNAT and SNAT
gtaylor at riverviewtech.net
Wed Apr 27 07:00:17 CEST 2005
> I have to shutdown a proxy server for a few days and I need to
> redirect its traffic to a server behind an iptables firewall. Here's
> what I want to do:
> Original request to $PUBLIC_IP:80 is redirected to $PRIVATE_IP:2050
> (machine behind firewall)
> Packets from $PRIVATE_IP:2050 come out of the firewall as coming from
> I binded the proxy's public IP to the firewall's external interface
> (eth0) and added the following rules:
> I think I got the first part right.
> #test for ezproxy
> -A FORWARD -i eth0 -o eth1 -p tcp --syn -d 192.168.0.3 --dport 2050 -j ACCEPT
Do you have any other rules in your FORWARD chain that will allow the rest of the traffic flow through to the Proxy, i.e. --state ESTABLISHED? Correspondingly do you have any rules that will prevent the traffic that is flowing from the proxy in eth1 and back out eth0? This could get you down the road.
> But I'm having problems with the second part. The SNAT rule:
> -I POSTROUTING -s 192.168.0.3 --sport 2050 -o eth0 -j SNAT --to 18.104.22.168
You will have to specify a protocol "-p tcp" to use any port definitions.
> #This one seems OK too.
> -A PREROUTING -i eth0 -p tcp -d $PUBLIC_IP --dport 80 -j DNAT --to
> The SNAT rule generates the error:
> Applying iptables firewall rules: iptables-restore v1.2.11: Unknown
> arg `--sport'
*nod* see above.
> One of the restrictions I have is that *only* the packets from
> $PRIVATE_IP:2050 can go out as coming from $PUBLIC_IP:80.
If you are really paranoid that this will happen you could write a rule that would drop any traffic that was not from the internal proxy.
-A FORWARD -s ! 192.168.0.3 -p tcp --sport 80 -j DROP
Grant. . . .
More information about the netfilter