Re: Dual WAN setup redux

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

On Fri, 27 Jan 2012 17:03:18 -0600, Dimitri Yioulos <dyioulos@xxxxxxxxxxxxx> wrote:

Let me see if I can provide all of the information you might need to assist me:
WAN1 (up and working for a long time): 65.x.x.160/27, gw 65.x.x.161
WAN2 (new connection): 75.x.x.24/29, gw 75.x.x.30
eth0 - WAN1: 65.x.x.162
eth0:0-eth0:6: 65.x.x.163, 164, etc.
eth1 - LAN:
eth2 - DMZ:
eth3 - WAN2: 75.x.x.25
eth3:0-eth3:1: 75.x.x.26, 27
SNAT current DMZ hosts WAN1 addresses
I want to use WAN2 for a new Web server and test server living in the DMZ.
I created a new routing table called WAN2.  Here's the output of "ip route show
table WAN2":
75.x.x.24/29 dev eth3  scope link  src 75.x.x.25
default via 75.x.x.30 dev eth3
Netstat -ar produces the following ourput:
75.x.x.24   *      U         0 0          0 eth3
65.x.x.160  *      U         0 0          0 eth0        vpn.mydomain.c   UG        0 0          0 eth2     *        U         0 0          0 eth2   *        U         0 0          0 eth1
default         65.x.x.161.                UG        0 0          0 eth0
The following are probably stupid noob questions, but here goes:
I can ping the WAN2 gateway address from our firewall/router, but not from any
other network device (I can ping the gateway address of WAN1 just fine).  Don't
I have to be able to do that first?

I don't see why you can't ping the eth3 interface address from other points in your network.  Your routing table looks OK to me.  Are you sure there are not firewall rules interfering?  And yes, I think that until you get that to work, it's useless to try to go forward.

I'm not sure what internal ip addresses to give the new Web server and test
server (192.100.1.x, or 75.x.x.26-29.

I'm not experienced at this, but I expected a DMZ to have public IP addresses, not to be natted just like your internal LAN.  But anyway, of course you will need to assign some address in the network to your web server in the DMZ, and use DNAT to allow it to respond to queries from the Internet.  If you assign to your web server, I think you would do something like this:

iptables -A PREROUTING -i eth3 -p tcp -dport 80 -j dnat --to-destination

For the test server, I assume you don't need for it to be accessible from outside your LANs, so no DNAT necessary.  Just assign a LAN address to it like

Others here will be much more able to help you, I think.

To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at

[Linux Netfilter Development]     [Linux Kernel Networking Development]     [Linux Networking Development]     [Linux Kernel Development]     [Linux Resources]     [LARTC]     [Bugtraq]     [Consulting]     [Free Internet Dating]     [Yosemite Forum]     [Photo]

Add to Google Powered by Linux