I'm setting up a network for a client, and I'm using an SME Server 7.4 as their firewall/gateway. The network looks like this:
Internet
|
|
|
Non-SME Modem/Gateway (192.168.99.254)
|
|
|
192.168.99.0/24 network
|
|
|
SME external interface eth1 (192.168.99.2)
SME internal interface eth0 (192.168.81.1)
|
|
|
192.168.81.0/24 network
So, as you can see, I'm using the SME Server to act as a gateway from the 192.168.81.0/24 network to the 192.168.99.0/24 network. It is also running dansguardian transparently.
The 192.168.81.0/24 network will be used for community college-type computer training courses, and the 192.168.99.0/24 range is an office network. So, while still sharing the internet access, I'd like to deny access from the 192.168.81.0/24 range to 192.168.99.0/24.
I tried the following iptables rule:
iptables -A FORWARD -d 192.168.99.0/255.255.255.0 -i eth0 -j DROP
but I could still ping the 192.168.99.0/24 range from 192.168.81.0/24, even after a signal-event post-upgrade and signal-event reboot.
Have I just made a small mistake in the iptables command, or is this completely the wrong way to go about it? I realise I could build another firewall to protect the 192.168.99.0/24 range, but it would be a whole lot less hassle if there was a simple way I could get SME to do it.
Thanks in advance.