Koozali.org: home of the SME Server

Legacy Forums => General Discussion (Legacy) => Topic started by: Frank on August 20, 2003, 09:01:28 AM

Title: Internal Ip not Masqueraded
Post by: Frank on August 20, 2003, 09:01:28 AM
Hi all,

something curious happened to my Network:

all of a sudden, I had to reinstall my WindoozeBox(what wonder). Now when I try to connect to any Edonkey Server, it tells me my port xyz is not reachable. Ok, this is not a Windoof problem, everything worked fine before. I tried a portscan to my PC, which should normally fail, but the side told me I have a private ip, and showed me the IP of the WindoozeBox which is behind SME5.6u4 in Server/Gateway mode. I set the Server to Private Server/gateway and back, but no change, except that there is no Ip shown anymore to the Internet.

May somebody shed a light on this? I searched through the forums with no success. It looks to me like there is no IP Translation running, nut the service is up and running, reboots of the SME didn't help as well.

Thanx in Advance
Title: Re: Internal Ip not Masqueraded
Post by: Scott on August 22, 2003, 06:01:38 AM
You may need to post more info on the windows box.
I reinstalled my win98, (seems like it was a mistake
as it now crashes more often) I have my sme5.6 cofigured
as a server only with dhcp, dns, ect. running.

My win98 is setup to be assigned an IP via dhcp and
the sme is my domain controller as well. This configuration
allows me to access the sites on the server using
somedomain.com as opposed to the IP address.

What is your ISP. DSL, dialup, cable? I have sbc and
it turns out that windows is not compatable with
pppOe when on the backside of a firewall router.
However, as long as the sme server is running,
I can surf the web with my win98 box.

My guess is your problem may be in your internet
connection configuration. Is the proxy server running?
That is the first place I would look.
Title: Re: Internal Ip not Masqueraded
Post by: Frank on August 23, 2003, 07:03:11 PM
Thanx for ur response Scott,

this is definitely n o Windoof problem, unfortunately.
Since what ever happened, none of the internal Ip are masqueraded anymore.

here is my masq status

[root@citrix root]# /etc/rc.d/init.d/masq status
Table: filter
Chain INPUT (policy DROP)
target     prot opt source               destination
state_chk  all  --  0.0.0.0/0            0.0.0.0/0
local_chk  all  --  0.0.0.0/0            0.0.0.0/0
PPPconn    all  --  0.0.0.0/0            0.0.0.0/0
DROP       all  --  224.0.0.0/4          0.0.0.0/0
DROP       all  --  0.0.0.0/0            224.0.0.0/4
InboundICMP  icmp --  0.0.0.0/0            0.0.0.0/0
denylog    icmp --  0.0.0.0/0            0.0.0.0/0
InboundTCP  tcp  --  0.0.0.0/0            0.0.0.0/0          tcp flags:0x16/0x02

denylog    tcp  --  0.0.0.0/0            0.0.0.0/0          tcp flags:0x16/0x02
InboundUDP  udp  --  0.0.0.0/0            0.0.0.0/0
denylog    udp  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0          udp spts:67:68
gre-in     47   --  0.0.0.0/0            0.0.0.0/0
denylog    47   --  0.0.0.0/0            0.0.0.0/0
denylog    all  --  0.0.0.0/0            0.0.0.0/0

Chain FORWARD (policy DROP)
target     prot opt source               destination
state_chk  all  --  0.0.0.0/0            0.0.0.0/0
local_chk  all  --  0.0.0.0/0            0.0.0.0/0
ForwardedTCP  tcp  --  0.0.0.0/0            0.0.0.0/0          tcp flags:0x16/0x
02
ForwardedUDP  udp  --  0.0.0.0/0            0.0.0.0/0
denylog    all  --  0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination
PPPconn    all  --  0.0.0.0/0            0.0.0.0/0
DROP       all  --  224.0.0.0/4          0.0.0.0/0
DROP       all  --  0.0.0.0/0            224.0.0.0/4
OutboundICMP  icmp --  0.0.0.0/0            0.0.0.0/0
denylog    icmp --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0

Chain ForwardedTCP (1 references)
target     prot opt source               destination
ForwardedTCP_1943  all  --  0.0.0.0/0            0.0.0.0/0
denylog    tcp  --  0.0.0.0/0            0.0.0.0/0          tcp flags:0x16/0x02

Chain ForwardedTCP_1943 (1 references)
target     prot opt source               destination

Chain ForwardedUDP (1 references)
target     prot opt source               destination
ForwardedUDP_1943  all  --  0.0.0.0/0            0.0.0.0/0
denylog    udp  --  0.0.0.0/0            0.0.0.0/0

Chain ForwardedUDP_1943 (1 references)
target     prot opt source               destination

Chain InboundICMP (1 references)
target     prot opt source               destination
InboundICMP_1943  all  --  0.0.0.0/0            0.0.0.0/0
denylog    icmp --  0.0.0.0/0            0.0.0.0/0

Chain InboundICMP_1943 (1 references)
target     prot opt source               destination
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0          icmp type 8
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0          icmp type 0
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0          icmp type 3
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0          icmp type 4
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0          icmp type 11
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0          icmp type 12
denylog    all  --  0.0.0.0/0            0.0.0.0/0

Chain InboundTCP (1 references)
target     prot opt source               destination
InboundTCP_1943  all  --  0.0.0.0/0            0.0.0.0/0
denylog    tcp  --  0.0.0.0/0            0.0.0.0/0          tcp flags:0x16/0x02

Chain InboundTCP_1943 (1 references)
target     prot opt source               destination
denylog    all  --  0.0.0.0/0           !213.54.178.226
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:113
denylog    tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:21
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:80
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:443
denylog    tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:143
denylog    tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:389
denylog    tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:110
denylog    tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:1723
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:25
denylog    tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:22
denylog    tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:23

Chain InboundUDP (1 references)
target     prot opt source               destination
InboundUDP_1943  all  --  0.0.0.0/0            0.0.0.0/0
denylog    udp  --  0.0.0.0/0            0.0.0.0/0

Chain InboundUDP_1943 (1 references)
target     prot opt source               destination
denylog    all  --  0.0.0.0/0           !213.54.178.226

Chain OutboundICMP (1 references)
target     prot opt source               destination
OutboundICMP_1943  all  --  0.0.0.0/0            0.0.0.0/0
denylog    icmp --  0.0.0.0/0            0.0.0.0/0

Chain OutboundICMP_1943 (1 references)
target     prot opt source               destination
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0          icmp type 8
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0          icmp type 0
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0          icmp type 3
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0          icmp type 4
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0          icmp type 11
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0          icmp type 12
denylog    all  --  0.0.0.0/0            0.0.0.0/0

Chain PPPconn (2 references)
target     prot opt source               destination
PPPconn_1  all  --  0.0.0.0/0            0.0.0.0/0

Chain PPPconn_1 (1 references)
target     prot opt source               destination

Chain denylog (26 references)
target     prot opt source               destination
DROP       all  --  0.0.0.0/0            0.0.0.0/0
DROP       all  --  0.0.0.0/0            0.0.0.0/0
DROP       all  --  0.0.0.0/0            0.0.0.0/0
DROP       all  --  0.0.0.0/0            0.0.0.0/0
DROP       all  --  0.0.0.0/0            0.0.0.0/0

Chain gre-in (1 references)
target     prot opt source               destination
denylog    all  --  0.0.0.0/0           !213.54.178.226
denylog    all  --  0.0.0.0/0            0.0.0.0/0

Chain local_chk (2 references)
target     prot opt source               destination
local_chk_1943  all  --  0.0.0.0/0            0.0.0.0/0

Chain local_chk_1943 (1 references)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  192.168.180.0/24     0.0.0.0/0

Chain state_chk (2 references)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0          state RELATED,ESTABL
ISHED
Table: nat
Chain PREROUTING (policy ACCEPT)
target     prot opt source               destination
PortForwarding  all  --  0.0.0.0/0            0.0.0.0/0
SMTPProxy  tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:25
TransProxy  tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:80

Chain POSTROUTING (policy ACCEPT)
target     prot opt source               destination
PostroutingOutbound  all  --  0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination

Chain PortForwarding (1 references)
target     prot opt source               destination
PortForwarding_1943  all  --  0.0.0.0/0            213.54.178.226

Chain PortForwarding_1943 (1 references)
target     prot opt source               destination

Chain PostroutingOutbound (1 references)
target     prot opt source               destination
ACCEPT     all  --  213.54.178.226       0.0.0.0/0
MASQUERADE  all  --  0.0.0.0/0            0.0.0.0/0

Chain SMTPProxy (1 references)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            127.0.0.1
ACCEPT     all  --  0.0.0.0/0            192.168.180.1
ACCEPT     all  --  0.0.0.0/0            213.54.178.226
DNAT       tcp  --  0.0.0.0/0            0.0.0.0/0          to:192.168.180.1:25

Chain TransProxy (1 references)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            127.0.0.1
ACCEPT     all  --  0.0.0.0/0            192.168.180.1
ACCEPT     all  --  0.0.0.0/0            213.54.178.226
DNAT       tcp  --  0.0.0.0/0            0.0.0.0/0          to:192.168.180.1:312
8
Table: mangle
Chain PREROUTING (policy ACCEPT)
target     prot opt source               destination

Chain INPUT (policy ACCEPT)
target     prot opt source               destination

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination
TOS        tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:21 TOS set 0
x10
TOS        tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:22 TOS set 0
x10
TOS        tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:23 TOS set 0
x10
TOS        tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:25 TOS set 0
x10
TOS        tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:80 TOS set 0
x10
TOS        tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:110 TOS set
0x10
TOS        tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:20 TOS set 0
x08

Chain POSTROUTING (policy ACCEPT)
target     prot opt source               destination
[root@citrix root]#


as my clue of this stuff is rather small, maybe anyone else here around got something to guess


Anyway Thanx

Frank