News: This forum is now permanently frozen.
Pages: [1]
Topic: How to allow traffic to the internet but not to the WAN subnet  (Read 2725 times)
« on: June 12, 2009, 19:13:30 »
jimbobmcgee *
Posts: 6

I am trying to segregate two Windows XP clients in such a way that they can continue to access the internet but not my LAN.  However, I still need to allow Remote Desktop access to the XP clients from my LAN.

My thought is to put a M0n0wall in with its WAN on my LAN, then put the two clients on the LAN side of the MW. 

So far, I have:

     {ISP}--{PIX}--{my lan}--{MW}--{2 x XP}

The MW WAN is 192.a.a.10/24, the MW LAN is 10.b.b.0/24.  I have so far tried to put in a rules to:

  - block/reject source 10.b.b.0/24 to 192.a.a.0/24 on LAN
  - accept 192.a.a.0/24 to 10.b.b.0/24 on WAN

Neither of these have helped.

Has anyone get any ideas?

J.
« Reply #1 on: June 12, 2009, 19:39:21 »
Fred Grayson *****
Posts: 994

Read the M0n0wall Handbook section on DMZ.

Put the two XP clients in the DMZ.

Add rules blocking these DMZ clients from LAN access.

Add rules allowing these DMZ clients WAN access.

Add rules allowing LAN access to the DMZ clients, perhaps only on the required port or ports needed for remote desktop.

--
Google is your friend and Bob's your uncle.
« Reply #2 on: June 14, 2009, 23:32:27 »
jimbobmcgee *
Posts: 6

Thanks, but I don't think that will do it.  The M0n0wall is not the default gateway for my LAN, it is merely a device in between my LAN and the two XP clients.

As such, the MW's WAN interface is a (DHCP) client in my real LAN (and so has a 192.a.a.x address) and the XP clients are on the LAN side of the MW. 

I've attached a diagram if it helps.  It shows the current setup and the initial direction of traffic/access that I need (obviously, replies in the reverse direction are required too).

J.


* Drawing1.png (53.64 KB, 548x327 - viewed 312 times.)
« Last Edit: June 14, 2009, 23:34:42 by jimbobmcgee »
« Reply #3 on: June 15, 2009, 00:44:22 »
Fred Grayson *****
Posts: 994

I don't see any reason you can't accomplish what you want by rearranging things along the lines of what is offered in the Handbook.

--
Google is your friend and Bob's your uncle.
« Reply #4 on: June 15, 2009, 13:16:52 »
jimbobmcgee *
Posts: 6

Because I'm not in the habit or rearranging my core LAN on a whim. 

That, and the M0n0 is not a physical unit.  The M0n0 is a virtual machine, as are the XP clients in question. 

The M0n0 VM has two (virtual) NICs, one of which points to the external facing (physical) NIC of the host; the other to an virtual switch that is internal to the host.  The clients have one NIC each, which point to the same virtual switch.  The M0n0 is the default gateway for the XP clients and, currently, the XP clients can see the internet via the M0n0. 

I think I have worked it out as far as I need to.  I have added the following inbound NATs:

IfProtoExt port rangeNAT IPInt port range
WANTCP5005010.b.b.503389
WANTCP5005110.b.b.513389

and the following rules:

IfTypeProtoSourcePortDestinationPort
WANPassTCP**10.b.b.503389
WANPassTCP**10.b.b.513389
LANBlock*LAN net*192.a.a.0/24*
LANBlock*LAN net*192.c.c.0/24*
LANPassTCP**10.b.b.513389

(where 192.a.a.x is my physical LAN and 192.c.c.x is a VPN LAN that I didn't want them to be able to access).

I had hoped to avoid putting in a block rule for every VPN I don't want the two clients to access, so I first tried setting a static route for all traffic to go to the default gateway of the PIX on the physical LAN (i.e. attempting to bypass the routing that PIX would do) but for some reason, that only allowed me to see the default gateway and no further.  So I've just bitten the bullet and added the 18 VPN LAN block rules.

For sanity, if there is a better way, I'd love to hear it.

J.
 
Pages: [1]
 
 
Powered by SMF 1.1.20 | SMF © 2013, Simple Machines