hi, I have a server (FreBSD 8.1) and a client (Fedora 13 - 10.10.10.2)
my RC.CONF
my RESOLV.CONF
my ROUTER2.FIREWALL
my client ping the server
my client can't ping the router 192.168.1.1 and go in internet
Can you help me?
my RC.CONF
Code:
keymap="us.iso"
hostname="ServerBSD.Casa.org"
defaultrouter="192.168.1.1"
sshd_enable="YES"
natd_enable="YES"
natd_flags=""
named_enable="YES"
natd_interface="rl0"
gateway_enable="YES"
firewall_enable="YES"
firewall_quiet="NO"
firewall_script="/etc/router2.firewall"
firewall_logging="YES"
inetd_enable="YES"
kern_securelevel_enable="NO"
network_interfaces="auto"
ifconfig_rl0="inet 192.168.1.100 netmask 255.255.255.0"
ifconfig_fxp0="inet 10.10.10.254 netmask 255.255.255.0"
my RESOLV.CONF
Code:
nameserver 212.216.112.112
nameserver 212.216.172.62
my ROUTER2.FIREWALL
Code:
################ Start of IPFW rules file ###############################
ipfw -q -f flush
# Set rules command prefix
cmd="/sbin/ipfw add"
pif="rl0"
$cmd 00005 allow all from any to any via fxp0
$cmd 00010 allow all from any to any via lo0
$cmd 00015 check-state
#################################################################
#Outbound Section
#################################################################
$cmd 00110 allow tcp from any to 212.212.112.112 53 out via $pif setup keep-state
$cmd 00111 allow udp from any to 212.212.112.112 53 out via $pif keep-state
$cmd 00110 allow tcp from any to 212.212.172.67 53 out via $pif setup keep-state
$cmd 00111 allow udp from any to 212.212.172.67 53 out via $pif keep-state
# Allow out non-secure standard www function
$cmd 00200 allow tcp from any to any 80 out via $pif setup keep-state
# Allow out secure www function https over TLS SSL
$cmd 00220 allow tcp from any to any 443 out via $pif setup keep-state
# Allow out send & get email function
$cmd 00230 allow tcp from any to any 25 out via $pif setup keep-state
$cmd 00231 allow tcp from any to any 110 out via $pif setup keep-state
# Allow out FBSD (make install & CVSUP) functions
# Basically give user root "GOD" privileges.
$cmd 00240 allow tcp from me to any out via $pif setup keep-state uid root
# Allow out ping
$cmd 00250 allow icmp from any to any out via $pif keep-state
# Allow out Time
$cmd 00260 allow tcp from any to any 37 out via $pif setup keep-state
# Allow out nntp news
$cmd 00270 allow tcp from any to any 119 out via $pif setup keep-state
# Allow out secure SSH
$cmd 00280 allow tcp from any to any 22 out via $pif setup keep-state
# Allow out whois
$cmd 00290 allow tcp from any to any 43 out via $pif setup keep-state
$cmd 00299 deny log all from any to any out via $pif
################################################################
#Inbound Section
#################################################################
# Deny all inbound traffic from non-routable reserved address spaces
$cmd 00300 deny all from 192.168.0.0/16 to any in via $pif #RFC 1918 private IP
$cmd 00301 deny all from 172.16.0.0/12 to any in via $pif #RFC 1918 private IP
$cmd 00302 deny all from 10.0.0.0/8 to any in via $pif #RFC 1918 private IP
$cmd 00303 deny all from 127.0.0.0/8 to any in via $pif #loopback
$cmd 00304 deny all from 0.0.0.0/8 to any in via $pif #loopback
$cmd 00305 deny all from 169.254.0.0/16 to any in via $pif #DHCP auto-config
$cmd 00306 deny all from 192.0.2.0/24 to any in via $pif #reserved for docs
$cmd 00307 deny all from 204.152.64.0/23 to any in via $pif #Sun cluster interconnect
$cmd 00308 deny all from 224.0.0.0/3 to any in via $pif #Class D & E multicast
# Deny public pings
$cmd 00310 deny icmp from any to any in via $pif
# Deny ident
$cmd 00315 deny tcp from any to any 113 in via $pif
# Deny all Netbios service. 137=name, 138=datagram, 139=session
# Netbios is MS/Windows sharing services.
# Block MS/Windows hosts2 name server requests 81
$cmd 00320 deny tcp from any to any 137 in via $pif
$cmd 00321 deny tcp from any to any 138 in via $pif
$cmd 00322 deny tcp from any to any 139 in via $pif
$cmd 00323 deny tcp from any to any 81 in via $pif
# Deny any late arriving packets
$cmd 00330 deny all from any to any frag in via $pif
# Deny ACK packets that did not match the dynamic rule table
$cmd 00332 deny tcp from any to any established in via $pif
# Allow in standard www function because I have apache server
$cmd 00400 allow tcp from any to me 80 in via $pif setup limit src-addr 2
# Allow in secure FTP, Telnet, and SCP from public Internet
$cmd 00410 allow tcp from any to me 22 in via $pif setup limit src-addr 2
# Reject & Log all incoming connections from the outside
$cmd 00499 deny log all from any to any in via $pif
$cmd 00999 deny log all from any to any
################ End of IPFW rules file ###############################
my client ping the server
my client can't ping the router 192.168.1.1 and go in internet
Can you help me?