Hi,
I m trying to setup and tighten up my dmz firewall. The dmz is on 10.0.100.0/24 network, and its gateway in on port eth12. I would like to enable just the ports being used(dns 53 tcp/udp, ping, and web on port 80) The srcnat and dstnat is correctly configured.
My problem is in the filter section, in forwarding traffic from the vlan, and to the vlan from port 12.
Why is that i can t ping google.com if i use these filter rules(i can ping ip-s) :
add chain=forward comment=" Dmz intiation" out-interface=ether12 protocol=icmp src-address=10.0.100.22
add chain=forward dst-port=53 out-interface=ether12 protocol=udp src-address=10.0.100.22
add chain=forward dst-port=53 out-interface=ether12 protocol=tcp src-address=10.0.100.22
add chain=forward dst-port=80,443 out-interface=ether12 protocol=tcp src-address=10.0.100.22
add chain=forward connection-state=established,related,new dst-address=10.0.100.22 in-interface=ether12 protocol=icmp
add chain=forward connection-state=established,related dst-address=10.0.100.22 dst-port=53 in-interface=ether12 protocol=tcp
add chain=forward dst-address=10.0.100.22 dst-port=53 in-interface=ether12 protocol=udp
add chain=forward connection-state=established dst-address=10.0.100.22 dst-port=80,443 in-interface=ether12 protocol=tcp
But if i enable this rule, then i can
add chain=forward connection-state=established,related disabled=yes dst-address=10.0.100.22 in-interface=ether12
I would like to use the first method to tighten up port security, and not use the last rule.
Any insight would be appreciated.