iptables:forward_ports
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
iptables:forward_ports [2016/10/19 09:54] – peter | iptables:forward_ports [2019/11/29 17:34] (current) – removed peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== IPTables - Forward Ports ====== | ||
- | |||
- | ===== Sample Network Infrastructure ===== | ||
- | |||
- | Web server network details: | ||
- | |||
- | * Public IP Address: 5.42.134.2 | ||
- | * Public Interface: eth0 | ||
- | |||
- | * Private IP Address: 192.168.1.2 | ||
- | * Private Interface: eth1 | ||
- | |||
- | Firewall network details: | ||
- | |||
- | * Public IP Address: 5.42.134.35 | ||
- | * Public Interface: eth0 | ||
- | |||
- | * Private IP Address: 192.168.1.35 | ||
- | * Private Interface: eth1 | ||
- | |||
- | |||
- | ===== Sample WebServer ===== | ||
- | |||
- | The web-server is NginX listening on the private networking address. | ||
- | |||
- | <file bash etc/ | ||
- | server { | ||
- | listen 192.168.1.2: | ||
- | |||
- | . . . | ||
- | } | ||
- | </ | ||
- | |||
- | |||
- | ===== Verify Connectivity to the WebServer ===== | ||
- | |||
- | From the firewall server, issue: | ||
- | |||
- | <code bash> | ||
- | curl --connect-timeout 5 192.168.1.2 | ||
- | </ | ||
- | |||
- | Returns | ||
- | |||
- | The webpage successfully. | ||
- | |||
- | < | ||
- | < | ||
- | < | ||
- | < | ||
- | < | ||
- | < | ||
- | body { | ||
- | width: 35em; | ||
- | margin: 0 auto; | ||
- | font-family: | ||
- | } | ||
- | </ | ||
- | </ | ||
- | < | ||
- | < | ||
- | . . . | ||
- | </ | ||
- | |||
- | Now try to use the public interface to connect to the web-server. | ||
- | |||
- | <code bash> | ||
- | curl --connect-timeout 5 5.42.134.2 | ||
- | </ | ||
- | |||
- | Returns | ||
- | |||
- | < | ||
- | curl: (7) Failed to connect to 5.42.134.2 port 80: Connection refused | ||
- | </ | ||
- | |||
- | |||
- | ===== Configuring the Firewall to Forward Port 80 ===== | ||
- | |||
- | ==== Enable Forwarding in the Kernel ==== | ||
- | |||
- | Enable traffic forwarding at the kernel level. | ||
- | |||
- | To turn port forwarding on for this session only, type: | ||
- | |||
- | <code bash> | ||
- | echo 1 | sudo tee / | ||
- | </ | ||
- | |||
- | To turn port forwarding on permanently, | ||
- | |||
- | <code bash> | ||
- | sudo vi / | ||
- | </ | ||
- | |||
- | Inside, find and uncomment the line that looks like this: | ||
- | |||
- | <file bash / | ||
- | net.ipv4.ip_forward=1 | ||
- | </ | ||
- | |||
- | Save and close the file when you are finished. | ||
- | |||
- | <code bash> | ||
- | sudo sysctl -p | ||
- | sudo sysctl --system | ||
- | </ | ||
- | |||
- | |||
- | ===== Adding the Forwarding Rules to the Firewall ===== | ||
- | |||
- | We want to configure our firewall so that traffic flowing into our public interface (eth0) on port 80 will be forwarded to our private interface (eth1). | ||
- | |||
- | Our basic firewall has a our **FORWARD** chain set to **DROP** traffic by default. | ||
- | |||
- | In the **FORWARD** chain, we will accept new connections destined for port 80 that are coming from our public interface and travelling to our private interface. | ||
- | |||
- | <code bash> | ||
- | sudo iptables -A FORWARD -i eth0 -o eth1 -p tcp --syn --dport 80 -m conntrack --ctstate NEW -j ACCEPT | ||
- | </ | ||
- | |||
- | This will let the first packet, meant to establish a connection, through the firewall. | ||
- | |||
- | <code bash> | ||
- | iptables -A FORWARD -i eth0 -o eth1 -m conntrack --ctstate ESTABLISHED, | ||
- | iptables -A FORWARD -i eth1 -o eth0 -m conntrack --ctstate ESTABLISHED, | ||
- | </ | ||
- | |||
- | We can double check that our policy on the **FORWARD** chain is set to **DROP** by typing: | ||
- | |||
- | <code bash> | ||
- | sudo iptables -P FORWARD DROP | ||
- | </ | ||
- | |||
- | At this point, we have allowed certain traffic between our public and private interfaces to proceed through our firewall. | ||
- | |||
- | |||
- | ===== Adding the NAT Rules to Direct Packets Correctly ===== | ||
- | |||
- | Next, we'll add the rules that will tell iptables how to route our traffic. | ||
- | |||
- | The first operation, called **DNAT**, will take place in the **PREROUTING** chain of the **nat** table. | ||
- | |||
- | Since we are only configuring port forwarding and not performing NAT on every packet that hits our firewall, we'll want to match port 80 on our rule. We will match packets aimed at port 80 to our web server' | ||
- | |||
- | <code bash> | ||
- | sudo iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 80 -j DNAT --to-destination 192.168.1.2 | ||
- | </ | ||
- | |||
- | This takes care of half of the picture. | ||
- | |||
- | To configure proper routing, we also need to modify the packet' | ||
- | |||
- | To enable this functionality, | ||
- | |||
- | <code bash> | ||
- | sudo iptables -t nat -A POSTROUTING -o eth1 -p tcp --dport 80 -d 192.168.1.2 -j SNAT --to-source 192.168.1.35 | ||
- | </ | ||
- | |||
- | Once this rule is in place, our web server should be accessible by pointing our web browser at our firewall machine' | ||
- | |||
- | <code bash> | ||
- | curl 5.42.134.35 | ||
- | </ | ||
- | |||
- | Returns the website successfully. | ||
- | |||
- | < | ||
- | < | ||
- | < | ||
- | < | ||
- | < | ||
- | < | ||
- | body { | ||
- | width: 35em; | ||
- | margin: 0 auto; | ||
- | font-family: | ||
- | } | ||
- | </ | ||
- | </ | ||
- | < | ||
- | < | ||
- | . . . | ||
- | </ | ||
- | |||
- | Our port forwarding setup is complete. | ||
- | |||
- | |||
- | ===== Adjusting the Permanent Rule Set ===== | ||
- | |||
- | Now that we have set up port forwarding, we can save this to our permanent rule set. | ||
- | |||
- | If you do not care about losing the comments that are in your current rule set, just use the **iptables-persistent** service to save your rules: | ||
- | |||
- | <code bash> | ||
- | sudo service iptables-persistent save | ||
- | </ | ||
- | |||
- | If you would like to keep the comments in your file, open it up and edit manually: | ||
- | |||
- | <code bash> | ||
- | sudo vi / | ||
- | </ | ||
- | |||
- | You will need to adjust the configuration in the **filter** table for the **FORWARD** chain rules that were added. | ||
- | |||
- | <file bash / | ||
- | *filter | ||
- | # Allow all outgoing, but drop incoming and forwarding packets by default | ||
- | :INPUT DROP [0:0] | ||
- | :FORWARD DROP [0:0] | ||
- | :OUTPUT ACCEPT [0:0] | ||
- | |||
- | # Custom per-protocol chains | ||
- | :UDP - [0:0] | ||
- | :TCP - [0:0] | ||
- | :ICMP - [0:0] | ||
- | |||
- | # Acceptable UDP traffic | ||
- | |||
- | # Acceptable TCP traffic | ||
- | -A TCP -p tcp --dport 22 -j ACCEPT | ||
- | |||
- | # Acceptable ICMP traffic | ||
- | |||
- | # Boilerplate acceptance policy | ||
- | -A INPUT -m conntrack --ctstate ESTABLISHED, | ||
- | -A INPUT -i lo -j ACCEPT | ||
- | |||
- | # Drop invalid packets | ||
- | -A INPUT -m conntrack --ctstate INVALID -j DROP | ||
- | |||
- | # Pass traffic to protocol-specific chains | ||
- | ## Only allow new connections (established and related should already be handled) | ||
- | ## For TCP, additionally only allow new SYN packets since that is the only valid | ||
- | ## method for establishing a new TCP connection | ||
- | -A INPUT -p udp -m conntrack --ctstate NEW -j UDP | ||
- | -A INPUT -p tcp --syn -m conntrack --ctstate NEW -j TCP | ||
- | -A INPUT -p icmp -m conntrack --ctstate NEW -j ICMP | ||
- | |||
- | # Reject anything that's fallen through to this point | ||
- | ## Try to be protocol-specific w/ rejection message | ||
- | -A INPUT -p udp -j REJECT --reject-with icmp-port-unreachable | ||
- | -A INPUT -p tcp -j REJECT --reject-with tcp-reset | ||
- | -A INPUT -j REJECT --reject-with icmp-proto-unreachable | ||
- | |||
- | # Rules to forward port 80 to our web server | ||
- | |||
- | # Web server network details: | ||
- | |||
- | # * Public IP Address: 5.42.134.2 | ||
- | # * Private IP Address: 192.168.1.2 | ||
- | # * Public Interface: eth0 | ||
- | # * Private Interface: eth1 | ||
- | # | ||
- | # Firewall network details: | ||
- | # | ||
- | # * Public IP Address: 5.42.134.35 | ||
- | # * Private IP Address: 192.168.1.35 | ||
- | # * Public Interface: eth0 | ||
- | # * Private Interface: eth1 | ||
- | -A FORWARD -i eth0 -o eth1 -p tcp --syn --dport 80 -m conntrack --ctstate NEW -j ACCEPT | ||
- | -A FORWARD -i eth0 -o eth1 -m conntrack --ctstate ESTABLISHED, | ||
- | -A FORWARD -i eth1 -o eth0 -m conntrack --ctstate ESTABLISHED, | ||
- | # End of Forward filtering rules | ||
- | |||
- | # Commit the changes | ||
- | |||
- | COMMIT | ||
- | |||
- | *raw | ||
- | :PREROUTING ACCEPT [0:0] | ||
- | :OUTPUT ACCEPT [0:0] | ||
- | COMMIT | ||
- | |||
- | *nat | ||
- | :PREROUTING ACCEPT [0:0] | ||
- | :INPUT ACCEPT [0:0] | ||
- | :OUTPUT ACCEPT [0:0] | ||
- | : | ||
- | |||
- | # Rules to translate requests for port 80 of the public interface | ||
- | # so that we can forward correctly to the web server using the | ||
- | # private interface. | ||
- | |||
- | # Web server network details: | ||
- | |||
- | # * Public IP Address: 5.42.134.2 | ||
- | # * Private IP Address: 192.168.1.2 | ||
- | # * Public Interface: eth0 | ||
- | # * Private Interface: eth1 | ||
- | # | ||
- | # Firewall network details: | ||
- | # | ||
- | # * Public IP Address: 5.42.134.35 | ||
- | # * Private IP Address: 192.158.1.35 | ||
- | # * Public Interface: eth0 | ||
- | # * Private Interface: eth1 | ||
- | -A PREROUTING -i eth0 -p tcp --dport 80 -j DNAT --to-destination 192.168.1.2 | ||
- | -A POSTROUTING -d 192.168.1.2 -o eth1 -p tcp --dport 80 -j SNAT --to-source 192.168.1.35 | ||
- | # End of NAT translations for web server traffic | ||
- | COMMIT | ||
- | |||
- | *security | ||
- | :INPUT ACCEPT [0:0] | ||
- | :FORWARD ACCEPT [0:0] | ||
- | :OUTPUT ACCEPT [0:0] | ||
- | COMMIT | ||
- | |||
- | *mangle | ||
- | :PREROUTING ACCEPT [0:0] | ||
- | :INPUT ACCEPT [0:0] | ||
- | :FORWARD ACCEPT [0:0] | ||
- | :OUTPUT ACCEPT [0:0] | ||
- | : | ||
- | COMMIT | ||
- | </ | ||
- | |||
- | Save and close the file once you have added the above and adjusted the values to reflect your own network environment. | ||
- | |||
- | Test the syntax of your rules file by typeing: | ||
- | |||
- | <code bash> | ||
- | sudo iptables-restore -t < / | ||
- | </ | ||
- | |||
- | If no errors are detected, load the rule set: | ||
- | |||
- | <code bash> | ||
- | sudo service iptables-persistent reload | ||
- | </ | ||
- | |||
- | Test that your web server is still accessible through your firewall' | ||
- | |||
- | <code bash> | ||
- | curl 5.42.134.35 | ||
- | </ | ||
- | |||
- | This should work just as it did before. | ||
- | |||
- | |||
- | ===== Conclusion ===== | ||
- | |||
- | By now, you should be comfortable with forwarding ports on a Linux server with iptables. | ||
- | |||
- | |||
- | ===== References ===== | ||
- | |||
- | https:// | ||
iptables/forward_ports.1476870885.txt.gz · Last modified: 2020/07/15 09:30 (external edit)