Differences

This shows you the differences between two versions of the page.

firewall:example_4 [2010/11/04 13:58]
tibor
firewall:example_4 [2010/11/04 14:00] (current)
tibor
Line 35: Line 35:
**8.** The **incoming user rules** of the **ET4** interface also allow the packet through, as it goes to the 192.168.0.x subnet: **8.** The **incoming user rules** of the **ET4** interface also allow the packet through, as it goes to the 192.168.0.x subnet:
-| daddr == 192.168.50.1/24 || daddr == 192.168.0.1/24 accept |+| daddr == 192.168.50.1/24 %%||%% daddr == 192.168.0.1/24 accept |
**9.** The router sends the packet to ET1 as it is that interface that handles the 192.168.0.x subnet. **9.** The router sends the packet to ET1 as it is that interface that handles the 192.168.0.x subnet.
Line 44: Line 44:
Now all data flows headed to %%www.yourcompany.com%% are “hijacked" and redirected to your internal server, without your web browser noticing anything. An otherwise impossible task to configure is very easily done by manually adding one simple rule to the right ruleset! Now all data flows headed to %%www.yourcompany.com%% are “hijacked" and redirected to your internal server, without your web browser noticing anything. An otherwise impossible task to configure is very easily done by manually adding one simple rule to the right ruleset!
 +
 +===== Entering the rule =====
 +You enter the rule of step 2 above into the "Additional rules" fields of the [[web GUI:security profile]] page:
 +| ET1 | Incoming user | post | daddr == %%www.yourcompany.com%% modify static daddr 192.168.10.31 |
 +All other necessary rules are already present in the standard firewall ruleset.
 +
firewall/example_4.1288875496.txt.gz · Last modified: 2010/11/04 13:58 by tibor
CC Attribution-Noncommercial-Share Alike 3.0 Unported
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0