I have an ERL-3 and was attempting to open access up to my webserver. I have done this with another server with no problems. However with a siminlar configuration I am running into problems. I'm attempting to connect to an apache webserver, so i started with opening ports 443 and 80. No dice. After that I DMZ'ed the entire ip address. When I attempt to connect from outside the firewall I still get Connection_Refused. Any ideas?
firewall {
all-ping enable
broadcast-ping disable
ipv6-receive-redirects disable
ipv6-src-route disable
ip-src-route disable
log-martians enable
name WAN_IN {
default-action accept
description "WAN to internal"
rule 10 {
action accept
description "Allow established/related"
log disable
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
disable
log disable
state {
invalid enable
}
}
rule 30 {
action accept
destination {
address XXX.XXX.XXX.152
}
log disable
protocol tcp_udp
source {
}
state {
established disable
invalid disable
new enable
related enable
}
}
rule 40 {
action accept
destination {
address XXX.XXX.XXX.69
}
log disable
protocol tcp_udp
state {
established disable
invalid disable
new enable
related enable
}
}
}
name WAN_LOCAL {
default-action accept
description "WAN to router"
rule 10 {
action accept
description "Allow established/related"
log disable
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
disable
log disable
state {
invalid enable
}
}
rule 21 {
action accept
destination {
address XXX.XXX.XXX.152
}
log disable
protocol all
state {
established disable
invalid disable
new enable
related enable
}
}
}
receive-redirects disable
send-redirects enable
source-validation disable
syn-cookies enable
}
nat {
rule 8 {
description XXXXXXX
destination {
address XXX.XXX.XXX.152
}
inbound-interface eth0
inside-address {
address XXX.XXX.XXX.102
}
log disable
protocol all
type destination
}
rule 9 {
destination {
address XXX.XXX.XXX.102
}
inbound-interface eth0
inside-address {
address XXX.XXX.XXX.69
}
log disable
protocol all
type destination
}
rule 5003 {
description XXXXXX
log disable
outbound-interface eth0
outside-address {
address XXX.XXX.XXX.101
}
protocol all
source {
address XXX.XXX.XXX.152
}
type source
}
rule 5005 {
description RDWeb/RDGateway
log disable
outbound-interface eth0
outside-address {
address XXX.XXX.XXX.102
}
protocol all
source {
address XXX.XXX.XXX.69
}
type source
}
rule 5006 {
description "masquerade for WAN"
outbound-interface eth0
type masquerade
}
}
I can however still access Apache from inside the firewall and my domain resolves to the correct IP.