Timothy Wilson wrote: > Our new Web server sits in a DMZ outside our school's main firewall > and has a regular IP address. The rest of the district is NAT'd > behind the firewall using a 10.*.*.* block. We have a tape library > set up inside to back up all the file servers. > > Since we have a BackupExec setup, I'd like to install the Unix agent > and backup the Web server files to the internal tape library. The > firewall makes that more complicated. > > Here's the question: How 'bout putting a 2nd NIC in the Webserver > and putting that NIC on the internal network? The 2nd one would get > a 10.* IP address and shouldn't have any trouble accessing the tape > library. Generally a bad idea. Plus, you compromise the whole idea of a DMZ that way. However, I think the solution you desire is found in mere routing tables and standard IPChains (assuming that you're running a 2.2.x kernel). Masquerading is only as important as the outside world. Your web server, however, is another matter. You control that network, those IP's. You know who the source is and what the destination is. You probably know which ports are needed under which protocols. Remember this: you do not have to masquerade to the DMZ... #!/bin/sh IPCN=/usr/sbin/ipchains WEBSVR=AAA.BBB.CCC.DDD TAPESVR=10.0.0.2 PROTO=udp SPORT=555 DPORT=555 # Allow udp traffic to/from the tapeserver and webserver. $IPCN -${1:='D'} forward -j ACCEPT -p $PROTO -b -s $TAPESVR $SPORT \ -d $WEBSVR $DPORT If you want even tighter control on when this rule is allowed, place a crontab entry for this script. Use a parameter variable to specify an add ('A') or delete ('D'). # m h dom m dow command 00 05 * * * tape-rule A 15 05 * * * tape-rule D -- ^chewie Sorry about not signing my email...I can't get access to my home workstation today. CCW-20010320