- This topic is empty.
July 24, 2017 at 7:09 pm #44846
I can’t figure out how to set up ZS to forward original IP address.
For example, I have Asterisk server behind ZS. There are some
hacking attempts coming from outside, but in logs offending IP
address is always address of our ZS gateway.
Similar situation with L2L VPN, rsync mirroring server allows to
connect one particular IP from the subnet at our another branch,
but again, it fails because server receives ZS IP instead.
When using other routers (RV082) everything works as expected
out of the box.
What am I missing ?July 29, 2017 at 2:58 am #54513
Anybody, please ?July 31, 2017 at 8:32 am #54514reaperzParticipant
I am also using ZS for L2L VPN and I don’t have such problems.
Are you by chance using wrong-way NAT?
Go to “Router -> NAT” in menu
Under “NAT Enabled Interfaces” there should only be one interface – that is your external (WAN) interface, that has external IP-address from your ISP. No other interfaces should be under right tab!July 31, 2017 at 5:26 pm #54515
Thank you for your answer.
In the router section there are selected three PPPoE. as we utilize
Network Balancer feature of ZS router, so I guess that should not
cause that kind of problem. Especially that RV081 had similar
feature, and never experienced such issue.September 29, 2017 at 12:56 am #54516
Two months and no answer ?
Is it really impossible to have in ZS feature which is a standard
in even simplest routers ?
Can anybody confirm/deny if it is possible at all ?October 2, 2017 at 12:05 pm #54517
For what i understand, this is a misconfiguration on your side. Zeroshell is of course capable of ding this, as this is the basics of routing.
Please give more info about your configuration/architecture if you want to get help.October 2, 2017 at 6:22 pm #54518
Sure, here are the relevant points of the ZS setup
Setup -> Network ->
Gateway – [empty]
– that is supposed to be controlled by NetBalancer settings
NAT Enabled Interfaces [pppoe0,pppoe1,pppoe2]
– two FTTx redundant links + one aircard
ETH0 – LAN
ETH2/3/5 – pppoe
– default gateway – [disabled]
– pppoe0 – fiber1 (active)
– pppoe1 – fiber2 (spare)
– ICMP failover checking [enabled]
Please let me know what else you would need to know.October 3, 2017 at 7:45 am #54519
as suggested reaperz, did you check your NAT?
your external access interfaces (PPPoE) have to be under “NAT Enabled Interfaces” and nothing else.October 3, 2017 at 9:54 am #54520
Yup, that’s exactly as it is. You can see it in my previous reply:
“NAT Enabled Interfaces [pppoe0,pppoe1,pppoe2]”October 3, 2017 at 1:42 pm #54521
do you use any port redirection / virtual server ?October 3, 2017 at 9:46 pm #54522
Yes I do. That is how servers are being “found” in the LAN.
Asterisk server among the others. The problem is that when
there is hacking attempt detected on Asterisk server – ofending
address is identified as IP of our ZS router, instead of external
IP address of the “attacker”.
If I only have an _external_ IP address in the server logs – the
problem is solved.October 4, 2017 at 7:54 am #54523
this may be the problem then : if your server is accessed using virtual server, it means you use the zeroshell IP to access it and not its own IP, then this is not anymore basic routing and zeroshell processes the packets instead of just passing them through.October 4, 2017 at 12:36 pm #54524
Then how would you explain that any stock router that I know/used
– have virtual servers / port forwarding section
– passes external IPs to virtual servers in the NAT without any extra setup
?October 4, 2017 at 1:45 pm #54525
my answer was incomplete… this is the case when using the keyword MASQUARADE with iptable routing NAT, which is the default with ZS.
I don’t know how to do this from the web interface (not sure it’s even possible), but you have to use instead POSTROUTING.
I suggest you to search about this 2 different ways to do NAT to learn more about it.
- You must be logged in to reply to this topic.