All of lore.kernel.org
 help / color / mirror / Atom feed
* Re: Multi ISP router/firewall ...
@ 2007-03-27 15:32 Pierre JUHEN
  2007-03-28  5:51 ` Ray Leach
  0 siblings, 1 reply; 8+ messages in thread
From: Pierre JUHEN @ 2007-03-27 15:32 UTC (permalink / raw)
  To: spoons, Netfilter


Suggested reading : http://www.ssi.bg/~ja/nano.txt

It explains how the routing is done.

Using the ROUTE patch, you force the routing outside the 
routing table.

When a packet comes back on an established connection,
the kernel lookup in the cache, with the input interface 
as part of the matching.

Since in the cache, you have the other interface (ISP1)
for this connection, it doesn't route the packet.

You should use something else than the ROUTE target, for example
what is explained in nano.txt.



> Message du 27/03/07 14:54
> De : "Ray Leach" <spoons@rchq.co.za>
> A : "Netfilter" <netfilter@lists.netfilter.org>
> Copie à : 
> Objet : Multi ISP router/firewall ...
> 
> Hi All
> 
> I've been trying to configure a router/firewall with 5 zones (2 of which
> are ISP links) unsuccessfully.
> 
> So far I've managed to patch the kernel with the ROUTE target, and I've
> got rules as follows:
> 
> FORWARD chain filter table:
> ACCEPT     0    --  ethxx0 eth4    10.0.0.0/24    0.0.0.0/0           
> ACCEPT     0    --  eth4   ethxx0  0.0.0.0/0      10.0.0.0/24
> 
> FORWARD chain mangle table:
> ROUTE      tcp  --  *      *       10.0.0.67    !192.168.1.0/24      tcp
> dpts:80:90 ROUTE oif:eth4 continue
> 
> 
> POSTROUTING chain nat table:
> SNAT       0    --  *      eth4    0.0.0.0/0    0.0.0.0/0  to:10.1.0.2
> 
> 
> ethxx0 is my internal LAN
> eth4 is my 2nd ISP connection
> 10.0.0.67 is my workstation
> 10.1.0.2 is the ip bound to eth4
> 
> The other ISP link is working, we host around 12 websites on servers in
> our DMZ, we have outgoing web browsing, email, MSN, etc. using various
> nat rules for that interface, they all work.
> 
> I can see using tcpdump that the packets are leaving my workstation,
> being mangles to change the route, going out the 2nd ISP link, coming
> back into the 2nd ISP link, but then they disappear.
> 
> My forwarding rules as shown above do not show any traffic.
> 
> This has me stumped.
> 
> As I've stated, I have nat (both SNAT and DNAT) working on the other ISP
> interface on the same machine.
> 
> Where should I start looking?
> 
> Regards
> 
> Ray
> -- 
> Raymond Leach
> RCHQ Hobbies (http://www.rchq.co.za/)
> (T)+27-82-575-6975 (F)+27-86-652-2773
> 
> 
> 
>



^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: Multi ISP router/firewall ...
  2007-03-27 15:32 Multi ISP router/firewall Pierre JUHEN
@ 2007-03-28  5:51 ` Ray Leach
  2007-03-28  6:18   ` Jan Engelhardt
  0 siblings, 1 reply; 8+ messages in thread
From: Ray Leach @ 2007-03-28  5:51 UTC (permalink / raw)
  To: pierre.juhen; +Cc: Netfilter

On Tue, 2007-03-27 at 17:32 +0200, Pierre JUHEN wrote:
> Suggested reading : http://www.ssi.bg/~ja/nano.txt
> 
> It explains how the routing is done.
> 
> Using the ROUTE patch, you force the routing outside the 
> routing table.
> 
> When a packet comes back on an established connection,
> the kernel lookup in the cache, with the input interface 
> as part of the matching.
> 
> Since in the cache, you have the other interface (ISP1)
> for this connection, it doesn't route the packet.
> 
> You should use something else than the ROUTE target, for example
> what is explained in nano.txt.
> 
> 

Hi

I tried both methods - iptables using the ROUTE target as well as using
iptables to mark the packets, then using iproute2 to lookup and route
using a table with an ip fwmark rule.

In both cases, the traffic is routed out and return traffic comes back
in the correct interface, but it does not get NATed backed to the
client.

iptables -A FORWARD -i eth0 -p tcp --dport 80 -s 10.0.0.3 -j ACCEPT
iptables -A FORWARD -i eth4 -p tcp --sport 80 -d 10.0.0.3 -j ACCEPT

iptables -A FORWARD -t mangle -p tcp --dport 80 -s 10.0.0.3 -j MARK
--set-mark 0x4

iptables -A POSTROUTING -t nat -o eth4 -p tcp --dport 80 -s 10.0.0.3 -j
SNAT --to 10.1.0.2

ip rule del fwmark 4 table 4 priority 32000
ip route flush table 4
ip route add table 4 default via 10.1.0.1
ip rule add fwmark 4 table 4 priority 32000
ip route flush cache


What am I doing wrong?

Looking in /proc/net/ip_conntrack I can find an entry for http traffic
from machine at ip 10.0.0.3 created by the SNAT rule above. When the
traffic returns back in eth4 it seems to disappear on the firewall ...

Regards

Ray

> 
> > Message du 27/03/07 14:54
> > De : "Ray Leach" <spoons@rchq.co.za>
> > A : "Netfilter" <netfilter@lists.netfilter.org>
> > Copie à : 
> > Objet : Multi ISP router/firewall ...
> > 
> > Hi All
> > 
> > I've been trying to configure a router/firewall with 5 zones (2 of which
> > are ISP links) unsuccessfully.
> > 
> > So far I've managed to patch the kernel with the ROUTE target, and I've
> > got rules as follows:
> > 
> > FORWARD chain filter table:
> > ACCEPT     0    --  ethxx0 eth4    10.0.0.0/24    0.0.0.0/0           
> > ACCEPT     0    --  eth4   ethxx0  0.0.0.0/0      10.0.0.0/24
> > 
> > FORWARD chain mangle table:
> > ROUTE      tcp  --  *      *       10.0.0.67    !192.168.1.0/24      tcp
> > dpts:80:90 ROUTE oif:eth4 continue
> > 
> > 
> > POSTROUTING chain nat table:
> > SNAT       0    --  *      eth4    0.0.0.0/0    0.0.0.0/0  to:10.1.0.2
> > 
> > 
> > ethxx0 is my internal LAN
> > eth4 is my 2nd ISP connection
> > 10.0.0.67 is my workstation
> > 10.1.0.2 is the ip bound to eth4
> > 
> > The other ISP link is working, we host around 12 websites on servers in
> > our DMZ, we have outgoing web browsing, email, MSN, etc. using various
> > nat rules for that interface, they all work.
> > 
> > I can see using tcpdump that the packets are leaving my workstation,
> > being mangles to change the route, going out the 2nd ISP link, coming
> > back into the 2nd ISP link, but then they disappear.
> > 
> > My forwarding rules as shown above do not show any traffic.
> > 
> > This has me stumped.
> > 
> > As I've stated, I have nat (both SNAT and DNAT) working on the other ISP
> > interface on the same machine.
> > 
> > Where should I start looking?
> > 
> > Regards
> > 
> > Ray
> > -- 
> > Raymond Leach
> > RCHQ Hobbies (http://www.rchq.co.za/)
> > (T)+27-82-575-6975 (F)+27-86-652-2773
> > 
> > 
> > 
> >
> 
> 
> 
-- 
Raymond Leach
RCHQ Hobbies (http://www.rchq.co.za/)
(T)+27-82-575-6975 (F)+27-86-652-2773



^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: Multi ISP router/firewall ...
  2007-03-28  5:51 ` Ray Leach
@ 2007-03-28  6:18   ` Jan Engelhardt
  2007-03-28  6:43     ` Ray Leach
  0 siblings, 1 reply; 8+ messages in thread
From: Jan Engelhardt @ 2007-03-28  6:18 UTC (permalink / raw)
  To: Ray Leach; +Cc: Netfilter


On Mar 28 2007 07:51, Ray Leach wrote:
>
>I tried both methods - iptables using the ROUTE target as well as using
>iptables to mark the packets, then using iproute2 to lookup and route
>using a table with an ip fwmark rule.
>
>In both cases, the traffic is routed out and return traffic comes back
>in the correct interface, but it does not get NATed backed to the
>client.
>
>iptables -A FORWARD -i eth0 -p tcp --dport 80 -s 10.0.0.3 -j ACCEPT
>iptables -A FORWARD -i eth4 -p tcp --sport 80 -d 10.0.0.3 -j ACCEPT
>
>iptables -A FORWARD -t mangle -p tcp --dport 80 -s 10.0.0.3 -j MARK
>--set-mark 0x4

The routing decision is done before the FORWARDing chain is entered.
Try moving the MARK to INPUT.

>iptables -A POSTROUTING -t nat -o eth4 -p tcp --dport 80 -s 10.0.0.3 -j
>SNAT --to 10.1.0.2
>
>ip rule del fwmark 4 table 4 priority 32000
>ip route flush table 4
>ip route add table 4 default via 10.1.0.1
>ip rule add fwmark 4 table 4 priority 32000
>ip route flush cache
>
>
>What am I doing wrong?
>
>Looking in /proc/net/ip_conntrack I can find an entry for http traffic
>from machine at ip 10.0.0.3 created by the SNAT rule above. When the
>traffic returns back in eth4 it seems to disappear on the firewall ...

Jan
-- 


^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: Multi ISP router/firewall ...
  2007-03-28  6:18   ` Jan Engelhardt
@ 2007-03-28  6:43     ` Ray Leach
  2007-03-28 11:42       ` Raymond Leach
  2007-03-28 12:21       ` Ray Leach
  0 siblings, 2 replies; 8+ messages in thread
From: Ray Leach @ 2007-03-28  6:43 UTC (permalink / raw)
  To: Jan Engelhardt; +Cc: Netfilter

On Wed, 2007-03-28 at 08:18 +0200, Jan Engelhardt wrote:
> On Mar 28 2007 07:51, Ray Leach wrote:
> >
> >I tried both methods - iptables using the ROUTE target as well as using
> >iptables to mark the packets, then using iproute2 to lookup and route
> >using a table with an ip fwmark rule.
> >
> >In both cases, the traffic is routed out and return traffic comes back
> >in the correct interface, but it does not get NATed backed to the
> >client.
> >
> >iptables -A FORWARD -i eth0 -p tcp --dport 80 -s 10.0.0.3 -j ACCEPT
> >iptables -A FORWARD -i eth4 -p tcp --sport 80 -d 10.0.0.3 -j ACCEPT
> >
> >iptables -A FORWARD -t mangle -p tcp --dport 80 -s 10.0.0.3 -j MARK
> >--set-mark 0x4
> 
> The routing decision is done before the FORWARDing chain is entered.
> Try moving the MARK to INPUT.
> 

The source traffic is not from the firewall machine, but another machine
on the local LAN. The mark is being set properly and the traffic is
routed out the eth4 interface correctly, so the mark logic is working.


The setup is something like this:



                                |    eth6|(196.7.34.98)<---->ISP1
|PROXY|(10.0.0.3)<--->(10.0.0.2)|FIREWALL|
                                |    eth4|(10.1.0.2)<--->(10.1.0.1)ISP2


ip route show table main
196.7.34.96/28 dev eth6  proto kernel  scope link  src 196.7.34.98
10.0.0.0/24 dev eth0  proto kernel  scope link  src 10.0.0.2
10.1.0.0/24 dev eth4  proto kernel  scope link  src 10.1.0.2

ip route show table 4
default via 10.1.0.1 dev eth4

ip rule
0:      from all lookup local 
32000:  from all fwmark 0x4 lookup 4 
32766:  from all lookup main 
32767:  from all lookup default


tcpdump -n -i eth4 shows my traffic exiting after being SNATed to
10.1.0.2 and reply traffic re-entering .

tcpdump -n -i eth0 src or dst 10.0.0.3 and port 80 shows my traffic
exiting from the source (10.0.0.3), but nothing ever returns.

I have checked to make sure nothing is dropped, and also noticed that
the 2 forwarding rules above only show traffic out from eth0, the return
rule does not show any traffic. This is why I think the SNAT is not
working correctly when the traffic comes back in.

My last option is to do the nat using iproute2 instead of iptables.
My question is, why is SNAT working on the other 4 interfaces on this
firewall, but not on this one?


> >iptables -A POSTROUTING -t nat -o eth4 -p tcp --dport 80 -s 10.0.0.3 -j
> >SNAT --to 10.1.0.2
> >
> >ip rule del fwmark 4 table 4 priority 32000
> >ip route flush table 4
> >ip route add table 4 default via 10.1.0.1
> >ip rule add fwmark 4 table 4 priority 32000
> >ip route flush cache
> >
> >
> >What am I doing wrong?
> >
> >Looking in /proc/net/ip_conntrack I can find an entry for http traffic
> >from machine at ip 10.0.0.3 created by the SNAT rule above. When the
> >traffic returns back in eth4 it seems to disappear on the firewall ...
> 
> Jan
-- 
Raymond Leach
RCHQ Hobbies (http://www.rchq.co.za/)
(T)+27-82-575-6975 (F)+27-86-652-2773



^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: Multi ISP router/firewall ...
  2007-03-28  6:43     ` Ray Leach
@ 2007-03-28 11:42       ` Raymond Leach
  2007-03-28 12:21       ` Ray Leach
  1 sibling, 0 replies; 8+ messages in thread
From: Raymond Leach @ 2007-03-28 11:42 UTC (permalink / raw)
  To: Jan Engelhardt; +Cc: Netfilter

Hi All

Managed to sort this out.

The problem was that reverse path filtering had to be enabled on the
eth4 interface. All my other interfaces have reverse path filtering
disabled, so what's the difference with this one?

Regards

Ray

On Wed, 2007-03-28 at 08:58 +0200, Ray Leach wrote:
> On Wed, 2007-03-28 at 08:18 +0200, Jan Engelhardt wrote:
> > On Mar 28 2007 07:51, Ray Leach wrote:
> > >
> > >I tried both methods - iptables using the ROUTE target as well as using
> > >iptables to mark the packets, then using iproute2 to lookup and route
> > >using a table with an ip fwmark rule.
> > >
> > >In both cases, the traffic is routed out and return traffic comes back
> > >in the correct interface, but it does not get NATed backed to the
> > >client.
> > >
> > >iptables -A FORWARD -i eth0 -p tcp --dport 80 -s 10.0.0.3 -j ACCEPT
> > >iptables -A FORWARD -i eth4 -p tcp --sport 80 -d 10.0.0.3 -j ACCEPT
> > >
> > >iptables -A FORWARD -t mangle -p tcp --dport 80 -s 10.0.0.3 -j MARK
> > >--set-mark 0x4
> > 
> > The routing decision is done before the FORWARDing chain is entered.
> > Try moving the MARK to INPUT.
> > 
> 
> The source traffic is not from the firewall machine, but another machine
> on the local LAN. The mark is being set properly and the traffic is
> routed out the eth4 interface correctly, so the mark logic is working.
> 
> 
> The setup is something like this:
> 
> 
> 
>                                 |    eth6|(196.7.34.98)<---->ISP1
> |PROXY|(10.0.0.3)<--->(10.0.0.2)|FIREWALL|
>                                 |    eth4|(10.1.0.2)<--->(10.1.0.1)ISP2
> 
> 
> ip route show table main
> 196.7.34.96/28 dev eth6  proto kernel  scope link  src 196.7.34.98
> 10.0.0.0/24 dev eth0  proto kernel  scope link  src 10.0.0.2
> 10.1.0.0/24 dev eth4  proto kernel  scope link  src 10.1.0.2
> 
> ip route show table 4
> default via 10.1.0.1 dev eth4
> 
> ip rule
> 0:      from all lookup local 
> 32000:  from all fwmark 0x4 lookup 4 
> 32766:  from all lookup main 
> 32767:  from all lookup default
> 
> 
> tcpdump -n -i eth4 shows my traffic exiting after being SNATed to
> 10.1.0.2 and reply traffic re-entering .
> 
> tcpdump -n -i eth0 src or dst 10.0.0.3 and port 80 shows my traffic
> exiting from the source (10.0.0.3), but nothing ever returns.
> 
> I have checked to make sure nothing is dropped, and also noticed that
> the 2 forwarding rules above only show traffic out from eth0, the return
> rule does not show any traffic. This is why I think the SNAT is not
> working correctly when the traffic comes back in.
> 
> My last option is to do the nat using iproute2 instead of iptables.
> My question is, why is SNAT working on the other 4 interfaces on this
> firewall, but not on this one?
> 
> 
> > >iptables -A POSTROUTING -t nat -o eth4 -p tcp --dport 80 -s 10.0.0.3 -j
> > >SNAT --to 10.1.0.2
> > >
> > >ip rule del fwmark 4 table 4 priority 32000
> > >ip route flush table 4
> > >ip route add table 4 default via 10.1.0.1
> > >ip rule add fwmark 4 table 4 priority 32000
> > >ip route flush cache
> > >
> > >
> > >What am I doing wrong?
> > >
> > >Looking in /proc/net/ip_conntrack I can find an entry for http traffic
> > >from machine at ip 10.0.0.3 created by the SNAT rule above. When the
> > >traffic returns back in eth4 it seems to disappear on the firewall ...
> > 
> > Jan
-- 
Raymond Leach
Knowledge Factory (http://www.knowledgefactory.co.za)
(Tel)+27-11-445-8100  (Fax)+27-11-445-8101



------------------------------------------------------------------------------------------
This e-mail was checked by the e-Sweeper Service.
For more information visit our website, Clearswift Corporation e-Sweeper :
http://www.mimesweeper.com/products/esweeper/
------------------------------------------------------------------------------------------



^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: Multi ISP router/firewall ...
  2007-03-28  6:43     ` Ray Leach
  2007-03-28 11:42       ` Raymond Leach
@ 2007-03-28 12:21       ` Ray Leach
  2007-03-28 17:15         ` Jan Engelhardt
  1 sibling, 1 reply; 8+ messages in thread
From: Ray Leach @ 2007-03-28 12:21 UTC (permalink / raw)
  To: Jan Engelhardt; +Cc: Netfilter

Hi All

Managed to sort this out.

The problem was that reverse path filtering had to be enabled on the
eth4 interface. All my other interfaces have reverse path filtering
disabled, so what's the difference with this one?

Regards

Ray

On Wed, 2007-03-28 at 08:58 +0200, Ray Leach wrote:
> On Wed, 2007-03-28 at 08:18 +0200, Jan Engelhardt wrote:
> > On Mar 28 2007 07:51, Ray Leach wrote:
> > >
> > >I tried both methods - iptables using the ROUTE target as well as using
> > >iptables to mark the packets, then using iproute2 to lookup and route
> > >using a table with an ip fwmark rule.
> > >
> > >In both cases, the traffic is routed out and return traffic comes back
> > >in the correct interface, but it does not get NATed backed to the
> > >client.
> > >
> > >iptables -A FORWARD -i eth0 -p tcp --dport 80 -s 10.0.0.3 -j ACCEPT
> > >iptables -A FORWARD -i eth4 -p tcp --sport 80 -d 10.0.0.3 -j ACCEPT
> > >
> > >iptables -A FORWARD -t mangle -p tcp --dport 80 -s 10.0.0.3 -j MARK
> > >--set-mark 0x4
> > 
> > The routing decision is done before the FORWARDing chain is entered.
> > Try moving the MARK to INPUT.
> > 
> 
> The source traffic is not from the firewall machine, but another machine
> on the local LAN. The mark is being set properly and the traffic is
> routed out the eth4 interface correctly, so the mark logic is working.
> 
> 
> The setup is something like this:
> 
> 
> 
>                                 |    eth6|(196.7.34.98)<---->ISP1
> |PROXY|(10.0.0.3)<--->(10.0.0.2)|FIREWALL|
>                                 |    eth4|(10.1.0.2)<--->(10.1.0.1)ISP2
> 
> 
> ip route show table main
> 196.7.34.96/28 dev eth6  proto kernel  scope link  src 196.7.34.98
> 10.0.0.0/24 dev eth0  proto kernel  scope link  src 10.0.0.2
> 10.1.0.0/24 dev eth4  proto kernel  scope link  src 10.1.0.2
> 
> ip route show table 4
> default via 10.1.0.1 dev eth4
> 
> ip rule
> 0:      from all lookup local 
> 32000:  from all fwmark 0x4 lookup 4 
> 32766:  from all lookup main 
> 32767:  from all lookup default
> 
> 
> tcpdump -n -i eth4 shows my traffic exiting after being SNATed to
> 10.1.0.2 and reply traffic re-entering .
> 
> tcpdump -n -i eth0 src or dst 10.0.0.3 and port 80 shows my traffic
> exiting from the source (10.0.0.3), but nothing ever returns.
> 
> I have checked to make sure nothing is dropped, and also noticed that
> the 2 forwarding rules above only show traffic out from eth0, the return
> rule does not show any traffic. This is why I think the SNAT is not
> working correctly when the traffic comes back in.
> 
> My last option is to do the nat using iproute2 instead of iptables.
> My question is, why is SNAT working on the other 4 interfaces on this
> firewall, but not on this one?
> 
> 
> > >iptables -A POSTROUTING -t nat -o eth4 -p tcp --dport 80 -s 10.0.0.3 -j
> > >SNAT --to 10.1.0.2
> > >
> > >ip rule del fwmark 4 table 4 priority 32000
> > >ip route flush table 4
> > >ip route add table 4 default via 10.1.0.1
> > >ip rule add fwmark 4 table 4 priority 32000
> > >ip route flush cache
> > >
> > >
> > >What am I doing wrong?
> > >
> > >Looking in /proc/net/ip_conntrack I can find an entry for http traffic
> > >from machine at ip 10.0.0.3 created by the SNAT rule above. When the
> > >traffic returns back in eth4 it seems to disappear on the firewall ...
> > 
> > Jan
-- 
Raymond Leach
Knowledge Factory (http://www.knowledgefactory.co.za)
(Tel)+27-11-445-8100  (Fax)+27-11-445-8101
-- 
Raymond Leach
RCHQ Hobbies (http://www.rchq.co.za/)
(T)+27-82-575-6975 (F)+27-86-652-2773



^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: Multi ISP router/firewall ...
  2007-03-28 12:21       ` Ray Leach
@ 2007-03-28 17:15         ` Jan Engelhardt
  0 siblings, 0 replies; 8+ messages in thread
From: Jan Engelhardt @ 2007-03-28 17:15 UTC (permalink / raw)
  To: Ray Leach; +Cc: Netfilter


On Mar 28 2007 14:21, Ray Leach wrote:
>
>The problem was that reverse path filtering had to be enabled on the
>eth4 interface. All my other interfaces have reverse path filtering
>disabled, so what's the difference with this one?

I suspect something, hence please try

>> > >iptables -A FORWARD -i eth0 -p tcp --dport 80 -s 10.0.0.3 -j ACCEPT
>> > >iptables -A FORWARD -i eth4 -p tcp --sport 80 -d 10.0.0.3 -j ACCEPT
>> > >
>> > >iptables -A FORWARD -t mangle -p tcp --dport 80 -s 10.0.0.3 -j MARK
>> > >--set-mark 0x4

iptables -t mangle -A PREROUTING/FORWARD -i eth4 -p tcp --sport 80 -d 10.0.0.3
-j MARK --set-mark 0x4

with rp_filter=1 again.

I believe the reverse route stuff does not get it, because return packets are
not marked. Or, I'd also suggest

iptables -t mangle -A FORWARD -m conntrack --ctstate NEW
-s 10.0.0.3 -p tcp --dport 80 -j CONNMARK --set-mark 4;
iptables -t mangle -A FORWARD -j CONNMARK --restore-mark;

(Or use nat's PREROUTING for the initial CONNMARK - many ways of doing things)


Jan
-- 


^ permalink raw reply	[flat|nested] 8+ messages in thread

* Multi ISP router/firewall ...
@ 2007-03-27 12:52 Ray Leach
  0 siblings, 0 replies; 8+ messages in thread
From: Ray Leach @ 2007-03-27 12:52 UTC (permalink / raw)
  To: Netfilter

Hi All

I've been trying to configure a router/firewall with 5 zones (2 of which
are ISP links) unsuccessfully.

So far I've managed to patch the kernel with the ROUTE target, and I've
got rules as follows:

FORWARD chain filter table:
ACCEPT     0    --  ethxx0 eth4    10.0.0.0/24    0.0.0.0/0           
ACCEPT     0    --  eth4   ethxx0  0.0.0.0/0      10.0.0.0/24

FORWARD chain mangle table:
ROUTE      tcp  --  *      *       10.0.0.67    !192.168.1.0/24      tcp
dpts:80:90 ROUTE oif:eth4 continue


POSTROUTING chain nat table:
SNAT       0    --  *      eth4    0.0.0.0/0    0.0.0.0/0  to:10.1.0.2


ethxx0 is my internal LAN
eth4 is my 2nd ISP connection
10.0.0.67 is my workstation
10.1.0.2 is the ip bound to eth4

The other ISP link is working, we host around 12 websites on servers in
our DMZ, we have outgoing web browsing, email, MSN, etc. using various
nat rules for that interface, they all work.

I can see using tcpdump that the packets are leaving my workstation,
being mangles to change the route, going out the 2nd ISP link, coming
back into the 2nd ISP link, but then they disappear.

My forwarding rules as shown above do not show any traffic.

This has me stumped.

As I've stated, I have nat (both SNAT and DNAT) working on the other ISP
interface on the same machine.

Where should I start looking?

Regards

Ray
-- 
Raymond Leach
RCHQ Hobbies (http://www.rchq.co.za/)
(T)+27-82-575-6975 (F)+27-86-652-2773



^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2007-03-28 17:15 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2007-03-27 15:32 Multi ISP router/firewall Pierre JUHEN
2007-03-28  5:51 ` Ray Leach
2007-03-28  6:18   ` Jan Engelhardt
2007-03-28  6:43     ` Ray Leach
2007-03-28 11:42       ` Raymond Leach
2007-03-28 12:21       ` Ray Leach
2007-03-28 17:15         ` Jan Engelhardt
  -- strict thread matches above, loose matches on Subject: below --
2007-03-27 12:52 Ray Leach

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.