>> [EMAIL PROTECTED] wrote: >> >>> > Validating interfaces file... >>>> ERROR: The routeback option may not be specified on a multi-zone >>>> interface >>>> >>> > Does someone made a similar setup and can give a few tips ? >> >> You can setup routeback yourself, 'echo 1 > >> /proc/sys/net/ipv4/conf/<interface>/rp_filter' is the way to do it I >> think. You can also control most of the other settings in the >> shorewall interfaces file. >> >> It's also referenced in /etc/sysctl.conf but I don't actually know >> exactly when/how that file is used. >> >> http://www.linuxdocs.org/HOWTOs/Adv-Routing-HOWTO-12.html has some >> info on the control files. >>
I checked but in sysctl.conf and this is what i've found sysctl.conf(5) for more details. # Controls IP packet forwarding net.ipv4.ip_forward = 1 net.ipv4.conf.default.proxy_arp = 0 # Enables source route verification net.ipv4.conf.all.rp_filter = 1 net.ipv4.conf.default.send_redirects = 1 net.ipv4.conf.all.send_redirects = 0 # Controls source route verification net.ipv4.conf.default.rp_filter = 1 # Do not accept source routing net.ipv4.conf.default.accept_source_route = 0 # Controls the System Request debugging functionality of the kernel kernel.sysrq = 1 # Controls whether core dumps will append the PID to the core filename # Useful for debugging multi-threaded applications kernel.core_uses_pid = 1 # Controls the use of TCP syncookies net.ipv4.tcp_syncookies = 1 # Controls the maximum size of a message, in bytes kernel.msgmnb = 65536 # Controls the default maxmimum size of a mesage queue kernel.msgmax = 65536 # Controls the maximum shared segment size, in bytes kernel.shmmax = 4294967295 # Controls the maximum number of shared memory segments, in pages kernel.shmall = 268435456 It seems that rp_filter is all ready set and i checked it in the proc file also : cat /proc/sys/net/ipv4/conf/eth1/rp_filter 1 [EMAIL PROTECTED] etc]# Any hints on what could be wrong ? My shorewall files are configured like so: interfaces: #ZONE INTERFACE BROADCAST OPTIONS net eth0 82.76.51.255 - eth1 192.168.0.255,192.168.1.255,192.168.2.255 loc_v venet0 192.168.100.255 routeback hosts: #ZONE HOST(S) OPTIONS loc eth1:192.168.0.0/24 wox eth1:192.168.1.0/24 prg eth1:192.168.2.0/24 zones: #ZONE TYPE OPTIONS IN OUT # OPTIONS OPTIONS fw firewall net ipv4 loc ipv4 loc_v ipv4 wox ipv4 prg ipv4 masq: #INTERFACE SOURCE ADDRESS PROTO PORT(S) IPSEC eth0 eth1 eth0 venet0 eth0 eth1:1 eth0 eth1:2 policy: #SOURCE DEST POLICY LOG LIMIT:BURST # LEVEL fw net ACCEPT loc_v net ACCEPT loc fw ACCEPT loc_v fw ACCEPT loc loc_v ACCEPT loc_v loc ACCEPT fw loc ACCEPT fw loc_v ACCEPT #alte retele (alias-uri) wox net ACCEPT wox loc_v ACCEPT wox loc ACCEPT wox fw ACCEPT prg loc_v ACCEPT prg loc ACCEPT prg net ACCEPT prg fw ACCEPT loc wox ACCEPT loc_v wox ACCEPT loc prg ACCEPT loc_v prg ACCEPT fw wox ACCEPT fw prg ACCEPT #sfarsit alte retele net all REJECT all all REJECT rules: #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE USER/ # PORT(S) PORT(S) DEST LIMIT GROUP #SECTION ESTABLISHED #SECTION RELATED SECTION NEW # redirectionam toate request-urile primite pe portul 80 catre proxy DNAT loc loc_v:192.168.100.7:3128 tcp www - # acceptam conexiuni ssh din internet numai de la ip-ul meu ACCEPT net:86.124.248.188 fw tcp 22 # permitem accesul la mail ACCEPT loc net:85.9.58.105 tcp 25 ACCEPT loc net:85.9.58.105 tcp 110 ACCEPT loc net:85.9.58.105 tcp 143 ACCEPT loc:192.168.0.38 net tcp 443 ACCEPT loc net:212.146.105.119 tcp 21 ACCEPT wox loc:192.168.0.5 ACCEPT loc:192.168.0.5 wox ACCEPT loc:192.168.0.24 net tcp 5001 #REJECT fw net tcp 80 - Thank you for your patience ! ------------------------------------------------------------------------- This SF.net email is sponsored by DB2 Express Download DB2 Express C - the FREE version of DB2 express and take control of your XML. No limits. Just data. Click to get it now. http://sourceforge.net/powerbar/db2/ _______________________________________________ Shorewall-users mailing list Shorewall-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/shorewall-users