Mike Lander wrote:
> I am building a shorewall box that the last post has the SSH error and
> wanted
> some feedback from the list if possible. At first I thought the two ISP's
> I
> building this
> for had two T-1's with FQ ip's as it. I have the box built for this ready
> to
> go.
> Now I find out that one of the T-1's is non-routed with 5 useable ips
> /29--Good
> the other T-1 is natted in using one of the local lan Ip's. Both full
> T-1's-----Not so Good
> The Idea is to load balance and route specific stuff like mail etc:
> The second ISP will NOT give me a FQ ip. Shorewall fits the bill
> perfect for this need.
> Currently the network is using routeback and static routes
> to route specific traffic to the natted ISP gateway. The only solution I
> could
> think of was, I asked the ISP if they could change the currently
> natted gateway (lan ip on internal) to a different Class 3 IP such as
> 10.15.75.1
> then I could configure my second ISP to the same network
> 10.15.75.2 and track and balance the routes.
> Now would there be a better way to do this and leave the
> Natted ISP with the same IP as the lan (loc) if ??
I'd really need to see the routing tables and route rules from a
shorewall dump to have a better understanding of your layout. Having
said that, when you use the providers file, there will be a host route
to that isp's gateway created in that isp's routing table, which should
override any network route using that address space. In short it should
work without changing any addressing, I have that running now:
Table LOC:
10.3.0.1 dev eth0 scope link src 10.3.0.75 <<==host route to gateway=
10.3.0.0/24 dev eth0 proto kernel scope link src 10.3.0.75
default via 10.3.0.1 dev eth0
Table SHAW:
24.78.192.1 dev eth1 scope link src 24.78.192.197
10.3.0.0/24 dev eth0 proto kernel scope link src 10.3.0.75
24.78.192.0/23 dev eth1 proto kernel scope link src 24.78.192.197
169.254.0.0/16 dev eth1 scope link
default via 24.78.192.1 dev eth1
Table main:
10.3.0.0/24 dev eth0 proto kernel scope link src 10.3.0.75
24.78.192.0/23 dev eth1 proto kernel scope link src 24.78.192.197
169.254.0.0/16 dev eth1 scope link
default
nexthop via 24.78.192.1 dev eth1 weight 1
nexthop via 10.3.0.1 dev eth0 weight 1
So any thing that uses the "loc" addressing would hit this route rule:
20256: from 10.3.0.75 lookup LOC
and then use the LOC routing table where there is the host route to the
gateway. Having 1 (like me, I trust my loc zone) or 2 interfaces (much
safer, I had that setup too, till the nic died, too lazy to change it.)
for that address space should not matter, as long as that host route is
present, the traffic *should* find the gateway. There might be other
things that I had to do to pull this off, but I just can't recall what,
if any, at the moment.
< Just saw Tom's post, I don't type or copy&paste that fast...>
Just because I have this working doesn't diminish Tom's warning about
routing/ARP hell, (Think my fire is out now, it been a couple of years
;) ) you have been warned...
Think I had to use a /32 mask on the nic that was connected to the
gateway in the 2 interface setup, so there would be no network route
present for it, just the above host route to the gateway.
Hope it helps,
Jerry
I Have this setup as Jerry suggested above
and I am not sure How to masqerade the
loc isp. Also it is not clear to
me which interface (nic) Jerry is
reffering to apply a /32 mask on.
also posted routing below
Here is the config I have now?
/etc/shorewall providers
loc 1 256 main eth1 10.194.79.254 track,balance eth1
atg 2 512 main eth0 66.224.62.97 track,balance eth1
/etc/shorewall/masq
eth0 10.194.79.181 66.224.62.120
eth1 66.224.62.120 10.194.79.181
eth0 eth1 66.224.62.120
eth1 eth1 10.194.79.181
ns5:~ # shorewall show routing
Can't determine the IP address of eth2
Shorewall 4.0.2 Routing at ns5 - Fri Aug 31 12:32:42 PDT 2007
Routing Rules
0: from all lookup local
10256: from all fwmark 0x100 lookup loc
10512: from all fwmark 0x200 lookup atg
32766: from all lookup main
32767: from all lookup default
Table atg:
66.224.62.97 dev eth0 scope link src 66.224.62.120
10.194.79.0/24 dev eth1 proto kernel scope link src 10.194.79.181
default via 66.224.62.97 dev eth0
Table default:
Table loc:
10.194.79.254 dev eth1 scope link src 10.194.79.181
10.194.79.0/24 dev eth1 proto kernel scope link src 10.194.79.181
default via 10.194.79.254 dev eth1
Table local:
broadcast 127.255.255.255 dev lo proto kernel scope link src 127.0.0.1
broadcast 66.224.62.96 dev eth0 proto kernel scope link src 66.224.62.120
broadcast 10.194.79.0 dev eth1 proto kernel scope link src 10.194.79.181
local 10.194.79.181 dev eth1 proto kernel scope host src 10.194.79.181
local 66.224.62.120 dev eth0 proto kernel scope host src 66.224.62.120
broadcast 66.224.62.127 dev eth0 proto kernel scope link src
66.224.62.120
broadcast 10.194.79.255 dev eth1 proto kernel scope link src
10.194.79.181
broadcast 127.0.0.0 dev lo proto kernel scope link src 127.0.0.1
local 127.0.0.1 dev lo proto kernel scope host src 127.0.0.1
local 127.0.0.0/8 dev lo proto kernel scope host src 127.0.0.1
Table main:
66.224.62.96/27 dev eth0 proto kernel scope link src 66.224.62.120
10.194.79.0/24 dev eth1 proto kernel scope link src 10.194.79.181
169.254.0.0/16 dev eth0 scope link
127.0.0.0/8 dev lo scope link
default
nexthop via 10.194.79.254 dev eth1 weight 1
nexthop via 66.224.62.97 dev eth0 weight 1
ns5:~ #
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users