Jerry Vonau wrote:


OK, for those of us that are playing along at home ;-), to condense the
thought, what we(?) would be looking at is a single "bal" table that has
the default routes. The routing rules needed would point to the "main"
routing table for the routes that would be "local" to the box (invert
the logic, ie: ip rule to 10.3.0.10/24 lookup table main), while the
routes via an isp that are "external" to the box would be directed to
the "bal" (default?) table, (ie: ip rule to 0.0.0.0/0 lookup table bal),
with the "ip rules" ordering winning the table race.

Exactly.

I wonder if that
is what the stock blank "default" table is meant for? (vpn routes would
be considered local here).

I suspect so.

I like this, it *should* work kind of like
the squid routing, point to a gateway(s) and the rest should just fall
into line(with the routing rules in place), with much less code perhaps.
Have you thought about what the routing rules might look like in this
setup?

Attached is a copy of what I have running currently.

-Tom
--
Tom Eastep    \ Nothing is foolproof to a sufficiently talented fool
Shoreline,     \ http://shorewall.net
Washington USA  \ [EMAIL PROTECTED]
PGP Public Key   \ https://lists.shorewall.net/teastep.pgp.key
Shorewall 4.2.0-Beta2 Routing at ursa - Tue Jul  1 11:16:01 PDT 2008


Routing Rules

0:      from all lookup local 
32766:  from all lookup main 
35000:  from all to 206.124.146.179 lookup linksys 
40000:  from all fwmark 0x1 lookup linksys 
40001:  from all fwmark 0x2 lookup shorewall 
50000:  from 172.20.1.102 lookup linksys 
50256:  from 192.168.1.5 lookup shorewall 
65535:  from all lookup default 

Table default:

default 
        nexthop via 172.20.1.1  dev wlan0 weight 1
        nexthop via 192.168.1.254  dev eth0 weight 2

Table linksys:

172.20.1.1 dev wlan0  scope link  src 172.20.1.102 
default via 172.20.1.1 dev wlan0  src 172.20.1.102 

Table local:

local 172.20.1.102 dev wlan0  proto kernel  scope host  src 172.20.1.102 
local 192.168.0.254 dev br0  proto kernel  scope host  src 192.168.0.254 
broadcast 192.168.1.0 dev eth0  proto kernel  scope link  src 192.168.1.5 
broadcast 192.168.0.255 dev br0  proto kernel  scope link  src 192.168.0.254 
broadcast 127.255.255.255 dev lo  proto kernel  scope link  src 127.0.0.1 
local 192.168.1.5 dev eth0  proto kernel  scope host  src 192.168.1.5 
broadcast 172.20.1.0 dev wlan0  proto kernel  scope link  src 172.20.1.102 
broadcast 192.168.1.255 dev eth0  proto kernel  scope link  src 192.168.1.5 
broadcast 192.168.0.0 dev br0  proto kernel  scope link  src 192.168.0.254 
broadcast 172.20.1.255 dev wlan0  proto kernel  scope link  src 172.20.1.102 
broadcast 127.0.0.0 dev lo  proto kernel  scope link  src 127.0.0.1 
local 127.0.0.1 dev lo  proto kernel  scope host  src 127.0.0.1 
local 127.0.0.0/8 dev lo  proto kernel  scope host  src 127.0.0.1 

Table main:

192.168.1.0/24 dev eth0  proto kernel  scope link  src 192.168.1.5 
172.20.1.0/24 dev wlan0  proto kernel  scope link  src 172.20.1.102 
192.168.0.0/24 dev br0  proto kernel  scope link  src 192.168.0.254 
169.254.0.0/16 dev wlan0  scope link 
127.0.0.0/8 dev lo  scope link 

Table shorewall:

192.168.1.254 dev eth0  scope link  src 192.168.1.5 
default via 192.168.1.254 dev eth0  src 192.168.1.5 

Attachment: signature.asc
Description: OpenPGP digital signature

-------------------------------------------------------------------------
Sponsored by: SourceForge.net Community Choice Awards: VOTE NOW!
Studies have shown that voting for your favorite open source project,
along with a healthy diet, reduces your potential for chronic lameness
and boredom. Vote Now at http://www.sourceforge.net/community/cca08
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to