Re: proxy arp problems... continued... :(

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Well after the holidays I finally managed to test this setup properly. 
Unfortunately the results were less then encouraging. :(

The problem before seemed to be the proxy arp responding to arp requests 
with the MAC address of the wrong interface. (most likely because of the 
physical network layout) So I plugged our ADSL modem directly in to the 
firewall, then our local hub in to the second interface in the firewall 
(how it should be). Enabled proxy arp for all interfaces, and ip 
forwarding, then I watched the arp cache as I tried to ping different IPs.

Before I even got a chance to ping the different IPs though, the arp cache 
was filling up with entries such as:

[ETH0 is local, ETH1 is internet]

? (207.102.201.187) at 00:60:94:D7:B6:9F [ether] on eth0
? (207.102.201.188) at 00:50:BF:0F:AB:54 [ether] on eth0
? (207.102.201.190) at 00:C0:49:17:0E:A5 [ether] on eth1
? (207.102.201.169) at 00:50:BF:0F:B2:0B [ether] on eth0
? (207.102.201.174) at <incomplete> [ether] on eth0
? (207.102.201.164) at 00:50:BF:06:4F:A6 [ether] on eth0

When I did try pinging an IP, from the inside, or over the internet I would 
see the IP in the arp cache, but the MAC address was _always_ different, 
and sometimes would show "incomplete". I was under the impression with 
proxy arp, that the firewall would respond with the MAC address from its 
external interface to all IPs matching the subnet? (all 207.102.201. IPs 
matching 255.255.255.224?) So at the very least the packets would get to 
the firewall so they can be handled by a magical IPTable rule?

If this was working properly wouldn't the arp cache look something like this:

MAC address of the internet interface in the firewall: 00:c0:35:h7:0h:55

? (207.102.201.187) at 00:c0:35:h7:0h:55 [ether] on eth1
? (207.102.201.188) at 00:c0:35:h7:0h:55 [ether] on eth1
? (207.102.201.169) at 00:c0:35:h7:0h:55 [ether] on eth1
? (207.102.201.174) at 00:c0:35:h7:0h:55 [ether] on eth1
? (207.102.201.164) at 00:c0:35:h7:0h:55 [ether] on eth1


Heres my routing table:

Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
207.102.201.160 *               255.255.255.224 U     0      0        0 eth1
192.168.0.0     *               255.255.255.0   U     0      0        0 eth0
127.0.0.0       *               255.0.0.0       U     0      0        0 lo
default         207.102.201.19 0 0.0.0.0         UG    0      0        0 eth1


I'm pretty much shooting in the dark here, and I'm not even sure if I fully 
understand this entire concept with proxy arp. A step by step howto sure 
would be nice, it seems most of the Firewall-HOWTO or IPMasq-HOWTO just 
touch on the basic concept, but don't go in to much detail.

To me if I IP-aliased each IP on the firewall, some fancy IPTable rules 
should be able to take care of the rest. I've had this working but 
unfortunately netmeeting only works for sending, not receiving voice. 
Everything else seems to work top notch, but allowing netmeeting to all 30 
computers is the whole point of this firewall. ;)

Any help would be greatly appreciated. Thanks.


At 07:01 AM 12/21/00 +0000, you wrote:

>Mike Benoit wrote:
>
> > Maybe I'm misinformed, will a setup such as this even work?
> >
> > I had the machine strangely plugged in to the network when I did my
> > testing, so its quite possible that it was using the internal network. 
> Even
> > though the test client had an external IP from which I was testing. But
> > will this work from the external interface?
> >
> > My understanding is that the firewall will reply to arp requests for each
> > (30) external IP address we have with its own MAC address, thus tricking
> > computers on the internet in to sending packets destined for any of our
> > external IPs to our firewall. From there the firewall can route the 
> packets
> > to each client behind it with little difficulty?
>
>Note that:
>
>1. The firewall's routing tables must be correct with regard to the
>destination IP address.
>
>2. The source and destination must be on opposite sides of the
>firewall in order for the firewall to be able to do anything about it.
>
> > Does this sound plausible to you? Or do you know of a better way to 
> setup a
> > firewall that wont cause problems with such applications like netmeeting?
> > Thanks.
>
>Also note that you can usually[1] do without proxy-ARP; it just means that you
>have to propagate more complex routing information.
>
>[1] but not if you have a host whose routing table can't be changed
>(e.g. an ISP-supplied router).
>
>--
>Glynn Clements <glynn@sensei.co.uk>
>-
>: send the line "unsubscribe linux-net" in
>the body of a message to majordomo@vger.kernel.org

-
: send the line "unsubscribe linux-net" in
the body of a message to majordomo@vger.kernel.org


[Index of Archives]     [Netdev]     [Ethernet Bridging]     [Linux 802.1Q VLAN]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Git]     [Bugtraq]     [Yosemite News and Information]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux PCI]     [Linux Admin]     [Samba]

  Powered by Linux