Who can share his opinion on this matter? Receiving *no answer at all* usually means one of 2 things: 1) extremely ignorant question, not even worth a lousy RTFM reply :-( 2) brilliant question, nobody ever came up with such a marvelous idea :-) I don't think it's 2), so if the answer is 1), then please enlighten me! Thanks in advance M. T. > -----Message d'origine----- > De : netfilter-admin@xxxxxxxxxxxxxxxxxxx > [mailto:netfilter-admin@xxxxxxxxxxxxxxxxxxx]De la part de Matthieu > Turpault > Envoyé : lundi 15 septembre 2003 12:28 > À : netfilter@xxxxxxxxxxxxxxxxxxx > Objet : ip_conntrack module, advanced routing and multiple ISP > > > Hi list, > > I have a firewall with 4 NIC: > - 3 interfaces connected to the net (eth2, eth3, eth5) by > 3 ISP; > - 1 interface connected to the internal network. > > eth2 is connected to a router (10.0.1.1) which does masquerading. > > Outcoming request (from the internal network to the net) are load > balanced to the 3 ISP (cf my configuration at the end of the mail). > > All incoming request from the net to internal network by port > http, pop3, imap, ftp, smtp, https are correctly routed. > > All outcoming request from the internal network to the net by > port http, pop3, imap are correctly routed. > > The problem is that I can't connect from the internal network to > a ftp server of the net. In fact, I can connect to a ftp server > of the net but the "ls" command failed the most of the time (1/3). > I use passive mode. > > Can you help me please ? > > Thanks in advance > > > If I add the route by the command > ip route add <@ftpServer> via <@GATEWAY_ISP2> > it is OK > > Here is my configuration (long but complete... I hope): > > > ============================================================= > Routing table and rules > ============================================================= > > [root@firewall firewall]# ip ru l > 0: from all lookup local > 32763: from all fwmark 3 lookup 212 > 32764: from all fwmark 2 lookup 211 > 32765: from all fwmark 1 lookup 210 > 32766: from all lookup main > 32767: from all lookup 253 > > -------------------------------------------------------------- > [root@firewall firewall]# ip route list > <@NETMASK_ISP2>/30 dev eth5 proto kernel scope link src <@ISP2> > 10.0.3.0/30 dev eth5 scope link > 10.0.1.0/24 dev eth2 scope link > 10.1.0.0/24 dev eth0 scope link > <@NETMASK_ISP3>/24 dev eth3 scope link > 127.0.0.0/8 dev lo scope link > default > nexthop via 10.0.1.1 dev eth2 weight 1 onlink > nexthop via <@GATEWAY_ISP2> dev eth5 weight 1 onlink > nexthop via <@GATEWAY_ISP3> dev eth3 weight 1 onlink > -------------------------------------------------------------- > [root@firewall firewall]# ip ro l t 210 > <@NETMASK_ISP2>/30 dev eth5 proto kernel scope link src <@ISP2> > 10.0.3.0/30 dev eth5 scope link > 10.0.1.0/24 dev eth2 scope link > 10.1.0.0/24 dev eth0 scope link > <@NETMASK_ISP3>/24 dev eth3 scope link > 127.0.0.0/8 dev lo scope link > default via 10.0.1.1 dev eth2 > --------------------------------------------------------------- > [root@firewall firewall]# ip ro l t 211 > <@NETMASK_ISP2>/30 dev eth5 proto kernel scope link src <@ISP2> > 10.0.3.0/30 dev eth5 scope link > 10.0.1.0/24 dev eth2 scope link > 10.1.0.0/24 dev eth0 scope link > <@NETMASK_ISP3>/24 dev eth3 scope link > 127.0.0.0/8 dev lo scope link > default via <@GATEWAY_ISP3> dev eth3 > ----------------------------------------------------------------- > [root@firewall firewall]# ip ro l t 212 > <@NETMASK_ISP2>/30 dev eth5 proto kernel scope link src <@ISP2> > 10.0.3.0/30 dev eth5 scope link > 10.0.1.0/24 dev eth2 scope link > 10.1.0.0/24 dev eth0 scope link > <@NETMASK_ISP3>/24 dev eth3 scope link > 127.0.0.0/8 dev lo scope link > default via <@GATEWAY_ISP2> dev eth5 > > ================================================================== > IPTABLES tables > ================================================================== > > [root@firewall firewall]# iptables -L -v -n -t nat > Chain PREROUTING (policy ACCEPT 531K packets, 34M bytes) > pkts bytes target prot opt in out source > destination > 4496 293K net_dnat all -- eth2 * 0.0.0.0/0 > 0.0.0.0/0 > 39294 1956K net_dnat all -- eth3 * 0.0.0.0/0 > 0.0.0.0/0 > 18601 1158K net_dnat all -- eth5 * 0.0.0.0/0 > 0.0.0.0/0 > > Chain POSTROUTING (policy ACCEPT 81932 packets, 4985K bytes) > pkts bytes target prot opt in out source > destination > 182K 9122K eth3_masq all -- * eth3 0.0.0.0/0 > 0.0.0.0/0 > 166K 8193K eth5_masq all -- * eth5 0.0.0.0/0 > 0.0.0.0/0 > > Chain OUTPUT (policy ACCEPT 32386 packets, 2508K bytes) > pkts bytes target prot opt in out source > destination > > Chain eth3_masq (1 references) > pkts bytes target prot opt in out source > destination > 159K 7823K MASQUERADE all -- * * 10.1.0.0/24 > 0.0.0.0/0 > > > Chain eth5_masq (1 references) > pkts bytes target prot opt in out source > destination > 159K 7825K MASQUERADE all -- * * 10.1.0.0/24 > 0.0.0.0/0 > > > Chain net_dnat (3 references) > (...) > ---------------------------------------------------------------- > > [root@firewall firewall]# iptables -L -v -n -t mangle > Chain PREROUTING (policy ACCEPT 4008K packets, 1940M bytes) > pkts bytes target prot opt in out source > destination > 2223 168K MARK tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp spt:21 MARK set 0x1 > 9364 3221K MARK tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp spt:20 MARK set 0x1 > 0 0 MARK udp -- * * 0.0.0.0/0 > 0.0.0.0/0 udp spt:21 MARK set 0x1 > 0 0 MARK udp -- * * 0.0.0.0/0 > 0.0.0.0/0 udp spt:20 MARK set 0x1 > 14916 1413K MARK all -- * * 0.0.0.0/0 > 0.0.0.0/0 ctorigdst <@ISP2> MARK set 0x3 > 72454 17M MARK all -- * * 0.0.0.0/0 > 0.0.0.0/0 ctorigdst <@ISP3> MARK set 0x2 > 94175 43M MARK all -- * * 0.0.0.0/0 > 0.0.0.0/0 ctorigdst 10.0.1.10 MARK set 0x1 > 4008K 1940M pretos all -- * * 0.0.0.0/0 > 0.0.0.0/0 > 1282 108K MARK all -- * * 0.0.0.0/0 > 0.0.0.0/0 ctorigsrc <@ISP2> MARK set 0x3 > 1327 112K MARK all -- * * 0.0.0.0/0 > 0.0.0.0/0 ctorigsrc <@ISP3> MARK set 0x2 > 65220 41M MARK all -- * * 0.0.0.0/0 > 0.0.0.0/0 ctorigsrc 10.1.0.10 MARK set 0x1 > > Chain INPUT (policy ACCEPT 154K packets, 16M bytes) > pkts bytes target prot opt in out source > destination > > Chain FORWARD (policy ACCEPT 3828K packets, 1923M bytes) > pkts bytes target prot opt in out source > destination > > Chain OUTPUT (policy ACCEPT 86903 packets, 5978K bytes) > pkts bytes target prot opt in out source > destination > 7587 402K MARK all -- * * <@ISP2> 0.0.0.0/0 > MARK set 0x3 > 24567 1440K MARK all -- * * <@ISP3> 0.0.0.0/0 > MARK set 0x2 > 5332 418K MARK all -- * * 10.0.1.10 > 0.0.0.0/0 MARK set 0x1 > 86903 5978K outtos all -- * * 0.0.0.0/0 > 0.0.0.0/0 > > Chain POSTROUTING (policy ACCEPT 3890K packets, 1927M bytes) > pkts bytes target prot opt in out source > destination > > Chain outtos (1 references) > pkts bytes target prot opt in out source > destination > 712 61690 TOS tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:22 TOS set 0x10 > 2708 438K TOS tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp spt:22 TOS set 0x10 > 8 320 TOS tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:21 TOS set 0x10 > 0 0 TOS tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp spt:21 TOS set 0x10 > 0 0 TOS tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp spt:20 TOS set 0x08 > 0 0 TOS tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:20 TOS set 0x08 > > Chain pretos (1 references) > pkts bytes target prot opt in out source > destination > 22272 1209K TOS tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:22 TOS set 0x10 > 19801 8705K TOS tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp spt:22 TOS set 0x10 > 2140 112K TOS tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:21 TOS set 0x10 > 2223 168K TOS tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp spt:21 TOS set 0x10 > 9364 3221K TOS tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp spt:20 TOS set 0x08 > 8865 7140K TOS tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:20 TOS set 0x08 > > =============================================================== > LOADED MODULES > =============================================================== > > [root@firewall firewall]# lsmod > Module Size Used by Not tainted > nls_iso8859-15 4060 0 (autoclean) > isofs 28856 0 (autoclean) > zlib_inflate 21764 0 (autoclean) [isofs] > vfat 12204 0 (autoclean) > fat 38072 0 (autoclean) [vfat] > ide-cd 33860 0 (autoclean) > cdrom 32736 0 (autoclean) [ide-cd] > ipt_MARK 1336 13 (autoclean) > ipt_conntrack 1528 6 (autoclean) > ipt_TOS 1592 12 (autoclean) > ipt_MASQUERADE 2200 20 (autoclean) > ipt_LOG 4312 11 (autoclean) > ipt_REJECT 3768 4 (autoclean) > ipt_state 1048 71 (autoclean) > iptable_mangle 2712 1 (autoclean) > ip_nat_irc 3472 0 (unused) > ip_nat_ftp 4240 0 (unused) > iptable_nat 21894 3 [ipt_MASQUERADE ip_nat_irc ip_nat_ftp] > ip_conntrack_irc 4400 1 [ip_nat_irc] > ip_conntrack_ftp 5424 1 [ip_nat_ftp] > ip_conntrack 28864 5 [ipt_conntrack ipt_MASQUERADE ipt_state > ip_nat_irc ip_nat_ftp iptable_nat ip_conntrack_irc ip_conntrack_ftp] > iptable_filter 2348 1 (autoclean) > ip_tables 15424 12 [ipt_MARK ipt_conntrack ipt_TOS > ipt_MASQUERADE ipt_LOG ipt_REJECT ipt_state iptable_mangle iptable_nat > iptable_filter] > af_packet 16328 1 (autoclean) > sundance 16224 3 (autoclean) > eepro100 22228 2 (autoclean) > mii 3980 0 (autoclean) [sundance eepro100] > usb-uhci 26128 0 (unused) > usbcore 77324 1 [usb-uhci] > rtc 8776 0 (autoclean) > reiserfs 183540 5 > > > >