bruce wrote: > > Hi, > > I am involving in firewall development. I have one problem with bandwidth > management (filtering by "fw" option) and loadbalancing(using ROUTE patch) > coming together. > > Configuration is linux redhat kernal 2.4.27 and iptables v1.2.11 > > Testing set up is follows > > 192.168.2.12 (source)-------> > 192.168.2.182(FW on eth0) > [aliases 192.168.8.1(eth1),192.168.9.1(eth2)] > ------->192.168.9.2(Router)[aliases 192.168.8.2, 202.54.1.4] > ------------>202.54.1.5(destination) > I am not sure about this but lets have a go..... The chains will be processed in the order Forward Postrouting Mangle Postrouting NAT > Rules > ========== > # filtering rules > /sbin/iptables -A FORWARD -p tcp -s 192.168.2.0/24 --sport 1024:65535 -d > 202.54.1.5 --dport 80 -j ACCEPT > /sbin/iptables -A FORWARD -p tcp -s 202.54.1.5 --sport 80 -d 192.168.2.0/24 > --dport 1024:65535 -j ACCEPT > > # marking rule for packets > /sbin/iptables -A POSTROUTING -t mangle -o eth0 -p tcp -s 202.54.1.5 --sport > 80 -d 192.168.2.0/24 --dport 1024:65535 -j MARK --set-mark 0x41 > /sbin/iptables -A POSTROUTING -t mangle -o eth2 -p tcp -s 192.168.2.0/24 > --sport 1024:65535 -d 202.54.1.5 --dport 80 -j MARK --set-mark 0x40 > > # loadbalancing rules > /sbin/iptables -A POSTROUTING -t mangle -p tcp -s 192.168.2.0/24 --sport > 1024:65535 -d 202.54.1.5 --dport 80 -m random --average 50 -j ROUTE --oif eth2 > /sbin/iptables -A POSTROUTING -t mangle -p tcp -s 192.168.2.0/24 --sport > 1024:65535 -d 202.54.1.5 --dport 80 -j ROUTE --oif eth1 > Now the notes on route at http://www.netfilter.org/documentation/HOWTO//netfilter-extensions-HOWTO-4.html#ss4.5 Say that :- ---------------------------------------------------- This patch by Cédric de Launois <delaunois@xxxxxxxxxxxxxx> adds a new target which allows you to setup unusual routes not supported by the standard kernel routing table. The ROUTE target lets you route a received packet through an interface or towards a host, even if the regular destination of the packet is the router itself. The ROUTE target is also able to change the incoming interface of a packet. Packets are directly put on the wire and do not traverse any other table. This target does not modify the packets and is a final target. It has to be used inside the mangle table. Whenever possible, you should use the MARK target together with iproute2 instead of this ROUTE target. However, this target is useful to force the use of an interface or a next hop and to change the incoming interface of a packet. People also use it for easiness and to simplify their rules (one rule to route a packet is easier that one MARK rule + one iproute2 rule). ----------------------------------------------------- If packets are put direct to the wire they will never reach this rule. :-( > #nat rule for natting on external interface of firewall > /sbin/iptables -t nat -A POSTROUTING -o eth2 -p tcp -s 192.168.2.0/24 --sport > 1024:65535 -d 202.54.1.5 --dport 80 -j SNAT --to-source 192.168.9.1 > It may pay to follow Cédric de Launois's advice and have a look at http://www.tldp.org/HOWTO/Adv-Routing-HOWTO/lartc.loadshare.html > # delete all existing qdisc > /sbin/tc qdisc del dev eth0 root 2>/dev/null > /sbin/tc qdisc del dev eth1 root 2>/dev/null > /sbin/tc qdisc del dev eth2 root 2>/dev/null > > # create parent qdisc > /sbin/tc qdisc add dev eth1 root handle 2:0 cbq bandwidth 10mbps avpkt 1000 > cell 8 > /sbin/tc qdisc add dev eth0 root handle 1:0 cbq bandwidth 10mbps avpkt 1000 > cell 8 > /sbin/tc qdisc add dev eth2 root handle 3:0 cbq bandwidth 10mbps avpkt 1000 > cell 8 > > #class for eth2 > /sbin/tc class add dev eth2 parent 3:0 classid 3:1 cbq bandwidth 1000kbps > rate 1000kbps allot 1514 cell 8 avpkt 1000 > /sbin/tc qdisc add dev eth2 parent 3:1 handle 100: sfq > /sbin/tc filter add dev eth2 protocol ip parent 3:0 handle 0x40 fw classid 3:1 > > #class for eth0 > /sbin/tc class add dev eth0 parent 1:0 classid 1:1 cbq bandwidth > 1000kbps > rate 1000kbps allot 1514 cell 8 avpkt 1000 > /sbin/tc qdisc add dev eth0 parent 1:1 handle 101: sfq > /sbin/tc filter add dev eth0 protocol ip parent 1:0 handle 0x41 fw classid 1:1 > > The firewall routing table is > Destination Gateway Genmask Flags MSS Window irtt Iface > 192.168.2.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 > 192.168.9.0 0.0.0.0 255.255.255.0 U 0 0 0 eth2 > 192.168.8.0 0.0.0.0 255.255.255.0 U 0 0 0 eth1 > 169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth2 > 127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo > 0.0.0.0 192.168.8.2 0.0.0.0 UG 0 0 0 eth1 > > The program is to get http page from 202.54.1.5 , accessing from > 192.168.2.12. I am getting http page > > But the problems are > 1. natting is not working(ie on 202.54.1.5, it showing that the request came > from 192.168.2.12) > 2. The packets are not passing through the class(3:1) on eth2 device. > But it is passsing through eth0 > > #/sbin/tc -s class show dev eth2 > class cbq 3: root rate 80Mbit (bounded,isolated) prio no-transmit > Sent 1137 bytes 10 pkts (dropped 0, overlimits 0) > borrowed 0 overactions 0 avgidle 77 undertime 0 > class cbq 3:1 parent 3: leaf 100: rate 8000Kbit prio no-transmit > Sent 0 bytes 0 pkts (dropped 0, overlimits 0) > borrowed 0 overactions 0 avgidle 0 undertime 0 > > #/sbin/tc -s class show dev eth0 THIS IS OK > class cbq 1: root rate 80Mbit (bounded,isolated) prio no-transmit > Sent 13410 bytes 58 pkts (dropped 0, overlimits 0) > borrowed 6 overactions 0 avgidle 77 undertime 0 > class cbq 1:1 parent 1: leaf 101: rate 8000Kbit prio no-transmit > Sent 7728 bytes 17 pkts (dropped 0, overlimits 0) > borrowed 6 overactions 0 avgidle 77 undertime 0 > > > Note: > ========= > SNAT with bandwith management is working properly. Also loadbalancing with > SNAT is working properly. > > Doubts > ======== > I have doubts that any mismatching of target rules -j MARK and -j ROUTE > in mangle table? > Is there any importance of target rules order. ie. first MARK then ROUTE > > > > if anybody have a solution please help me > > THANKS IN ADVANCE > Bruce -- J. David Rye http://www.roadrunner.uk.com http://www.rha.org.uk mailto://hostman@xxxxxxxxxxxxxxxxxxxxxx