Re: QoS and IPSec...

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Grant Taylor schrieb:
Hi, I have what to me is an interesting issue. I am wanting to prioritize (QoS) traffic that will be passing through an IPSec (OpenS/WAN) VPN between two (identical) Linux routers. I know that I can apply the IPSec patches (1-4) to the kernel and IPTables (if they are not already applied by now) filter traffic before and after IPSec encapsulation. My problem is that I don't know if I will be able to QoS the traffic that will be encapsulated as far as I know QoS prioritization (via CBQ or HTB) only applies to traffic that is being dequeue from the skbuffers to go out the physical interface. In my mind the traffic that is to be encapsulated does not ""go out a physical interface to be dequeued in the order that I want to prioritize. I know that I can QoS IPSec VPN traffic (IP/ESP) to a higher priority than any other IP traffic but I'm not sure about the traffic that is being encapsulated. My (very) rough idea is to use something like dummy net or IMQ to provide an interface (or subnet if need be) that the traffic will traverse and be dequeued from where I can apply the QoS that I want to. I'm not quite sure how to go about this so any advice would be greatly appreciated.

I would like to QoS / Prioritize LAN traffic that is destined to the other LAN based on the type of traffic that it is (ICMP, RDP, RFB, SMB, etc) before it is encapsulated. Once the traffic has been encapsulated I'd like to QoS / Prioritize the ESP traffic that is destined to the other LAN's globally routable IP before any other internet traffic goes out. This later part is not the problem, just the former part.

My network layout(s) are below for those of you that will be asking:

Lan A:
- 172.30.12.x/24 subnet
- 172.30.12.1-250 client systems and the likes
- 172.30.12.254 is the default gateway which will be replaced by one of the boxen I'm asking about.
- A.B.C.Z/24 globally routable IP on the router

Lan B:
- 172.30.13.x/24 subnet
- 172.30.13.1-250 client systems and the likes
- 172.30.13.254 is the default gateway which will be replaced by one of the boxen I'm asking about.
- A.B.C.Y/24 globally routable IP on the router

VPN:
- The VPN in question will be between the A.B.C.Z and A.B.C.Y globally routable IP addresses.

Note that both LANs have a DSL circuit from the same provider and thus are 1 IP off from each other on their globally routable IP.


Grant. . . .

P.S. I'm (cross) posting this to the NetFilter mail lists as I've seen some very complex questions and answers on the LARTC and NetFilter mail lists and I would like to pull from both pools of talent. So be mindful when replying to all. ;)


What about this (only for one side ;) ):
Suppose we are on LAN A:
In the table mangle chain PREROUTING mark all packets coming in over the LAN device and destined for 172.30.13.0/24 and sourced from 172.30.12.0/24 for example with 1.
Then IPSec handles the packets.
In table mangle chain POSTROUTING mark all packets with AH/ESP outgoing over the internet device and destined for the routable IP of LAN B with 1. Don't know if they are marked twice with 1 but that's no problem. So we can be sure all IPSec packets are marked with 1. Then you can apply the filters in the schedulers for the appropriate marks on the appropriate device in this case the internet device.
So we can prioritize outgoing packets.
Incoming should also be prioritized. So both directions get their priorities. So in table mangle chain PREROUTING mark all AH/ESP packets coming in over the internet device and sourced from the routable IP of LAN B with 1.
Then IPSec handles the packets.
In table mangle chain POSTROUTING mark all packets destinded for 172.30.12.0/24 and sourced from 172.30.12.0/24 and going out over the LAN device with 1.
Then apply the filters for the marks in the schedulers of the LAN device.
This way IPSec should be prioritized in both directions on one router. If it works you can do it with canged addresses on the other one. Don't know if it really works, because it's now 3am and I'm a bit confused and IPSec is already complex standalone ;). But afaik every net device gets schedulers no matter if physical or virtual so it normally should be no problem.





[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux