Re: problem with (incorrectly?) INVALID packets

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wednesday 13 December 2006 23:27, Grant Taylor wrote:
> How can a system on the 90.1 network use a default gateway on the 81.1
> network?  IMHO the two can not communicate with out some intermediary
> gateway.

You are indeed right, LFW which has only 90.1 IPs cannot talk to the SDSL 
router at 81...49, this is the purpose of the machine called "bridge" it is 
the intermediary, and why br2 on bridge has a 90 and 81 IP address, so it can 
route to both networks.

> So, br2 on bridge has multiple IPs assigned to it, 81.1 and 90.1?

Yep. It is the place the SDSL router routes 90.../27 to, it's also the default 
gateway for anything purely on 90.../27, as they can't reach the SDSL router 
directly.
It's not pretty, but it works kinda, and it's only a temporary thing to get 
this new system tested before rollout.

> Likewise, br0 on LFW has multiple 90.1 IPs assigned to it?

Yep. LFW is the hardware our production systems will be behind. It's purpose 
is to NAT things from public IPs to the private IPs the servers have behind 
it (lots of SSL webserving).
(LFW is also a HA failover pair, each with their own unique 90.1 address)

> > I'd love some suggestions on how to make it right :)
>
> Think basic routing.  Put a route to your 90.1 network via the 81.1.7.59
> router on your 81.1.7.49 router.  This will allow simple packets pass
> back and forth presuming that there is no firewalling in the way.

The SDSL router has that.

> If you don't want to put a route, you will need to NAT your 90.1 network
> to appear to be from an 81.1 IP address.

Unfortunantly if it were that simple, I'd just put all this new kit on our 
0.0/24 internal network.

> Ok...  Is the "... from here to there ..." that you are speaking about
> based on interface, or IP address, or both interface and IP address?

IP addresses only.

> > Hmm, which suggests they aren't being tracked properly... And after some
> > investigation traffic going to any of the VPN networks from 136.0/24
> > aren't being conntrack'd, whereas on the other firewalls I run they are
> > (i.e. the VPN between 0.0/24 and 30.0/24). Is there any peculiar about
> > conntrack'ing packets over/out a bridge?
>
> Not per say if you are using the bridge virtual interface as a network
> interface.  If you are using the bridge as a bridge and passing the
> packets through it, you may have something in place that will block it.
>   See my post with a subject of "A word about bridging to the wise...".

It was being used as a network interface, traffic was being routed out of it. 
Traffic to the internet got SNATd, traffic to other VPN networks allowed to 
pass without modification.

Routing table now:
# route -n 
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
90.1...1.64    0.0.0.0         255.255.255.224 U     0      0        0 bond0
192.168.131.0   0.0.0.0         255.255.255.0   U     0      0        0 bond1
192.168.22.0    90.1...1.69    255.255.255.0   UG    0      0        0 bond0
192.168.128.0   0.0.0.0         255.255.255.0   U     0      0        0 bond3
192.168.0.0     90.1...1.69    255.255.255.0   UG    0      0        0 bond0
192.168.30.0    90.1...1.69    255.255.255.0   UG    0      0        0 bond0
192.168.136.0   0.0.0.0         255.255.255.0   U     0      0        0 bond2
127.0.0.0       0.0.0.0         255.0.0.0       U     0      0        0 lo
0.0.0.0         90.1...1.69    0.0.0.0         UG    0      0        0 bond0

Routing table previously:
# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
90.1...1.64    0.0.0.0         255.255.255.224 U     0      0        0 br0
192.168.131.0   0.0.0.0         255.255.255.0   U     0      0        0 bond1
192.168.22.0    90.1...1.69    255.255.255.0   UG    0      0        0 br0
192.168.128.0   0.0.0.0         255.255.255.0   U     0      0        0 bond3
192.168.0.0     90.1...1.69    255.255.255.0   UG    0      0        0 br0
192.168.30.0    90.1...1.69    255.255.255.0   UG    0      0        0 br0
192.168.136.0   0.0.0.0         255.255.255.0   U     0      0        0 bond2
127.0.0.0       0.0.0.0         255.0.0.0       U     0      0        0 lo
0.0.0.0         90.1...1.69    0.0.0.0         UG    1000   0        0 br0

# uname -r
2.6.17-hardened-r1
# zgrep BRIDGE_NETFILTER /proc/config.gz
CONFIG_BRIDGE_NETFILTER=y

-- 
Mike Williams


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux