Re: iptables + mangle for vlan not working

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Guys

I working w/ iptables + iproute + balance and in one of our client w/
it's using VLAN every time that I start both links all vlan stop
working.

Debian Lenny w/ kernel 2.6.26-2-686-bigmem 
iptables  	1.4.2-6 
iproute 	20080725-2 


just a small picture to clarify:


	wan1 - eth1    wan2 - eth2
		|      |

               firewall -------------------dmz - eth5
		|
	  lan ( bond0) eth0 and eth4
		10.0.0.2/24
		|
		|
	switch core
		|
		|

VLAN 10.0.1.0/24 10.0.2.0/24 10.0.2.0/24


After reading, googling and testing I discover that any time that both
links come w/ rule below VLAN stop passing though firewall

-------cut------------

Chain PREROUTING (policy ACCEPT 458 packets, 41906 bytes)
 pkts bytes target     prot opt in     out     source
destination
  231 17763 CONNMARK   all  --  eth1   *       0.0.0.0/0
0.0.0.0/0           CONNMARK restore
    0     0 MARK       all  --  eth1   *       0.0.0.0/0
0.0.0.0/0           mark match 0x0 state NEW MARK xset 0x1/0xffffffff
  231 17763 CONNMARK   all  --  eth1   *       0.0.0.0/0
0.0.0.0/0           CONNMARK save
   16  3135 CONNMARK   all  --  eth2   *       0.0.0.0/0
0.0.0.0/0           CONNMARK restore
    0     0 MARK       all  --  eth2   *       0.0.0.0/0
0.0.0.0/0           mark match 0x0 state NEW MARK xset 0x2/0xffffffff
   16  3135 CONNMARK   all  --  eth2   *       0.0.0.0/0
0.0.0.0/0           CONNMARK save
  108  8813 CONNMARK   all  --  bond0  *       0.0.0.0/0
0.0.0.0/0           CONNMARK restore
    3   444 CONNMARK   all  --  eth3   *       0.0.0.0/0
0.0.0.0/0           CONNMARK restore
   13   632 CONNMARK   all  --  bond0  *       0.0.0.0/0
0.0.0.0/0           mark match !0x0 CONNMARK save
    0     0 CONNMARK   all  --  eth3   *       0.0.0.0/0
0.0.0.0/0           mark match !0x0 CONNMARK save

Chain INPUT (policy ACCEPT 336 packets, 34819 bytes)
 pkts bytes target     prot opt in     out     source
destination

Chain FORWARD (policy ACCEPT 118 packets, 6863 bytes)
 pkts bytes target     prot opt in     out     source
destination
   59  3257 TTL        all  --  *      eth1    0.0.0.0/0
0.0.0.0/0           /* Mudando TTL do pacote para dar mais segurança */
TTL set to 255
   16   936 TTL        all  --  *      eth2    0.0.0.0/0
0.0.0.0/0           /* Mudando TTL do pacote para dar mais segurança */
TTL set to 255

Chain OUTPUT (policy ACCEPT 246 packets, 27229 bytes)
 pkts bytes target     prot opt in     out     source
destination
  134 12557 TTL        all  --  *      eth1    0.0.0.0/0
0.0.0.0/0           /* Mudando TTL do pacote para dar mais segurança */
TTL set to 255
   24  1900 TTL        all  --  *      eth2    0.0.0.0/0
0.0.0.0/0           /* Mudando TTL do pacote para dar mais segurança */
TTL set to 255
  231 22418 CONNMARK   all  --  *      *       0.0.0.0/0
0.0.0.0/0           CONNMARK restore
    0     0 MARK       tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           multiport dports 20,21,80,443 mark match 0x0 state
NEW /* pacotes do squid via link1 */ MARK xset 0x1/0xffffffff
   16  1224 CONNMARK   all  --  *      *       0.0.0.0/0
0.0.0.0/0           mark match !0x0 CONNMARK save

Chain POSTROUTING (policy ACCEPT 363 packets, 37210 bytes)
 pkts bytes target     prot opt in     out     source
destination
  181 15315 CONNMARK   all  --  *      eth1    0.0.0.0/0
0.0.0.0/0           CONNMARK restore
   29  2149 MARK       all  --  *      eth1    0.0.0.0/0
0.0.0.0/0           mark match 0x0 state NEW MARK xset 0x1/0xffffffff
  181 15315 CONNMARK   all  --  *      eth1    0.0.0.0/0
0.0.0.0/0           CONNMARK save
   32  2188 CONNMARK   all  --  *      eth2    0.0.0.0/0
0.0.0.0/0           CONNMARK restore
   16  1252 MARK       all  --  *      eth2    0.0.0.0/0
0.0.0.0/0           mark match 0x0 state NEW MARK xset 0x2/0xffffffff
   32  2188 CONNMARK   all  --  *      eth2    0.0.0.0/0
0.0.0.0/0           CONNMARK save


I would appreciate any help


thanks in advanced


--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux