Re: VLAN et iptables

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Jeetu,

My suggestion, simplify your rules a little.

1. Start with a single rule to allow established connections.
2. You seem to have a extra [-m] in the subnet rules. (Could add -m
state --state NEW)
3. Adding a log rule to the end of the Forward table and looking at
non matched packets could help you see what the problem might be.


# for all subnets
 iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
 iptables -t nat -A POSTROUTING -o $EXTIF -j MASQUERADE

# for Matunga subnet 192.168.0.0/24
 iptables -A FORWARD -i $INTIF1 -o $EXTIF -s 192.168.0.0/24 -j ACCEPT

 # for Silvassa subnet 172.16.0.0/16
 iptables -A FORWARD -i $INTIF2 -o $EXTIF -s 172.16.0.0/16  -j ACCEPT

# for Colaba subnet 192.168.1.0/24
 iptables -A FORWARD -i $INTIF2 -o $EXTIF -s 192.168.1.0/24 -j ACCEPT

Regards,
Pieter

On Sat, Apr 3, 2010 at 9:58 AM, Jeetu Golani <jeetu.golani@xxxxxxxxx> wrote:
> Hi Elko / Marek,
>
> Thank you so much for replying back.
>
> I've pasted down below the ifconfig output and the routing table at the router
> in the head office.
>
> The routers can ping each other, they can also ping their respective PE's. The
> router at the head office, where we have the iptables script, can ping both
> the VPN PE and the gateway for the public IP.
>
> Furthermore if all we have are the following rules, the HO LAN 192.168.0.0
> can reach the public gateway and surf the internet, the remote locations
> can't:
>
> iptables -A FORWARD -i $EXTIF -o $INTIF1 -m state --state
> ESTABLISHED,RELATED -j ACCEPT
> iptables -A FORWARD -i $INTIF1 -o $EXTIF -j ACCEPT
> iptables -A FORWARD -i $EXTIF -o $INTIF2 -m state --state
> ESTABLISHED,RELATED -j ACCEPT
> iptables -A FORWARD -i $INTIF2 -o $EXTIF -j ACCEPT
>
> iptables -t nat -A POSTROUTING -o $EXTIF -j MASQUERADE
>
> With the script I had posted earlier none of the locations can reach the
> public gateway.
>
> Truly appreciate all the help.
>
> Regards,
> Jeetu
> http://www.ebrain.in
> - An open (GPL) platform to discover and run software off someone in the
> meshed network pool and use it on your own device.
>
> twitter:  @0topcat0 and @ebrainpool
>
>
>
> --------------------------------
> ifconfig output:
>
> eth0      Link encap:Ethernet  HWaddr 00:27:0e:16:e1:a5
>          inet addr:192.168.0.1  Bcast:192.168.0.255  Mask:255.255.255.0
>          inet6 addr: fe80::227:eff:fe16:e1a5/64 Scope:Link
>          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
>          RX packets:482754 errors:0 dropped:0 overruns:0 frame:0
>          TX packets:743399 errors:0 dropped:0 overruns:0 carrier:0
>          collisions:0 txqueuelen:1000
>          RX bytes:38759551 (36.9 MiB)  TX bytes:1024701055 (977.2 MiB)
>          Interrupt:27 Base address:0xe000
>
> eth1      Link encap:Ethernet  HWaddr 00:e0:1c:3b:a0:c1
>          inet6 addr: fe80::2e0:1cff:fe3b:a0c1/64 Scope:Link
>          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
>          RX packets:1750085 errors:0 dropped:0 overruns:0 frame:0
>          TX packets:623003 errors:0 dropped:0 overruns:0 carrier:0
>          collisions:0 txqueuelen:1000
>          RX bytes:1103786909 (1.0 GiB)  TX bytes:48633230 (46.3 MiB)
>          Interrupt:21 Base address:0x6000
>
> lo        Link encap:Local Loopback
>          inet addr:127.0.0.1  Mask:255.0.0.0
>          inet6 addr: ::1/128 Scope:Host
>          UP LOOPBACK RUNNING  MTU:16436  Metric:1
>          RX packets:157 errors:0 dropped:0 overruns:0 frame:0
>          TX packets:157 errors:0 dropped:0 overruns:0 carrier:0
>          collisions:0 txqueuelen:0
>          RX bytes:17134 (16.7 KiB)  TX bytes:17134 (16.7 KiB)
>
> vlan105   Link encap:Ethernet  HWaddr 00:e0:1c:3b:a0:c1
>          inet addr:10.235.122.158  Bcast:10.235.122.159
> Mask:255.255.255.252
>          inet6 addr: fe80::2e0:1cff:fe3b:a0c1/64 Scope:Link
>          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
>          RX packets:68906 errors:0 dropped:0 overruns:0 frame:0
>          TX packets:68917 errors:0 dropped:0 overruns:0 carrier:0
>          collisions:0 txqueuelen:0
>          RX bytes:3445300 (3.2 MiB)  TX bytes:3170595 (3.0 MiB)
>
> #public IP
> vlan689   Link encap:Ethernet  HWaddr 00:e0:1c:3b:a0:c1
>          inet addr: a.b.c.d  Bcast:a.b.c.(d+1)  Mask:255.255.255.252
>          inet6 addr: fe80::2e0:1cff:fe3b:a0c1/64 Scope:Link
>          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
>          RX packets:826133 errors:0 dropped:0 overruns:0 frame:0
>          TX packets:554080 errors:0 dropped:0 overruns:0 carrier:0
>          collisions:0 txqueuelen:0
>          RX bytes:1022440202 (975.0 MiB)  TX bytes:42842359 (40.8 MiB)
> ------------------------------------------------------------------
>
> Kernel IP routing table:
>
> Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
> 10.235.122.186  0.0.0.0         255.255.255.255 UH    0      0        0
> vlan105
> 10.235.122.94   0.0.0.0         255.255.255.255 UH    0      0        0
> vlan105
> a.b.c.16  0.0.0.0         255.255.255.252 U     0      0        0 vlan689
> 10.235.122.156  0.0.0.0         255.255.255.252 U     0      0        0
> vlan105
> 192.168.1.0     10.235.122.94   255.255.255.0   UG    0      0        0
> vlan105
> 192.168.0.0     0.0.0.0         255.255.255.0   U     0      0        0 eth0
> 172.16.0.0      10.235.122.186  255.255.0.0     UG    0      0        0
> vlan105
> 0.0.0.0         a.b.c.17  0.0.0.0         UG    0      0        0 vlan689
>
>
>
> On Saturday 03 April 2010, Marek Kierdelewicz wrote:
>> > Hi,
>>
>> Hi Jeetu,
>>
>> >I have a Debian system that I am trying to configure as a router for a
>> >Network Description:
>> >At the head office, the ISP facing router has two physical NICs (eth0
>> >and eth1).
>>
>> Your script looks good. It's probably on purpose but in current setup
>> you won't be able to reach one private subnet from another.
>>
>> Just to be sure - if you want the box to act as a router for subnets
>> 192.168.1.0/24 and 172.16.0.0/16 then you need ip addresses from these
>> subnets on vlan105 interface.
>>
>> Regards,
>> Marek
>>
>
> --
> To unsubscribe from this list: send the line "unsubscribe netfilter" in
> the body of a message to majordomo@xxxxxxxxxxxxxxx
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
>
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux