Re: only the first FORWARD rule is matching

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



As you say that you are forwarding it to different host that means u
must be having some natting  rules also. Kindly post output of
iptables -t nat  -l -n -v.

On Mon, Oct 27, 2014 at 6:58 PM, Ralf Schwarzmaier <ralf@xxxxxxxxxxxxx> wrote:
> Hello,
>
> I'm stuck with a problem regarding two most identical iptables rules, except
> the IP and UDP Port.
>
> What I'm trying to do:
> My linux box is receiving Packets on two different UDP Ports at eth0
> (192.168.1.0/24) and I'm trying to forward those packets to different hosts
> in the network connected to eth1 (192.168.245.0/24).
>
> The Problem:
> Only the first added iptables FORWARD rule is working.
> root@thebox:~# iptables -I FORWARD -i eth0 -p udp --dport 20044 -j ACCEPT
>
> If I add the second rule, it gets completely ignored.
> root@thebox:~# iptables -I FORWARD -i eth0 -p udp --dport 20048 -j ACCEPT
>
> And iptables confirms this in the packet statistics.
> root@thebox:~# iptables -L -v -n
> Chain INPUT (policy ACCEPT 9523 packets, 11M bytes)
>  pkts bytes target     prot opt in     out     source
> destination
>
> Chain FORWARD (policy DROP 0 packets, 0 bytes)
>  pkts bytes target     prot opt in     out     source
> destination
>     0     0 ACCEPT     udp  --  eth0   *       0.0.0.0/0
> 0.0.0.0/0            udp dpt:20048
> 27858   32M ACCEPT     udp  --  eth0   *       0.0.0.0/0
> 0.0.0.0/0            udp dpt:20044
>
> Chain OUTPUT (policy ACCEPT 219 packets, 80793 bytes)
>  pkts bytes target     prot opt in     out     source
> destination
>
>
> The interesting fakt is, that if I delete the rules and add them in reverse
> order, the other rule is working.
>
> Just to go for sure, here is a snipped of the tcpdump output where you can
> see the packets arriving at the box on eth0.
> root@thebox:~# tcpdump -n -i eth0 udp
> [ 1601.022974] device eth0 entered promiscuous mode
> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
> listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
> 07:31:04.589742 IP 192.168.1.5.514 > 192.168.1.1.514: SYSLOG kernel.info,
> length: 62
> 07:31:04.611714 IP 192.168.1.1.10038 > 192.168.1.5.20044: UDP, length 1408
> 07:31:04.611843 IP 192.168.1.1.10038 > 192.168.1.5.20048: UDP, length 1408
> 07:31:04.612004 IP 192.168.1.1.10038 > 192.168.1.5.20044: UDP, length 1374
> 07:31:04.612124 IP 192.168.1.1.10038 > 192.168.1.5.20048: UDP, length 1374
> 07:31:04.621323 IP 192.168.1.1.10038 > 192.168.1.5.20044: UDP, length 456
> 07:31:04.621374 IP 192.168.1.1.10038 > 192.168.1.5.20048: UDP, length 456
> 07:31:04.651705 IP 192.168.1.1.10038 > 192.168.1.5.20044: UDP, length 1378
> 07:31:04.651816 IP 192.168.1.1.10038 > 192.168.1.5.20048: UDP, length 1378
>
> Maybe the sourceport of the packets is reason for this strange behaviour.
>
> Versioninformations:
> iptables v1.4.14
> kernel 3.4.4
>
> Does anybody an idea to get my problem solved, or even the reason for?
>
> I really appreciate any help you can provide to solve the problem.
>
> Ralf Schwarzmaier
>
> --
> To unsubscribe from this list: send the line "unsubscribe netfilter" in
> the body of a message to majordomo@xxxxxxxxxxxxxxx
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux