2004-02-14 19:06:39 +01:00
<?xml version="1.0" encoding="UTF-8"?>
2008-07-12 19:10:56 +02:00
< !DOCTYPE article PUBLIC "-//OASIS//DTD DocBook XML V4.2//EN"
"http://www.oasis-open.org/docbook/xml/4.2/docbookx.dtd">
2004-02-14 19:06:39 +01:00
<article >
<!-- $Id$ -->
<articleinfo >
<title > Traffic Shaping/Control</title>
<authorgroup >
<author >
<firstname > Tom</firstname>
<surname > Eastep</surname>
</author>
2005-10-07 16:44:39 +02:00
2005-10-07 01:29:16 +02:00
<author >
2005-10-07 16:44:39 +02:00
<firstname > Arne</firstname>
2005-10-07 01:29:16 +02:00
2005-10-07 16:44:39 +02:00
<surname > Bernin</surname>
</author>
2004-02-14 19:06:39 +01:00
</authorgroup>
2006-07-07 03:04:16 +02:00
<pubdate > <?dbtimestamp format="Y/m/d"?> </pubdate>
2004-02-14 19:06:39 +01:00
<copyright >
2008-03-22 17:01:29 +01:00
<year > 2001-2008</year>
2005-10-07 16:44:39 +02:00
2004-02-14 19:06:39 +01:00
<holder > Thomas M. Eastep</holder>
</copyright>
2005-10-07 16:44:39 +02:00
2005-10-07 01:29:16 +02:00
<copyright >
<year > 2005</year>
2005-10-07 16:44:39 +02:00
2005-10-15 17:15:45 +02:00
<holder > Arne Bernin & Thomas M. Eastep</holder>
2005-10-07 01:29:16 +02:00
</copyright>
2005-10-07 16:44:39 +02:00
2004-02-14 19:06:39 +01:00
<legalnotice >
<para > Permission is granted to copy, distribute and/or modify this
document under the terms of the GNU Free Documentation License, Version
1.2 or any later version published by the Free Software Foundation; with
no Invariant Sections, with no Front-Cover, and with no Back-Cover
Texts. A copy of the license is included in the section entitled
2005-10-07 16:44:39 +02:00
<quote > <ulink url= "GnuCopyright.htm" > GNU Free Documentation
License</ulink> </quote> .</para>
2004-02-14 19:06:39 +01:00
</legalnotice>
</articleinfo>
2006-03-30 05:51:08 +02:00
<important >
<para > Traffic shaping is complex and the Shorewall community is not well
2008-08-15 07:03:24 +02:00
equipped to answer traffic shaping questions. So if you are the type of
2006-03-30 05:51:08 +02:00
person who needs "insert tab A into slot B" instructions for everything
2006-03-30 16:54:53 +02:00
that you do, then please don't try to implement traffic shaping using
Shorewall. You will just frustrate yourself and we won't be able to help
you.</para>
2006-03-30 05:51:08 +02:00
</important>
2006-05-02 03:09:57 +02:00
<warning >
2006-11-10 22:55:51 +01:00
<para > Said another way, reading just Shorewall documentation is not going
to give you enough background to use this material.</para>
2006-05-02 03:09:57 +02:00
2006-05-02 05:13:58 +02:00
<para > At a minimum, you will need to refer to at least the following
additional information:</para>
2006-05-02 03:09:57 +02:00
2006-05-02 05:05:10 +02:00
<itemizedlist >
<listitem >
<para > The LARTC HOWTO: <ulink
url="http://www.lartc.org">http://www.lartc.org</ulink> </para>
</listitem>
2006-09-27 21:17:43 +02:00
<listitem >
<para > The HTB User's Guide: <ulink
2006-10-31 03:56:51 +01:00
url="http://luxik.cdi.cz/~devik/qos/htb/manual/userg.htm">http://luxik.cdi.cz/~devik/qos/htb/manual/userg.htm</ulink> </para>
2006-09-27 21:17:43 +02:00
</listitem>
2006-05-02 05:05:10 +02:00
<listitem >
2006-05-02 05:13:58 +02:00
<para > Some of the documents listed at <ulink
2006-05-02 03:30:04 +02:00
url="http://www.netfilter.org/documentation/index.html#documentation-howto">http://www.netfilter.org/documentation/index.html#documentation-howto</ulink> .
2006-05-02 05:05:10 +02:00
The tutorial by Oskar Andreasson is particularly good.</para>
</listitem>
2006-05-02 03:30:04 +02:00
2006-05-02 05:05:10 +02:00
<listitem >
<para > The output of <command > man iptables</command> </para>
</listitem>
</itemizedlist>
2006-05-02 03:09:57 +02:00
</warning>
2007-06-29 00:06:10 +02:00
<section id= "Intro" >
2004-02-14 19:06:39 +01:00
<title > Introduction</title>
2009-02-28 05:00:11 +01:00
<para > Shorewall has builtin support for traffic shaping and control.
Before this version, the support was quite limited. You were able to use
your own tcstart script (and you still are), but besides the tcrules file
it was not possible to define classes or queuing disciplines inside the
Shorewall config files.</para>
2004-02-14 19:06:39 +01:00
2005-10-07 01:29:16 +02:00
<para > The support for traffic shaping and control still does not cover all
2005-10-07 16:44:39 +02:00
options available (and especially all algorithms that can be used to queue
2005-10-11 23:48:53 +02:00
traffic) in the Linux kernel but it should fit most needs. If you are
2005-10-13 22:19:31 +02:00
using your own script for traffic control and you still want to use it in
the future, you will find information on how to do this, <link
linkend="owntcstart"> later in this document</link> . But for this to work,
you will also need to enable traffic shaping in the kernel and Shorewall
as covered by the next sections.</para>
2005-10-07 16:44:39 +02:00
</section>
2004-02-14 19:06:39 +01:00
2007-06-29 00:06:10 +02:00
<section id= "LinuxTC" >
2005-10-07 01:29:16 +02:00
<title > Linux traffic shaping and control</title>
2005-10-07 16:44:39 +02:00
<para > This section gives a brief introduction of how controlling traffic
2008-08-15 07:03:24 +02:00
with the Linux kernel works. Although this might be enough for configuring
2006-03-30 16:54:53 +02:00
it in the Shorewall configuration files, we strongly recommend that you
2005-10-11 23:48:53 +02:00
take a deeper look into the <ulink url= "http://lartc.org/howto/" > Linux
2005-10-07 16:44:39 +02:00
Advanced Routing and Shaping HOWTO</ulink> . At the time of writing this,
the current version is 1.0.0.</para>
<para > Since kernel 2.2 Linux has extensive support for controlling
traffic. You can define different algorithms that are used to queue the
traffic before it leaves an interface. The standard one is called pfifo
and is (as the name suggests) of the type First In First out. This means,
that it does not shape anything, if you have a connection that eats up all
2008-08-15 07:03:24 +02:00
your bandwidth, this queuing algorithm will not stop it from doing
2005-10-07 16:44:39 +02:00
so.</para>
<para > For Shorewall traffic shaping we use two algorithms, one is called
HTB (Hierarchical Token Bucket) and SFQ (Stochastic Fairness Queuing). SFQ
is easy to explain: it just tries to track your connections (tcp or udp
2005-10-13 22:19:31 +02:00
streams) and balances the traffic between them. This normally works well.
HTB allows you to define a set of classes, and you can put the traffic you
2008-08-15 07:03:24 +02:00
want into these classes. You can define minimum and maximum bandwidth
settings for those classes and order them hierarchically (the less
2009-01-09 20:33:37 +01:00
prioritized classes only get bandwidth if the more important have what
they need). Shorewall builtin traffic shaping allows you to define these
2005-10-13 22:19:31 +02:00
classes (and their bandwidth limits), and it uses SFQ inside these classes
to make sure, that different data streams are handled equally.</para>
2005-10-07 16:44:39 +02:00
2009-02-28 04:45:43 +01:00
<para > You can shape incoming traffic through use of an
<firstterm > Intermediate Frame Block</firstterm> (IFB) device. <link
linkend="IFB">See below</link> . <emphasis role= "bold" > But beware: using an
IFB can result in queues building up both at your ISPs router and at your
own.</emphasis> </para>
<para > If you wish to shape downloads, you can also configure traffic
shaping on your firewall's local interface. An example appears <link
linkend="Downloads">below</link> . Again, however, <emphasis
role="bold">this can result in queues building up both at your ISPs router
and at your own</emphasis> .</para>
2008-07-12 19:10:56 +02:00
2005-10-13 22:19:31 +02:00
<para > You shape and control outgoing traffic by assigning the traffic to
<firstterm > classes</firstterm> . Each class is associated with exactly one
network interface and has a number of attributes:</para>
<orderedlist >
<listitem >
<para > PRIORITY - Used to give preference to one class over another
when selecting a packet to send. The priority is a numeric value with
1 being the highest priority, 2 being the next highest, and so
on.</para>
</listitem>
<listitem >
<para > RATE - The minimum bandwidth this class should get, when the
traffic load rises. Classes with a higher priority (lower PRIORITY
value) are served even if there are others that have a guaranteed
2008-08-15 07:03:24 +02:00
bandwidth but have a lower priority (higher PRIORITY value).</para>
2005-10-13 22:19:31 +02:00
</listitem>
<listitem >
<para > CEIL - The maximum bandwidth the class is allowed to use when
the link is idle.</para>
</listitem>
<listitem >
<para > MARK - Netfilter has a facility for
2005-11-26 22:11:45 +01:00
<firstterm > marking</firstterm> packets. Packet marks have a numeric
2009-04-20 23:58:36 +02:00
value which is limited in Shorewall to the values 1-255 (1-1023 if you
set WIDE_TC_MARKS=Yes in <ulink
url="manpages/shorewall.conf.html">shorewall.conf</ulink> (5) ). You
assign packet marks to different types of traffic using entries in the
2006-05-01 22:21:20 +02:00
<filename > /etc/shorewall/tcrules</filename> file.</para>
2005-10-13 22:19:31 +02:00
</listitem>
</orderedlist>
<para > One class for each interface must be designated as the
<firstterm > default class</firstterm> . This is the class to which unmarked
traffic (packets to which you have not assigned a mark value in
<filename > /etc/shorewall/tcrules</filename> ) is assigned.</para>
2006-05-01 22:01:29 +02:00
2006-05-01 22:21:20 +02:00
<para > Netfilter also supports a mark value on each connection. You can
2006-05-01 22:01:29 +02:00
assign connection mark values in
2006-05-01 22:21:20 +02:00
<filename > /etc/shorewall/tcrules</filename> , you can copy the current
packet's mark to the connection mark (SAVE), or you can copy the
2008-07-13 17:34:54 +02:00
connection mark value to the current packet's mark (RESTORE). For more
information, see<ulink url= "PacketMarking.html" > this
article</ulink> .</para>
2005-10-07 16:44:39 +02:00
</section>
2004-02-14 19:06:39 +01:00
2007-06-29 00:06:10 +02:00
<section id= "Kernel" >
2005-10-07 01:29:16 +02:00
<title > Linux Kernel Configuration</title>
2004-02-14 19:06:39 +01:00
2005-10-07 16:44:39 +02:00
<para > You will need at least kernel 2.4.18 for this to work, please take a
look at the following screenshot for what settings you need to enable. For
2006-01-05 16:37:13 +01:00
builtin support, you need the HTB scheduler, the Ingress scheduler, the
PRIO pseudoscheduler and SFQ queue. The other scheduler or queue
algorithms are not needed.</para>
2007-08-15 17:52:33 +02:00
<para > This screen shot shows how I configured QoS in a 2.6.16
Kernel:</para>
2006-05-22 17:13:55 +02:00
<graphic align= "center" fileref= "images/traffic_shaping2.6.png" />
2007-08-15 17:52:33 +02:00
<para > And here's my recommendation for a 2.6.21 kernel:<graphic
align="center" fileref="images/traffic_shaping2.6.21.png" /></para>
2005-10-07 16:44:39 +02:00
</section>
2004-02-14 19:06:39 +01:00
2007-06-29 00:06:10 +02:00
<section id= "Shorewall" >
2005-10-07 16:44:39 +02:00
<title > Enable TC support in Shorewall</title>
2004-02-14 19:06:39 +01:00
2005-10-07 16:44:39 +02:00
<para > You need this support whether you use the builtin support or whether
you provide your own tcstart script.</para>
2004-02-14 19:06:39 +01:00
2005-10-07 16:44:39 +02:00
<para > To enable the builtin traffic shaping and control in Shorewall, you
have to do the following:</para>
2004-02-14 19:06:39 +01:00
2005-10-07 01:29:16 +02:00
<itemizedlist >
2004-02-14 19:06:39 +01:00
<listitem >
2008-07-13 17:34:54 +02:00
<para > Set <emphasis role= "bold" > TC_ENABLED</emphasis> to "<emphasis
role="bold">Internal</emphasis> " in /etc/shorewall/shorewall.conf.
Setting <emphasis role= "bold" > TC_ENABLED=Yes</emphasis> causes
Shorewall to look for an external tcstart file (See <link
linkend="tcstart">a later section</link> for details).</para>
2004-02-14 19:06:39 +01:00
</listitem>
<listitem >
2005-10-07 01:29:16 +02:00
<para > Setting <emphasis role= "bold" > CLEAR_TC</emphasis> parameter in
2008-07-13 17:34:54 +02:00
/etc/shorewall/shorewall.conf to <emphasis role= "bold" > Yes</emphasis>
will clear the traffic shaping configuration during Shorewall
[re]start and Shorewall stop. This is normally what you want when
using the builtin support (and also if you use your own tcstart
script)</para>
2004-02-14 19:06:39 +01:00
</listitem>
<listitem >
2005-10-07 16:44:39 +02:00
<para > The other steps that follow depend on whether you use your own
script or the builtin solution. They will be explained in the
following sections.</para>
2004-02-14 19:06:39 +01:00
</listitem>
2005-10-07 16:44:39 +02:00
</itemizedlist>
2004-02-14 19:06:39 +01:00
</section>
2007-06-29 00:06:10 +02:00
<section id= "Builtin" >
2005-10-07 01:29:16 +02:00
<title > Using builtin traffic shaping/control</title>
2005-05-20 19:06:38 +02:00
2006-11-10 22:55:51 +01:00
<para > Shorewall's builtin traffic shaping feature provides a thin layer on
top of the ingress qdesc, HTB and SFQ. That translation layer allows you
to:</para>
<itemizedlist >
<listitem >
<para > Define HTB classes using Shorewall-style column-oriented
configuration files.</para>
</listitem>
<listitem >
<para > Integrate the reloading of your traffic shaping configuration
with the reloading of your packet-filtering and marking
configuration.</para>
</listitem>
<listitem >
<para > Assign traffic to HTB classes by TOS value.</para>
</listitem>
<listitem >
<para > Assign outgoing TCP ACK packets to an HTB class.</para>
</listitem>
<listitem >
<para > Assign traffic to HTB classes based on packet mark value.</para>
</listitem>
</itemizedlist>
2006-12-19 22:18:17 +01:00
<warning >
<para > Shorewall's builtin traffic shaping feature is limited to ten (10)
devices.</para>
</warning>
2006-11-10 22:55:51 +01:00
<para > Those few features are really all that builtin traffic
shaping/control provides; consequently, you need to understand HTB and
Linux traffic shaping as well as Netfilter packet marking in order to use
the facility. Again, please see the links at top of this article.</para>
2005-10-07 16:44:39 +02:00
<para > For defining bandwidths (for either devices or classes) please use
2008-08-15 07:03:24 +02:00
kbit or kbps (for Kilobytes per second) and make sure there is <emphasis
2005-10-13 22:19:31 +02:00
role="bold">NO</emphasis> space between the number and the unit (it is
100kbit <emphasis role= "bold" > not</emphasis> 100 kbit). Using mbit, mbps
or a raw number (which means bytes) could be used, but note that only
integer numbers are supported (0.5 is <emphasis role= "bold" > not
2005-10-11 23:48:53 +02:00
valid</emphasis> ).</para>
2004-02-14 19:06:39 +01:00
2008-07-13 17:34:54 +02:00
<para > <emphasis role= "bold" > To properly configure the settings for your
devices you need to find out the real up- and downstream rates you
have</emphasis> . This is especially the case, if you are using a DSL
connection or one of another type that do not have a guaranteed bandwidth.
Don't trust the values your provider tells you for this; especially
measuring the real download speed is important! There are several online
tools that help you find out; search for "dsl speed test" on google (For
Germany you can use <ulink
2005-10-13 22:19:31 +02:00
url="http://www.speedcheck.arcor.de/cgi-bin/speedcheck.cgi">arcor speed
check</ulink> ). Be sure to choose a test located near you.</para>
2004-02-14 19:06:39 +01:00
2007-06-29 00:06:10 +02:00
<section id= "tcdevices" >
2005-10-07 16:44:39 +02:00
<title > /etc/shorewall/tcdevices</title>
<para > This file allows you to define the incoming and outgoing bandwidth
for the devices you want traffic shaping to be enabled. That means, if
you want to use traffic shaping for a device, you have to define it
here.</para>
<para > Columns in the file are as follows:</para>
<itemizedlist >
<listitem >
<para > INTERFACE - Name of interface. Each interface may be listed
only once in this file. You may NOT specify the name of an alias
(e.g., eth0:0) here; see <ulink url= "FAQ.htm#faq18" > FAQ #18</ulink> .
You man NOT specify wildcards here, e.g. if you have multiple ppp
2009-02-28 04:45:43 +01:00
interfaces, you need to put them all in here! Shorewall will
determine if the device exists and will only configure the device if
it does exist. If it doesn't exist, the following warning is
issued:</para>
2006-05-22 22:24:46 +02:00
<para > <emphasis role= "bold" > WARNING: Device < device name> not
found -- traffic-shaping configuration skipped</emphasis> </para>
2008-03-20 20:37:14 +01:00
<para > Shorewall assigns a sequential <firstterm > interface
number</firstterm> to each interface (the first entry in
<filename > /etc/shorewall/tcdevices</filename> is interface 1, the
2009-02-28 04:45:43 +01:00
second is interface 2 and so on) You can also explicitly specify the
interface number by prefixing the interface name with the number and
a colon (":"). Example: 1:eth0.</para>
2005-10-07 16:44:39 +02:00
</listitem>
<listitem >
<para > IN-BANDWIDTH - The incoming Bandwidth of that interface.
2008-03-20 20:37:14 +01:00
Please note that when you use this column, you are not traffic
shaping incoming traffic, as the traffic is already received before
you could do so. This Column allows you to define the maximum
traffic allowed for this interface in total, if the rate is
2008-07-13 17:34:54 +02:00
exceeded, the excess packets are dropped. You want this mainly if
you have a DSL or Cable Connection to avoid queuing at your
providers side. If you don't want any traffic to be dropped set this
2009-02-28 04:45:43 +01:00
to a value faster than your interface maximum rate (or to 0
(zero).</para>
2006-02-27 16:54:05 +01:00
<para > To determine the optimum value for this setting, we recommend
that you start by setting it significantly below your measured
download bandwidth (20% or so). While downloading, measure the
<emphasis > ping</emphasis> response time from the firewall to the
upstream router as you gradually increase the setting.The optimal
setting is at the point beyond which the <emphasis > ping</emphasis>
time increases sharply as you increase the setting.</para>
2005-10-07 16:44:39 +02:00
</listitem>
<listitem >
2008-08-15 07:03:24 +02:00
<para > OUT-BANDWIDTH - Specify the outgoing bandwidth of that
2005-10-07 16:44:39 +02:00
interface. This is the maximum speed your connection can handle. It
is also the speed you can refer as "full" if you define the tc
classes. Outgoing traffic above this rate will be dropped.</para>
</listitem>
2008-03-20 20:37:14 +01:00
<listitem >
2009-02-28 04:45:43 +01:00
<para > OPTIONS — A comma-separated list of options from the following
list:</para>
2008-03-20 20:37:14 +01:00
<variablelist >
<varlistentry >
<term > classify</term>
<listitem >
<para > If specified, classification of traffic into the various
classes is done by CLASSIFY entries in
<filename > /etc/shorewall/tcrules</filename> or by entries in
<filename > /etc/shorewall/tcfilters</filename> . No MARK value
will be associated with classes on this interface.</para>
</listitem>
</varlistentry>
</variablelist>
</listitem>
<listitem >
2009-02-28 04:45:43 +01:00
<para > REDIRECTED INTERFACES — Entries are appropriate in this column
only if the device in the INTERFACE column names a <link
linkend="IFB">Intermediate Frame Block (IFB)</link> . It lists the
physical interfaces that will have their input shaped using classes
defined on the IFB. Neither the IFB nor any of the interfaces listed
in this column may have an IN-BANDWIDTH specified. You may specify
zero (0) or a dash ("-:) in the IN-BANDWIDTH column.</para>
2008-03-20 20:37:14 +01:00
<para > IFB devices automatically get the <emphasis
role="bold">classify</emphasis> option.</para>
</listitem>
2005-10-07 16:44:39 +02:00
</itemizedlist>
2004-02-14 19:06:39 +01:00
2007-06-29 00:06:10 +02:00
<example id= "Example0" >
2005-10-07 16:44:39 +02:00
<title > </title>
2004-02-14 19:06:39 +01:00
2005-10-07 16:44:39 +02:00
<para > Suppose you are using PPP over Ethernet (DSL) and ppp0 is the
interface for this. The device has an outgoing bandwidth of 500kbit
and an incoming bandwidth of 6000kbit</para>
2004-02-14 19:06:39 +01:00
2005-10-07 16:44:39 +02:00
<programlisting > #INTERFACE IN-BANDWITH OUT-BANDWIDTH
2005-10-07 01:29:16 +02:00
ppp0 6000kbit 500kbit</programlisting>
2005-10-07 16:44:39 +02:00
</example>
</section>
2004-02-14 19:06:39 +01:00
2007-06-29 00:06:10 +02:00
<section id= "tcclasses" >
2005-10-07 16:44:39 +02:00
<title > /etc/shorewall/tcclasses</title>
<para > This file allows you to define the actual classes that are used to
split the outgoing traffic.</para>
<itemizedlist >
<listitem >
2009-02-28 04:45:43 +01:00
<para > INTERFACE - Name of interface. Users may also specify the
interface number. Must match the name (or number) of an interface
with an entry in <filename > /etc/shorewall/tcdevices</filename> . If
the interface has the <emphasis role= "bold" > classify</emphasis>
option in <filename > /etc/shorewall/tcdevices</filename> , then the
interface name or number must be followed by a colon and a
<firstterm > class number</firstterm> . Examples: eth0:1, 4:9. Class
numbers must be unique for a given interface.</para>
2005-10-07 16:44:39 +02:00
</listitem>
<listitem >
2009-04-20 23:58:36 +02:00
<para > MARK - The mark value which is an integer in the range 1-255
2009-04-21 02:54:33 +02:00
(1-16383 if you set WIDE_TC_MARKS=Yes in <ulink
2009-04-20 23:58:36 +02:00
url="manpages/shorewall.conf.html">shorewall.conf</ulink> (5) ). You
define these marks in the tcrules file, marking the traffic you want
to go into the queuing classes defined in here. You can use the same
marks for different Interfaces. You must specify "-' in this column
if the device specified in the INTERFACE column has the <emphasis
role="bold">classify</emphasis> option in
2008-03-20 20:37:14 +01:00
<filename > /etc/shorewall/tcdevices</filename> .</para>
2005-10-07 16:44:39 +02:00
</listitem>
<listitem >
<para > RATE - The minimum bandwidth this class should get, when the
traffic load rises. Please note that first the classes which equal
or a lesser priority value are served even if there are others that
2008-08-15 07:03:24 +02:00
have a guaranteed bandwidth but a lower priority. <emphasis
2006-11-10 22:55:51 +01:00
role="bold">If the sum of the RATEs for all classes assigned to an
INTERFACE exceed that interfaces's OUT-BANDWIDTH, then the
OUT-BANDWIDTH limit will not be honored.</emphasis> </para>
2005-10-07 16:44:39 +02:00
</listitem>
<listitem >
<para > CEIL - The maximum bandwidth this class is allowed to use when
the link is idle. Useful if you have traffic which can get full
speed when more important services (e.g. interactive like ssh) are
not used. You can use the value "full" in here for setting the
maximum bandwidth to the defined output bandwidth of that
interface.</para>
</listitem>
<listitem >
<para > PRIORITY - you have to define a priority for the class.
packets in a class with a higher priority (=lesser value) are
2008-08-15 07:03:24 +02:00
handled before less prioritized ones. You can just define the mark
2005-10-07 16:44:39 +02:00
value here also, if you are increasing the mark values with lesser
priority.</para>
</listitem>
<listitem >
<para > OPTIONS - A comma-separated list of options including the
following:</para>
<itemizedlist >
<listitem >
<para > default - this is the default class for that interface
where all traffic should go, that is not classified
otherwise.</para>
<note >
<para > defining default for exactly <emphasis
role="bold">one</emphasis> class per interface is
mandatory!</para>
</note>
</listitem>
<listitem >
<para > tos-< tosname> - this lets you define a filter for
the given < tosname> which lets you define a value of the
Type Of Service bits in the ip package which causes the package
to go in this class. Please note, that this filter overrides all
mark settings, so if you define a tos filter for a class all
traffic having that mark will go in it regardless of the mark on
the package. You can use the following for this option:
tos-minimize-delay (16) tos-maximize-throughput (8)
tos-maximize-reliability (4) tos-minimize-cost (2)
tos-normal-service (0)</para>
<note >
<para > Each of this options is only valid for <emphasis
role="bold">one</emphasis> class per interface.</para>
</note>
</listitem>
<listitem >
<para > tcp-ack - if defined causes an tc filter to be created
that puts all tcp ack packets on that interface that have an
size of < =64 Bytes to go in this class. This is useful for
speeding up downloads. Please note that the size of the ack
2005-11-26 22:11:45 +01:00
packets is limited to 64 bytes as some applications (p2p for
2005-10-07 16:44:39 +02:00
example) use to make every package an ack package which would
2005-11-26 22:11:45 +01:00
cause them all into here. We want only packets WITHOUT payload
2005-10-07 16:44:39 +02:00
to match, so the size limit. Bigger packets just take their
normal way into the classes.</para>
<note >
<para > This option is only valid for <emphasis
role="bold">class</emphasis> per interface.</para>
</note>
</listitem>
</itemizedlist>
</listitem>
</itemizedlist>
</section>
2005-10-07 01:29:16 +02:00
2007-06-29 00:06:10 +02:00
<section id= "tcrules" >
2005-12-03 17:34:59 +01:00
<title > /etc/shorewall/tcrules</title>
2007-10-05 20:59:16 +02:00
<important >
<para > Unlike rules in the <ulink
url="manpages/shorewall-rules.html">shorewall-rules</ulink> (5) file,
evaluation of rules in this file will continue after a match. So the
final mark for each packet will be the one assigned by the LAST tcrule
that matches.</para>
2009-01-28 01:45:26 +01:00
<para > Also unlike rules in the <ulink
url="manpages/shorewall-rules.html">shorewall-rules</ulink> (5) file,
the tcrules file is not stateful. So every packet that goes into, out
of or through your firewall is subject to entries in the tcrules
file.</para>
<para > Because tcrules are not stateful, it is necessary to understand
2009-01-30 23:20:22 +01:00
basic IP socket operation. Here is an edited excerpt from a post on
the Shorewall Users list:<blockquote >
2009-01-28 01:45:26 +01:00
<para > For the purposes of this discussion, the world is separated
into clients and servers. Servers provide services to
clients.</para>
2009-01-30 23:20:22 +01:00
<para > When a server starts, it creates a socket and
<emphasis > binds</emphasis> the socket to an
<emphasis > address</emphasis> . For AF_INET (IPv4) and AF_INET6
(IPv6) sockets, that address is an ordered triple consisting of an
IPv4 or IPv6 address, a protocol, and possibly a port number. Port
numbers are only used when the protocol is TCP, UDP, SCTP or DCCP.
2009-01-28 01:45:26 +01:00
The protocol and port number used by a server are typically
2009-01-30 23:20:22 +01:00
well-known so that clients will be able to connect to it or send
datagrams to it. So SSH servers bind to TCP port 22, SMTP servers
bind to TCP port 25, etc. We will call this port the SERVER
PORT.</para>
2009-01-28 01:45:26 +01:00
<para > When a client want to use the service provided by a server,
2009-01-30 23:20:22 +01:00
it also creates a socket and, like the server's socket, the
client's socket must be bound to an address. But in the case of
the client, the socket is usually given an automatic address
binding. For AF_INET and AF_INET6 sockets. the IP address is the
IP address of the client system (loose generalization) and the
port number is selected from a <firstterm > local port
range</firstterm> . On Linux systems, the local port range can be
seen by <command > cat
/proc/sys/net/ipv4/ip_local_port_range</command> . So it is not
possible in advance to determine what port the client will be
using. Whatever it is, we'll call it the CLIENT PORT.</para>
2009-01-28 01:45:26 +01:00
<para > Now: <blockquote >
2009-01-28 01:50:17 +01:00
<para > Packets sent from the client to the server will
2009-01-28 01:45:26 +01:00
have:<blockquote >
<para > SOURCE PORT = CLIENT PORT</para>
<para > DEST PORT = SERVER PORT</para>
</blockquote> </para>
2009-01-28 01:50:17 +01:00
<para > Packets sent from the server to the client will have:
2009-01-28 01:45:26 +01:00
<blockquote >
<para > SOURCE PORT = SERVER PORT</para>
<para > DEST PORT = CLIENT PORT</para>
</blockquote> </para>
</blockquote> </para>
<para > Since the SERVER PORT is generally the only port known ahead
2009-01-30 23:20:22 +01:00
of time, we must categorize traffic from the server to the client
using the SOURCE PORT.</para>
2009-01-28 01:45:26 +01:00
</blockquote> </para>
2007-10-05 20:59:16 +02:00
</important>
2005-12-03 17:34:59 +01:00
<para > The fwmark classifier provides a convenient way to classify
packets for traffic shaping. The <quote > /etc/shorewall/tcrules</quote>
2006-10-03 17:12:43 +02:00
file is used for specifying these marks in a tabular fashion. For an
in-depth look at the packet marking facility in Netfilter/Shorewall,
please see <ulink url= "PacketMarking.html" > this article</ulink> .</para>
2005-12-03 17:34:59 +01:00
<para > Normally, packet marking occurs in the PREROUTING chain before any
address rewriting takes place. This makes it impossible to mark inbound
packets based on their destination address when SNAT or Masquerading are
being used. You can cause packet marking to occur in the FORWARD chain
by using the MARK_IN_FORWARD_CHAIN option in shorewall.conf.</para>
<para > Columns in the file are as follows:</para>
<itemizedlist >
<listitem >
2006-03-15 18:50:29 +01:00
<para > MARK or CLASSIFY - MARK specifies the mark value is to be
2009-04-20 23:58:36 +02:00
assigned in case of a match. This is an integer in the range 1-255
2009-04-21 02:54:33 +02:00
(1-16383 if you set WIDE_TC_MARKS=Yes in <ulink
2009-04-20 23:58:36 +02:00
url="manpages/shorewall.conf.html">shorewall.conf</ulink> (5) ).
2006-03-15 18:50:29 +01:00
This value may be optionally followed by <quote > :</quote> and either
2006-12-08 23:43:46 +01:00
<quote > F</quote> , <quote > P</quote> or "T" to designate that the
marking will occur in the FORWARD, PREROUTING or POSTROUTING chains
respectively. If this additional specification is omitted, the chain
used to mark packets will be determined as follows:</para>
<itemizedlist >
<listitem >
<para > If the SOURCE is
$FW[:< <emphasis > address</emphasis> > ], then the rule is
inserted in the OUTPUT chain.</para>
</listitem>
<listitem >
<para > Otherwise, the chain is determined by the setting of the
MARK_IN_FORWARD_CHAIN option in shorewall.conf.</para>
</listitem>
</itemizedlist>
<note >
2009-02-28 05:00:11 +01:00
<para > <emphasis role= "bold" > Use the 'T' qualifier if you want the
2009-02-28 04:45:43 +01:00
rule to apply equally to traffic being routed through the firewall
and to traffic originating on the firewall
itself.</emphasis> </para>
2006-12-08 23:43:46 +01:00
</note>
<para > Normally, the mark is applied to the packet. If you follow the
mark value with ":" and "C", then the mark is applied to the
connection. "C" can be combined with "F", "P" or "T" to designate
that the connection should be marked in a particular chain (e.g.,
"CF", "CP", "CT").</para>
<para > There are additional special values available:</para>
<orderedlist numeration= "loweralpha" >
<listitem >
<para > <emphasis
role="bold">RESTORE</emphasis> [/<emphasis > mask</emphasis> ] --
restore the packet's mark from the connection's mark using the
supplied mask if any. Your kernel and iptables must include
CONNMARK support.</para>
<para > As above, may be followed by <emphasis
role="bold">:P</emphasis> , <emphasis role= "bold" > :F</emphasis>
or <emphasis role= "bold" > :T</emphasis> .</para>
</listitem>
<listitem >
<para > <emphasis
role="bold">SAVE</emphasis> [/<emphasis > mask</emphasis> ] -- save
the packet's mark to the connection's mark using the supplied
mask if any. Your kernel and iptables must include CONNMARK
support.</para>
<para > As above, may be followed by <emphasis
role="bold">:P</emphasis> , <emphasis role= "bold" > :F</emphasis>
or <emphasis role= "bold" > :T</emphasis> .</para>
</listitem>
<listitem >
<para > <emphasis role= "bold" > CONTINUE</emphasis> Don't process
any more marking rules in the table.</para>
<para > As above, may be followed by <emphasis
role="bold">:P</emphasis> , <emphasis role= "bold" > :F</emphasis>
or <emphasis role= "bold" > :T</emphasis> .</para>
</listitem>
<listitem >
2009-02-28 04:45:43 +01:00
<para > <emphasis role= "bold" > COMMENT</emphasis> -- the rest of
the line will be attached as a comment to the Netfilter rule(s)
generated by the following entries. The comment will appear
delimited by "/* ... */" in the output of <command > shorewall
show mangle</command> </para>
2006-12-08 23:43:46 +01:00
<para > To stop the comment from being attached to further rules,
simply include COMMENT on a line by itself.</para>
</listitem>
</orderedlist>
2006-03-15 18:50:29 +01:00
<para > To use CLASSIFY, your kernel and iptables must include
CLASSIFY target support. In that case, this column contains a
classification (classid) of the form < major> :< minor>
where < major> and < minor> are integers. Corresponds to
the 'class' specification in these traffic shaping modules:</para>
<simplelist >
<member > atm</member>
<member > cbq</member>
<member > dsmark</member>
<member > pfifo_fast</member>
<member > htb</member>
<member > prio</member>
</simplelist>
2009-02-28 04:45:43 +01:00
<para > Classification occurs in the POSTROUTING chain <emphasis
2006-08-16 18:42:29 +02:00
role="bold">except</emphasis> when the SOURCE contains
$FW[:< <emphasis > address</emphasis> > ] in which case, the
classify action takes place in the OUTPUT chain. When used with the
2008-03-20 20:37:14 +01:00
builtin traffic shaper, the < major> class is the interface
2009-04-20 23:58:36 +02:00
number and the < minor> class is either:</para>
<orderedlist >
<listitem >
<para > Constructed from the mark. The method of construction
depends on the setting of WIDE_TC_MARKS (<ulink
url="manpages/shorewall.conf.html">shorewall.conf</ulink>
(5)).</para>
<para > When WIDE_TC_MARKS=No (the default), the < minor>
class is:</para>
<itemizedlist >
<listitem >
<para > the MARK value of the class preceded by the number "1"
2009-04-21 02:54:33 +02:00
or "10" (MARK value 1 is < minor> class 11, MARK value
22 is < minor> class 122, and so on). "10" is used
where there are more than 10 devices defined in <link
linkend="tcdevices">/etc/shorewall/tcdevices</link> .</para>
2009-04-20 23:58:36 +02:00
</listitem>
</itemizedlist>
<para > When SIDE_TC_MARKS=Yes, the < minor> class is:</para>
<itemizedlist >
<listitem >
<para > The number shifted 10 bits to the left (multiplied by
1024) and logically ORed with the MARK value. The
<command > shorewall encode</command> and <command > shorewall
decode</command> commands (<ulink
url="manpages/shorewall.html">shorewall</ulink> (8)) may be
2009-04-21 02:54:33 +02:00
used to translate a mark to/from a < minor>
class.</para>
2009-04-20 23:58:36 +02:00
<para > Examples:</para>
2009-04-21 02:54:33 +02:00
<programlisting > $ <command > shorewall encode 100</command>
Class Number = 16484
$ <command > shorewall decode 16484</command>
Mark = 100</programlisting>
2009-04-20 23:58:36 +02:00
</listitem>
</itemizedlist>
</listitem>
<listitem >
<para > The class number (if the <emphasis
role="bold">classify</emphasis> option was specified in for the
interface <filename > /etc/shorewall/interfaces</filename> )</para>
</listitem>
</orderedlist>
2005-12-03 17:34:59 +01:00
</listitem>
<listitem >
2009-02-28 04:45:43 +01:00
<para > SOURCE - Source of the packet.</para>
2009-02-04 00:56:17 +01:00
<para > May be:</para>
<orderedlist >
<listitem >
<para > An interface name - matches traffic entering the firewall
on the specified interface. May not be used in classify rules or
in rules using the :T chain qualifier.</para>
</listitem>
<listitem >
<para > A comma-separated list of host or network IP addresses or
MAC addresses. <emphasis role= "bold" > This form will not match
traffic that originates on the firewall itself unless either
< major> < minor> or the :T chain qualifier is used in
the MARK column.</emphasis> </para>
<para > Examples:<simplelist >
<member > 0.0.0.0/0</member>
</simplelist> </para>
<para > <simplelist >
<member > 192.168.1.0/24, 172.20.4.0/24</member>
</simplelist> </para>
</listitem>
<listitem >
<para > An interface name followed by a colon (":") followed by a
comma-separated list of host or network IP addresses or MAC
addresses. May not be used in classify rules or in rules using
the :T chain qualifier.</para>
</listitem>
<listitem >
<para > $FW optionally followed by a colon (":") and a
comma-separated list of host or network IP addresses. matches
packets originating on the firewall. May not be used with a
chain qualifier (:P, :F, etc.) in the MARK column.</para>
</listitem>
</orderedlist>
2006-05-02 20:23:34 +02:00
<para > MAC addresses must be prefixed with "~" and use "-" as a
separator.</para>
<para > Example: ~00-A0-C9-15-39-78</para>
2009-02-04 00:56:17 +01:00
<para > If your kernel includes iprange match support, then address
ranges may be included in the address lists.</para>
2005-12-03 17:34:59 +01:00
</listitem>
<listitem >
2009-02-28 04:45:43 +01:00
<para > DEST - Destination of the packet.</para>
2009-02-04 00:56:17 +01:00
<para > May be:</para>
<orderedlist >
<listitem >
<para > An interface name. May not be used in the PREROUTING chain
(:P in the mark column or no chain qualifier and
MARK_IN_FORWARD_CHAIN=No in <ulink
url="manpages/shorewall.conf">shorewall.conf</ulink> (5)). The
interface name may be optionally followed by a colon (":") and
an IP address list.</para>
</listitem>
<listitem >
<para > A comma-separated list of host or network IP addresses.
The list may include ip address ranges if your kernel and
iptables include iprange support.</para>
</listitem>
</orderedlist>
2005-12-03 17:34:59 +01:00
</listitem>
<listitem >
2006-05-02 20:23:34 +02:00
<para > PROTO - Protocol - Must be "tcp", "udp", "icmp", "ipp2p",
"ipp2p:udp", "ipp2p:all" a number, or "all". "ipp2p" requires ipp2p
2006-05-05 23:38:05 +02:00
match support in your kernel and iptables.</para>
2005-12-03 17:34:59 +01:00
</listitem>
<listitem >
<para > PORT(S) - Destination Ports. A comma-separated list of Port
2006-05-02 20:23:34 +02:00
names (from /etc/services), port numbers or port ranges; if the
protocol is "icmp", this column is interpreted as the destination
icmp-type(s).</para>
<para > If the protocol is ipp2p, this column is interpreted as an
ipp2p option without the leading "--" (example "bit" for
2009-01-09 20:33:37 +01:00
bit-torrent). If no PORT is given, "ipp2p" is assumed. Note that the
xtables-addons version of IPP2P does not support the "ipp2p" option;
2009-02-28 04:45:43 +01:00
if the column is empty or contains "ipp2p" when using that version
of IPP2P, Shorewall will substitute "edk,kazaa,gnu,dc".</para>
2006-05-02 20:23:34 +02:00
<para > This column is ignored if PROTOCOL = all but must be entered
if any of the following field is supplied. In that case, it is
suggested that this field contain "-"</para>
2005-12-03 17:34:59 +01:00
</listitem>
<listitem >
<para > CLIENT PORT(S) - (Optional) Port(s) used by the client. If
omitted, any source port is acceptable. Specified as a
comma-separate list of port names, port numbers or port
ranges.</para>
</listitem>
<listitem >
2009-02-28 04:45:43 +01:00
<para > USER/GROUP (Optional) This column may only be non-empty if the
SOURCE is the firewall itself. When this column is non-empty, the
rule applies only if the program generating the output is running
under the effective user and/or group. It may contain :</para>
2005-12-03 17:34:59 +01:00
<para > [!][< user name or number> ]:[< group name or
number> ][+< program name> ]</para>
2008-08-15 07:03:24 +02:00
<para > The colon is optional when specifying only a user.</para>
2005-12-03 17:34:59 +01:00
<para > Examples:</para>
<programlisting > joe #program must be run by joe
:kids #program must be run by a member of the 'kids' group
!:kids #program must not be run by a member of the 'kids' group
+upnpd #program named upnpd (This feature was removed from Netfilter in kernel version 2.6.14).</programlisting>
</listitem>
2006-05-01 22:01:29 +02:00
<listitem >
2009-02-28 04:45:43 +01:00
<para > TEST (Optional) Defines a test on the existing packet or
connection mark. The rule will match only if the test returns true.
Tests have the format [!]< value> [/< mask> ][:C]</para>
2006-05-01 22:01:29 +02:00
<para > Where:</para>
<simplelist >
<member > ! Inverts the test (not equal)</member>
<member > < value> Value of the packet or connection
mark.</member>
<member > < mask> A mask to be applied to the mark before
testing</member>
<member > :C Designates a connection mark. If omitted, the packet
mark's value is tested.</member>
</simplelist>
</listitem>
2006-05-01 22:55:10 +02:00
<listitem >
2009-02-28 04:45:43 +01:00
<para > LENGTH (Optional) This field, if present, allows you to match
the length of a packet against a specific value or range of values.
A range is specified in the form < min> :< max> where
either < min> or < max> (but not both) may be omitted. If
2006-05-01 22:55:10 +02:00
< min> is omitted, then 0 is assumed; if < max> is
omitted, than any packet that is < min> or longer will
match.</para>
<para > You must have iptables length support for this to work. If you
2008-08-15 07:03:24 +02:00
let it empty or place an "-" here, no length match will be
2006-05-01 22:55:10 +02:00
done.</para>
<para > Examples: 1024, 64:1500, :100</para>
</listitem>
2006-05-02 20:02:03 +02:00
<listitem >
2009-02-28 04:45:43 +01:00
<para > TOS (Optional) Type of Service. Either a standard name, or a
numeric value to match.</para>
2006-05-02 20:02:03 +02:00
<blockquote >
<simplelist >
<member > Minimize-Delay (16)</member>
<member > Maximize-Throughput (8)</member>
<member > Maximize-Reliability (4)</member>
<member > Minimize-Cost (2)</member>
<member > Normal-Service (0)</member>
</simplelist>
</blockquote>
</listitem>
2008-06-05 22:39:05 +02:00
<listitem >
2009-02-28 04:45:43 +01:00
<para > HELPER (Optional). Names one of the Netfilter protocol helper
modules such as <emphasis > ftp</emphasis> , <emphasis > sip</emphasis> ,
2008-06-05 22:39:05 +02:00
<emphasis > amanda</emphasis> , etc.</para>
</listitem>
2005-12-03 17:34:59 +01:00
</itemizedlist>
2007-06-29 00:06:10 +02:00
<example id= "Example1" >
2005-12-03 17:34:59 +01:00
<title > </title>
<para > All packets arriving on eth1 should be marked with 1. All
packets arriving on eth2 and eth3 should be marked with 2. All packets
originating on the firewall itself should be marked with 3.</para>
2006-03-15 18:50:29 +01:00
<programlisting > #MARK SOURCE DESTINATION PROTOCOL PORT(S)
2005-12-03 17:34:59 +01:00
1 eth1 0.0.0.0/0 all
2 eth2 0.0.0.0/0 all
2 eth3 0.0.0.0/0 all
2009-02-04 00:56:17 +01:00
3 $FW 0.0.0.0/0 all</programlisting>
2005-12-03 17:34:59 +01:00
</example>
2007-06-29 00:06:10 +02:00
<example id= "Example2" >
2005-12-03 17:34:59 +01:00
<title > </title>
2009-02-04 00:56:17 +01:00
<para > All GRE (protocol 47) packets destined for 155.186.235.151
should be marked with 12.</para>
2005-12-03 17:34:59 +01:00
2006-03-15 18:50:29 +01:00
<programlisting > #MARK SOURCE DESTINATION PROTOCOL PORT(S)
2009-02-04 00:56:17 +01:00
12:T 0.0.0.0/0 155.182.235.151 47</programlisting>
2005-12-03 17:34:59 +01:00
</example>
2007-06-29 00:06:10 +02:00
<example id= "Example3" >
2005-12-03 17:34:59 +01:00
<title > </title>
2006-03-15 18:50:29 +01:00
<para > All SSH request packets originating in 192.168.1.0/24 and
destined for 155.186.235.151 should be marked with 22.</para>
2005-12-03 17:34:59 +01:00
2006-03-15 18:50:29 +01:00
<programlisting > #MARK SOURCE DESTINATION PROTOCOL PORT(S)
2009-02-04 00:56:17 +01:00
22:T 192.168.1.0/24 155.182.235.151 tcp 22</programlisting>
2005-12-03 17:34:59 +01:00
</example>
2006-03-15 18:50:29 +01:00
2007-06-29 00:06:10 +02:00
<example id= "Example4" >
2006-03-15 18:50:29 +01:00
<title > </title>
<para > All SSH packets packets going out of the first device in in
/etc/shorewall/tcdevices should be assigned to the class with mark
value 10.</para>
<programlisting > #MARK SOURCE DESTINATION PROTOCOL PORT(S) CLIENT
# PORT(S)
1:110 0.0.0.0/0 0.0.0.0/0 tcp 22
1:110 0.0.0.0/0 0.0.0.0/0 tcp - 22</programlisting>
</example>
2006-05-01 22:21:20 +02:00
2007-06-29 00:06:10 +02:00
<example id= "Example5" >
2006-05-01 22:21:20 +02:00
<title > </title>
<para > Mark all ICMP echo traffic with packet mark 1. Mark all peer to
peer traffic with packet mark 4.</para>
<para > This is a little more complex than otherwise expected. Since the
ipp2p module is unable to determine all packets in a connection are
P2P packets, we mark the entire connection as P2P if any of the
packets are determined to match. We assume packet/connection mark 0 to
2009-02-04 00:56:17 +01:00
means unclassified. Traffic originating on the firewall is not covered
by this example.</para>
2006-05-01 22:21:20 +02:00
<programlisting > #MARK SOURCE DESTINATION PROTOCOL PORT(S) CLIENT USER/ TEST
# PORT(S) GROUP
1 0.0.0.0/0 0.0.0.0/0 icmp echo-request
1 0.0.0.0/0 0.0.0.0/0 icmp echo-reply
RESTORE 0.0.0.0/0 0.0.0.0/0 all - - - 0
CONTINUE 0.0.0.0/0 0.0.0.0/0 all - - - !0
4 0.0.0.0/0 0.0.0.0/0 ipp2p:all
SAVE 0.0.0.0/0 0.0.0.0/0 all - - - !0</programlisting>
<para > The last four rules can be translated as:</para>
<blockquote >
2008-08-15 07:03:24 +02:00
<para > "If a packet hasn't been classified (packet mark is 0), copy
2006-05-01 22:21:20 +02:00
the connection mark to the packet mark. If the packet mark is set,
we're done. If the packet is P2P, set the packet mark to 4. If the
packet mark has been set, save it to the connection mark."</para>
</blockquote>
</example>
2008-06-05 22:39:05 +02:00
<example >
<title > </title>
<para > Mark all forwarded VOIP connections with connection mark 1 and
ensure that all VOIP packets also receive that mark (assumes that
2009-02-28 04:45:43 +01:00
nf_conntrack_sip is loaded).</para>
2008-06-05 22:39:05 +02:00
<programlisting > #MARK SOURCE DESTINATION PROTOCOL PORT(S) CLIENT USER/ TEST CONNBYTES TOS HELPER
# PORT(S) GROUP
RESTORE 0.0.0.0/0 0.0.0.0/0 all - - - 0
CONTINUE 0.0.0.0/0 0.0.0.0/0 all - - - !0
1 0.0.0.0/0 0.0.0.0/0 all - - - - - - sip
SAVE 0.0.0.0/0 0.0.0.0/0 all - - - !0</programlisting>
</example>
2005-12-03 17:34:59 +01:00
</section>
2007-06-29 00:06:10 +02:00
<section id= "ppp" >
2005-10-15 17:15:45 +02:00
<title > ppp devices</title>
2008-08-15 07:03:24 +02:00
<para > If you use ppp/pppoe/pppoa) to connect to your Internet provider
2005-11-03 16:30:41 +01:00
and you use traffic shaping you need to restart shorewall traffic
shaping. The reason for this is, that if the ppp connection gets
2008-08-15 07:03:24 +02:00
restarted (and it usually does this at least daily), all
2005-11-03 16:30:41 +01:00
<quote > tc</quote> filters/qdiscs related to that interface are
deleted.</para>
<para > The easiest way to achieve this, is just to restart shorewall once
the link is up. To achieve this add a small executable script
to<quote > /etc/ppp/ip-up.d</quote> .</para>
2005-10-15 17:15:45 +02:00
<programlisting > #! /bin/sh
2005-12-03 17:34:59 +01:00
/sbin/shorewall refresh</programlisting>
2005-10-15 17:15:45 +02:00
</section>
2007-06-29 00:06:10 +02:00
<section id= "Real" >
2005-10-07 01:29:16 +02:00
<title > Real life examples</title>
2005-10-07 16:44:39 +02:00
2009-01-21 21:54:00 +01:00
<section >
<title > A Shorewall User's Experience</title>
<para > Chuck Kollars has provided <ulink
url="http://www.ckollars.org/shaping.html">an excellent
writeup</ulink> about his traffic shaping experiences.</para>
</section>
2007-06-29 00:06:10 +02:00
<section id= "Wondershaper" >
2005-10-07 16:44:39 +02:00
<title > Configuration to replace Wondershaper</title>
<para > You are able to fully replace the wondershaper script by using
the buitin traffic control.You can find example configuration files at
<ulink
url="http://www1.shorewall.net/pub/shorewall/Samples/tc4shorewall/">"http://www1.shorewall.net/pub/shorewall/Samples/tc4shorewall/</ulink> .
Please note that they are just examples and need to be adjusted to
2008-04-06 20:55:43 +02:00
work for you. In this example it is assumed that your interface for
2008-08-15 07:03:24 +02:00
your Internet connection is ppp0 (for DSL), if you use another
2005-10-07 16:44:39 +02:00
connection type, you have to change it. You also need to change the
settings in the tcdevices.wondershaper file to reflect your line
speed. The relevant lines of the config files follow here. Please note
2008-04-06 20:55:43 +02:00
that this is just a 1:1 replacement doing exactly what wondershaper
2005-10-07 16:44:39 +02:00
should do. You are free to change it...</para>
2007-06-29 00:06:10 +02:00
<section id= "realtcd" >
2005-10-13 22:19:31 +02:00
<title > tcdevices file</title>
2005-10-11 23:48:53 +02:00
2005-10-13 22:19:31 +02:00
<programlisting > #INTERFACE IN-BANDWITH OUT-BANDWIDTH
2005-10-11 23:48:53 +02:00
ppp0 5000kbit 500kbit</programlisting>
2005-10-13 22:19:31 +02:00
</section>
2005-10-11 23:48:53 +02:00
2007-06-29 00:06:10 +02:00
<section id= "realtcc" >
2005-10-13 22:19:31 +02:00
<title > tcclasses file</title>
2005-10-07 16:44:39 +02:00
2005-10-13 22:19:31 +02:00
<programlisting > #INTERFACE MARK RATE CEIL PRIORITY OPTIONS
2007-08-16 16:14:14 +02:00
ppp0 1 5*full/10 full 1 tcp-ack,tos-minimize-delay
2007-08-16 16:11:15 +02:00
ppp0 2 3*full/10 9*full/10 2 default
ppp0 3 2*full/10 8*full/10 2</programlisting>
2005-10-13 22:19:31 +02:00
</section>
2005-10-07 16:44:39 +02:00
2007-06-29 00:06:10 +02:00
<section id= "realtcr" >
2005-10-13 22:19:31 +02:00
<title > tcrules file</title>
2005-10-07 16:44:39 +02:00
2005-10-13 22:19:31 +02:00
<programlisting > #MARK SOURCE DEST PROTO PORT(S) CLIENT USER
2005-10-07 01:29:16 +02:00
# PORT(S)
2006-05-05 23:38:05 +02:00
1:F 0.0.0.0/0 0.0.0.0/0 icmp echo-request
1:F 0.0.0.0/0 0.0.0.0/0 icmp echo-reply
2005-10-07 01:29:16 +02:00
# mark traffic which should have a lower priority with a 3:
# mldonkey
2005-11-18 00:01:36 +01:00
3 0.0.0.0/0 0.0.0.0/0 udp - 4666</programlisting>
2005-10-07 01:29:16 +02:00
2005-10-13 22:19:31 +02:00
<para > Wondershaper allows you to define a set of hosts and/or ports
you want to classify as low priority. To achieve this , you have to
add these hosts to tcrules and set the mark to 3 (true if you use
the example configuration files).</para>
</section>
2005-10-07 16:44:39 +02:00
2007-06-29 00:06:10 +02:00
<section id= "lowpro" >
2005-10-13 22:19:31 +02:00
<title > Setting hosts to low priority</title>
2005-10-07 01:29:16 +02:00
2005-10-13 22:19:31 +02:00
<para > lets assume the following settings from your old wondershaper
script (don't assume these example values are really useful, they
are only used for demonstrating ;-):</para>
2005-10-07 16:44:39 +02:00
2005-10-13 22:19:31 +02:00
<programlisting >
2005-10-07 01:29:16 +02:00
# low priority OUTGOING traffic - you can leave this blank if you want
# low priority source netmasks
NOPRIOHOSTSRC="192.168.1.128/25 192.168.3.28"
# low priority destination netmasks
NOPRIOHOSTDST=60.0.0.0/24
# low priority source ports
NOPRIOPORTSRC="6662 6663"
# low priority destination ports
2005-10-09 22:45:05 +02:00
NOPRIOPORTDST="6662 6663" </programlisting>
2005-10-07 01:29:16 +02:00
2005-10-13 22:19:31 +02:00
<para > This would result in the following additional settings to the
tcrules file:</para>
2005-10-07 16:44:39 +02:00
2005-10-13 22:19:31 +02:00
<programlisting > 3 192.168.1.128/25 0.0.0.0/0 all
2005-10-07 01:29:16 +02:00
3 192.168.3.28 0.0.0.0/0 all
3 0.0.0.0/0 60.0.0.0/24 all
3 0.0.0.0/0 0.0.0.0/0 udp 6662,6663
3 0.0.0.0/0 0.0.0.0/0 udp - 6662,6663
3 0.0.0.0/0 0.0.0.0/0 tcp 6662,6663
3 0.0.0.0/0 0.0.0.0/0 tcp - 6662,6663</programlisting>
2005-10-13 22:19:31 +02:00
</section>
2005-10-11 23:48:53 +02:00
</section>
2005-10-13 22:19:31 +02:00
2007-06-29 00:06:10 +02:00
<section id= "simiple" >
2005-10-11 23:48:53 +02:00
<title > A simple setup</title>
2005-10-13 22:19:31 +02:00
2008-08-15 07:03:24 +02:00
<para > This is a simple setup for people sharing an Internet connection
2005-10-13 22:19:31 +02:00
and using different computers for this. It just basically shapes
between 2 hosts which have the ip addresses 192.168.2.23 and
192.168.2.42</para>
2007-06-29 00:06:10 +02:00
<section id= "simpletcd" >
2005-10-13 22:19:31 +02:00
<title > tcdevices file</title>
<programlisting > #INTERFACE IN-BANDWITH OUT-BANDWIDTH
2005-10-11 23:48:53 +02:00
ppp0 6000kbit 700kbit</programlisting>
2005-10-13 22:19:31 +02:00
<para > We have 6mbit down and 700kbit upstream.</para>
</section>
2007-06-29 00:06:10 +02:00
<section id= "simpletcc" >
2005-10-13 22:19:31 +02:00
<title > tcclasses file</title>
2005-10-11 23:48:53 +02:00
2005-10-13 22:48:28 +02:00
<programlisting > #INTERFACE MARK RATE CEIL PRIORITY OPTIONS
2008-07-12 19:10:56 +02:00
ppp0 1 10kbit 50kbit 1 tcp-ack,tos-minimize-delay
2005-10-11 23:48:53 +02:00
ppp0 2 300kbit full 2
ppp0 3 300kbit full 2
2005-10-13 22:48:28 +02:00
ppp0 4 90kbit 200kbit 3 default</programlisting>
2005-10-11 23:48:53 +02:00
2005-10-13 22:19:31 +02:00
<para > We add a class for tcp ack packets with highest priority, so
that downloads are fast. The following 2 classes share most of the
bandwidth between the 2 hosts, if the connection is idle, they may
use full speed. As the hosts should be treated equally they have the
same priority. The last class is for the remaining traffic.</para>
</section>
2005-10-11 23:48:53 +02:00
2007-06-29 00:06:10 +02:00
<section id= "simpletcr" >
2005-10-13 22:19:31 +02:00
<title > tcrules file</title>
2005-10-11 23:48:53 +02:00
2005-10-13 22:48:28 +02:00
<programlisting > #MARK SOURCE DEST PROTO PORT(S) CLIENT USER
# PORT(S)
2006-05-05 23:38:05 +02:00
1:F 0.0.0.0/0 0.0.0.0/0 icmp echo-request
1:F 0.0.0.0/0 0.0.0.0/0 icmp echo-reply
2:F 192.168.2.23 0.0.0.0/0 all
3:F 192.168.2.42 0.0.0.0/0 all</programlisting>
2005-10-11 23:48:53 +02:00
2005-10-13 22:19:31 +02:00
<para > We mark icmp ping and replies so they will go into the fast
interactive class and set a mark for each host.</para>
</section>
2005-10-07 01:29:16 +02:00
</section>
</section>
2005-10-07 16:44:39 +02:00
</section>
2005-10-07 01:29:16 +02:00
2007-06-29 00:06:10 +02:00
<section id= "Xen" >
2007-04-12 00:53:13 +02:00
<title > A Warning to Xen Users</title>
<para > If you are running traffic shaping in your dom0 and traffic shaping
doesn't seem to be limiting outgoing traffic properly, it may be due to
"checksum offloading" in your domU(s). Check the output of "shorewall show
tc". Here's an excerpt from the output of that command:</para>
<programlisting > class htb 1:130 parent 1:1 leaf 130: prio 3 quantum 1500 rate 76000bit <emphasis
role="bold">ceil 230000bit</emphasis> burst 1537b/8 mpu 0b overhead 0b cburst 1614b/8 mpu 0b overhead 0b level 0
Sent 559018700 bytes 75324 pkt (dropped 0, overlimits 0 requeues 0)
<emphasis role= "bold" > rate 299288bit</emphasis> 3pps backlog 0b 0p requeues 0
lended: 53963 borrowed: 21361 <emphasis role= "bold" > giants: 90174</emphasis>
tokens: -26688 ctokens: -14783</programlisting>
<para > There are two obvious problems in the above output:</para>
<orderedlist >
<listitem >
<para > The rate (299288) is considerably larger than the ceiling
(230000).</para>
</listitem>
<listitem >
<para > There are a large number (90174) of giants reported.</para>
</listitem>
</orderedlist>
<para > This problem will be corrected by disabling "checksum offloading" in
your domU(s) using the <command > ethtool</command> utility. See the <ulink
url="XenMyWay-Routed.html">one of the Xen articles</ulink> for
instructions.</para>
</section>
2008-07-12 19:10:56 +02:00
<section id= "Downloads" >
<title > Shaping Download Traffic</title>
<para > As stated at the outset, traffic shaping works on traffic being sent
by the firewall. Download traffic from the Internet to local hosts is sent
by the firewall over a local interface. So it follows that if you want to
shape such traffic, you must configure shaping on the local
interface.</para>
<para > Shaping of download traffic is most straightforward when there are
only two interface. That way, traffic leaving the local interface falls
into only two broad categories:</para>
<itemizedlist >
<listitem >
2008-08-15 07:03:24 +02:00
<para > Traffic being forwarded from the Internet</para>
2008-07-12 19:10:56 +02:00
</listitem>
<listitem >
<para > Traffic that originated on the firewall itself</para>
</listitem>
</itemizedlist>
<para > In general, you will want to shape the forwarded traffic and leave
the local traffic unrestricted.</para>
<para > Extending the <link linkend= "simiple" > simple example</link>
above:</para>
<para > <filename > /etc/shorewall/tcdevices</filename> :<programlisting > #INTERFACE IN-BANDWITH OUT-BANDWIDTH
ppp0 6000kbit 700kbit
eth1 - 100mbit</programlisting> </para>
<para > /etc/shorewall/tcclasses:<programlisting > #INTERFACE MARK RATE CEIL PRIORITY OPTIONS
ppp0 1 10kbit 50kbit 1 tcp-ack,tos-minimize-delay
ppp0 2 300kbit full 2
ppp0 3 300kbit full 2
ppp0 4 90kbit 200kbit 3 default
2008-07-12 19:39:06 +02:00
eth0 1 100kbit 500kbit 1 tcp-ack
2008-07-12 19:10:56 +02:00
eth0 2 3mbit 6mbit 2
eth0 3 3mbit 6mbit 3
eth0 4 94mbit full default #for local traffic</programlisting> </para>
<para > /etc/shorewall/tcrules:<programlisting > #MARK SOURCE DEST PROTO PORT(S) CLIENT USER
# PORT(S)
1:F 0.0.0.0/0 0.0.0.0/0 icmp echo-request
1:F 0.0.0.0/0 0.0.0.0/0 icmp echo-reply
2:F 192.168.2.23 0.0.0.0/0 all
3:F 192.168.2.42 0.0.0.0/0 all
2:F ppp0 192.168.2.23 all
3:F ppp0 192.168.2.42 all</programlisting> </para>
</section>
2008-03-20 20:37:14 +01:00
<section id= "IFB" >
<title > Intermediate Frame Block (IFB) Devices</title>
2009-02-28 04:45:43 +01:00
<para > The principles behind an IFB is fairly simple:</para>
2008-03-20 20:37:14 +01:00
<itemizedlist >
<listitem >
<para > It looks like a network interface although it is never given an
IPv4 configuration.</para>
</listitem>
<listitem >
<para > Because it is a network interface, queuing disciplines can be
associated with an IFB.</para>
</listitem>
</itemizedlist>
<para > The magic of an IFB comes in the fact that a filter may be defined
on a real network interface such that each packet that arrives on that
interface is queued for the IFB! In that way, the IFB provides a means for
shaping input traffic.</para>
<para > To use an IFB, you must have IFB support in your kernel
(configuration option CONFIG_IFB). Assuming that you have a modular
kernel, the name of the IFB module is 'ifb' and may be loaded using the
command <command > modprobe ifb</command> (if you have modprobe installed)
or <command > insmod /path/to/module/ifb</command> .</para>
<para > By default, two IFB devices (ifb0 and ifb1) are created. You can
control that using the numifbs option (e.g., <command > modprobe ifb
numifbs=1</command> ).</para>
<para > To create a single IFB when Shorewall starts, place the following
two commands in <filename > /etc/shorewall/init</filename> :</para>
<programlisting > <command > modprobe ifb numifbs=1
ip link set ifb0 up</command> </programlisting>
<para > Entries in <filename > /etc/shorewall/tcrules</filename> have no
effect on shaping traffic through an IFB. To allow classification of such
traffic, the /etc/shorewall/tcfilters file has been added. Entries in that
2008-03-22 17:32:57 +01:00
file create <ulink url= "http://b42.cz/notes/u32_classifier/" > u32
2008-03-20 20:37:14 +01:00
classification rules</ulink> .</para>
<section id= "tcfilters" >
<title > /etc/shorewall/tcfilters</title>
<para > While this file was created to allow shaping of traffic through an
IFB, the file may be used for general traffic classification as well.
The file is similar to <ulink
url="shorewall-tcrules.html">shorewall-tcrules</ulink> (5) with the
following key exceptions:</para>
<itemizedlist >
<listitem >
<para > The first match determines the classification, whereas in the
tcrules file, the last match determines the classification.</para>
</listitem>
<listitem >
<para > ipsets are not supported</para>
</listitem>
<listitem >
<para > DNS Names are not supported</para>
</listitem>
<listitem >
<para > filters are applied to packets as they <emphasis > appear on the
wire</emphasis> . So incoming packets will not have DNAT applied yet
(the destination IP address will be the external address) and
outgoing packets will have had SNAT applied.</para>
</listitem>
</itemizedlist>
<para > The last point warrants elaboration. When looking at traffic being
shaped by an IFB, there are two cases to consider:</para>
<orderedlist >
<listitem >
<para > Requests — packets being sent from remote clients to local
servers. These packets may undergo subsequent DNAT, either as a
result of entries in <filename > /etc/shorewall/nat</filename> or as a
result of DNAT or REDIRECT rules.</para>
<para > Example: <filename > /etc/shorewall/rules</filename> :</para>
<programlisting > #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL
# PORT(S) PORT(S) DEST
DNAT net dmz:192.168.4.5 tcp 80 - 206.124.146.177</programlisting>
<para > Requests redirected by this rule will have destination IP
address 206.124.146.177 and destination port 80.</para>
</listitem>
<listitem >
<para > Responses — packets being sent from remote servers to local
clients. These packets may undergo subsequent DNAT as a result of
entries in <filename > /etc/shorewall/nat</filename> or in
<filename > /etc/shorewall/masq</filename> . The packet's destination
IP address will be the external address specified in the
entry.</para>
<para > Example:
<filename > /etc/shorewall/masq</filename> :<programlisting > #INTERFACE SOURCE ADDRESS
eth0 192.168.1.0/24 206.124.146.179</programlisting> </para>
<para > HTTP response packets corresponding to requests that fall
under that rule will have destination IP address 206.124.146.179 and
<emphasis role= "bold" > source</emphasis> port 80.</para>
</listitem>
</orderedlist>
<para > Columns in the file are as follow. As in all Shorewall
configuration files, a hyphen ("-") may be used to indicate that no
value is supplied in the column.</para>
<variablelist >
<varlistentry >
<term > CLASS</term>
<listitem >
<para > The interface name or number followed by a colon (":") and
the class number.</para>
</listitem>
</varlistentry>
<varlistentry >
<term > SOURCE</term>
<listitem >
<para > SOURCE IP address (host or network). DNS names are not
allowed.</para>
</listitem>
</varlistentry>
<varlistentry >
<term > DEST</term>
<listitem >
<para > DESTINATION IP address (host or network). DNS names are not
allowed.</para>
</listitem>
</varlistentry>
<varlistentry >
<term > PROTO</term>
<listitem >
<para > Protocol name or number.</para>
</listitem>
</varlistentry>
<varlistentry >
2008-03-21 17:08:25 +01:00
<term > DEST PORT(S)</term>
2008-03-20 20:37:14 +01:00
<listitem >
2008-03-21 17:08:25 +01:00
<para > Comma-separated list of destination port names or numbers.
2008-03-21 18:08:55 +01:00
May only be specified if the protocol is TCP, UDP, SCTP or ICMP.
Port ranges are supported except for ICMP.</para>
2008-03-20 20:37:14 +01:00
</listitem>
</varlistentry>
<varlistentry >
<term > SOURCE PORT</term>
<listitem >
2008-03-21 17:08:25 +01:00
<para > Comma-separated list of source port names or numbers. May
2008-03-21 18:08:55 +01:00
only be specified if the protocol is TCP, UDP or SCTP. Port ranges
are supported.</para>
2008-03-20 20:37:14 +01:00
</listitem>
</varlistentry>
</variablelist>
<para > Example:</para>
<para > I've used this configuration on my own firewall. The IFB portion
is more for test purposes rather than to serve any well-reasoned QOS
strategy.</para>
<para > <filename > /etc/shorewall/init</filename> :<programlisting > qt modprobe ifb numifbs=1
qt ip link set dev ifb0 up</programlisting> </para>
<para > <filename > /etc/shorewall/tcdevices</filename> :<programlisting > #INTERFACE IN-BANDWITH OUT-BANDWIDTH OPTIONS REDIRECTED
# INTERFACES
1:eth0 - 384kbit classify
2:ifb0 - 1300kbit - eth0</programlisting>
<filename > /etc/shorewall/tcclasses</filename> :<programlisting > #INTERFACE MARK RATE CEIL PRIORITY OPTIONS
1:110 - 5*full/10 full 1 tcp-ack,tos-minimize-delay
1:120 - 2*full/10 6*full/10 2 default
1:130 - 2*full/10 6*full/10 3
2:110 - 5*full/10 full 1 tcp-ack,tos-minimize-delay
2:120 - 2*full/10 6*full/10 2 default
2:130 - 2*full/10 6*full/10 3</programlisting> <filename > /etc/shorewall/tcfilters</filename> :<programlisting > #INTERFACE: SOURCE DEST PROTO DEST SOURCE
2008-03-21 17:08:25 +01:00
#CLASS PORT(S) PORT(S)
2008-03-20 20:37:14 +01:00
#
# OUTGOING TRAFFIC
#
2008-03-21 17:08:25 +01:00
1:130 206.124.146.178 - tcp - 49441,49442 #BITTORRENT on wookie
1:110 206.124.146.178 #wookie
1:110 206.124.146.179 #SNAT of internal systems
1:110 206.124.146.180 #Work Laptop
1:110 - - icmp echo-request,echo-reply
2008-03-20 20:37:14 +01:00
1:110 - - icmp echo-reply
2008-03-21 17:08:25 +01:00
1:130 206.124.146.177 - tcp - 873,25 #Bulk Traffic
2008-03-20 20:37:14 +01:00
#
# INCOMING TRAFFIC
#
2:110 - 206.124.146.178 #Wookie
2:110 - 206.124.146.179 #SNAT Responses
2:110 - 206.124.146.180 #Work Laptop
2:130 - 206.124.146.177 tcp 25 #Incoming Email.</programlisting> </para>
2008-03-21 03:35:56 +01:00
<para > You can examine the installed filters with the <command > shorewall
show filters</command> command. What follows shows the output for
<filename class= "devicefile" > eth0</filename> with the filters shown
above. <emphasis role= "bold" > Bold font</emphasis> are comments
2008-03-21 17:08:25 +01:00
explaining the rules.<programlisting > gateway:~ # shorewall-lite show filters
2008-08-15 07:05:01 +02:00
Shorewall Lite 4.1.6 Classifiers at gateway - Fri Mar 21 08:06:47 PDT 2008
2008-03-21 03:35:56 +01:00
Device eth1:
Device eth2:
Device eth0:
2008-03-21 17:08:25 +01:00
filter parent 1: protocol ip pref 10 u32
filter parent 1: protocol ip pref 10 u32 <emphasis role= "bold" > fh 3:</emphasis> ht divisor 1 <emphasis
role="bold"> < ========= Start of table 3. parses TCP header</emphasis>
filter parent 1: protocol ip pref 10 u32 <emphasis role= "bold" > fh 3</emphasis> ::800 order 2048 key ht 3 bkt 0 <emphasis
role="bold">flowid 1:130</emphasis> (rule hit 102 success 0)
match 03690000/ffff0000 at nexthdr+0 (success 0 ) <emphasis
role="bold"> < ========= SOURCE PORT 873 goes to class 1:130</emphasis>
2008-03-21 03:35:56 +01:00
filter parent 1: protocol ip pref 10 u32 <emphasis role= "bold" > fh 2:</emphasis> ht divisor 1 <emphasis
2008-03-21 17:08:25 +01:00
role="bold"> < ========= Start of table 2. parses ICMP header</emphasis>
2008-03-21 03:35:56 +01:00
2008-03-21 17:08:25 +01:00
filter parent 1: protocol ip pref 10 u32 <emphasis role= "bold" > fh 2</emphasis> ::800 order 2048 key ht 2 bkt 0 <emphasis
role="bold">flowid 1:110</emphasis> (rule hit 0 success 0)
match 08000000/ff000000 at nexthdr+0 (success 0 ) <emphasis
role="bold"> < ========= ICMP Type 8 goes to class 1:110</emphasis>
filter parent 1: protocol ip pref 10 u32 <emphasis role= "bold" > fh 2</emphasis> ::801 order 2049 key ht 2 bkt 0 <emphasis
role="bold">flowid 1:110</emphasis> (rule hit 0 success 0)
match 00000000/ff000000 at nexthdr+0 (success 0 ) <emphasis
role="bold"> < ========= ICMP Type 0 goes to class 1:110</emphasis>
2008-03-21 03:35:56 +01:00
filter parent 1: protocol ip pref 10 u32 <emphasis role= "bold" > fh 1:</emphasis> ht divisor 1 <emphasis
2008-03-21 17:08:25 +01:00
role="bold"> < ========= Start of table 1. parses TCP header</emphasis>
2008-03-21 03:35:56 +01:00
2008-03-21 17:08:25 +01:00
filter parent 1: protocol ip pref 10 u32 <emphasis role= "bold" > fh 1:</emphasis> :800 order 2048 key ht 1 bkt 0 <emphasis
role="bold">flowid 1:130</emphasis> (rule hit 0 success 0)
match c1210000/ffff0000 at nexthdr+0 (success 0 ) <emphasis
role="bold"> < ========= SOURCE PORT 49441 goes to class 1:130</emphasis>
filter parent 1: protocol ip pref 10 u32 <emphasis role= "bold" > fh 1</emphasis> ::801 order 2049 key ht 1 bkt 0 <emphasis
role="bold">flowid 1:130</emphasis> (rule hit 0 success 0)
match c1220000/ffff0000 at nexthdr+0 (success 0 ) <emphasis
role="bold"> < ========= SOURCE PORT 49442 goes to class 1:130</emphasis>
2008-03-21 03:35:56 +01:00
filter parent 1: protocol ip pref 10 u32 <emphasis role= "bold" > fh 800:</emphasis> ht divisor 1 <emphasis
role="bold">< ========= Start of Table 800. Packets start here!</emphasis>
<emphasis role= "bold" > =============== The following 2 rules are generated by the class definition in /etc/shorewall/classes ==================</emphasis>
2008-03-21 17:08:25 +01:00
filter parent 1: protocol ip pref 10 u32 <emphasis role= "bold" > fh 800:</emphasis> :800 order 2048 key ht 800 bkt 0 <emphasis
role="bold">flowid 1:110</emphasis> (rule hit 2204 success 138)
match 00060000/00ff0000 at 8 (success 396 ) <emphasis
2008-03-21 03:35:56 +01:00
role="bold">< ========= TCP </emphasis>
2008-03-21 17:08:25 +01:00
match 05000000/0f00ffc0 at 0 (success 250 ) <emphasis
2008-03-21 03:35:56 +01:00
role="bold">< ========= Header length 20 and Packet Length < 64</emphasis>
2008-03-21 17:08:25 +01:00
match 00100000/00ff0000 at 32 (success 138 ) <emphasis
2008-03-21 03:35:56 +01:00
role="bold">< ========= ACK</emphasis>
2008-03-21 17:08:25 +01:00
filter parent 1: protocol ip pref 10 u32 <emphasis role= "bold" > fh 800:</emphasis> :801 order 2049 key ht 800 bkt 0 <emphasis
role="bold">flowid 1:110</emphasis> (rule hit 2066 success 0)
match 00100000/00100000 at 0 (success 0 ) <emphasis
2008-03-21 03:35:56 +01:00
role="bold">< ========= Minimize-delay</emphasis> <emphasis
2008-03-22 16:57:05 +01:00
role="bold"> goes to class 1:110</emphasis>
2008-03-21 03:35:56 +01:00
2008-03-21 17:08:25 +01:00
<emphasis role= "bold" > =============== Jump to Table 1 if the matches are met ==================</emphasis>
2008-03-21 03:35:56 +01:00
2008-03-21 17:08:25 +01:00
filter parent 1: protocol ip pref 10 u32 <emphasis role= "bold" > fh 800:</emphasis> :802 order 2050 key ht 800 bkt 0 <emphasis
role="bold">link 1:</emphasis> (rule hit 2066 success 0)
match ce7c92b2/ffffffff at 12 (success 1039 ) <emphasis
role="bold">< ========= SOURCE 206.124.146.178 </emphasis>
match 00060000/00ff0000 at 8 (success 0 ) <emphasis
2008-03-21 03:35:56 +01:00
role="bold">< ========= PROTO TCP</emphasis>
offset 0f00> > 6 at 0 eat
2008-03-21 17:08:25 +01:00
filter parent 1: protocol ip pref 10 u32 <emphasis role= "bold" > fh 800:</emphasis> :803 order 2051 key ht 800 bkt 0 <emphasis
role="bold">flowid 1:110</emphasis> (rule hit 2066 success 1039)
match ce7c92b2/ffffffff at 12 (success 1039 ) <emphasis
2008-03-21 03:35:56 +01:00
role="bold">< ========= SOURCE 206.124.146.178 goes to class 1:110</emphasis>
2008-03-21 17:08:25 +01:00
filter parent 1: protocol ip pref 10 u32 <emphasis role= "bold" > fh 800:</emphasis> :804 order 2052 key ht 800 bkt 0 <emphasis
role="bold">flowid 1:110</emphasis> (rule hit 1027 success 132)
match ce7c92b3/ffffffff at 12 (success 132 ) <emphasis
role="bold"> < ========= SOURCE 206.124.146.179 goes to class 1:110</emphasis>
2008-03-21 03:35:56 +01:00
2008-03-21 17:08:25 +01:00
filter parent 1: protocol ip pref 10 u32 <emphasis role= "bold" > fh 800:</emphasis> :805 order 2053 key ht 800 bkt 0 <emphasis
role="bold">flowid 1:110</emphasis> (rule hit 895 success 603)
match ce7c92b4/ffffffff at 12 (success 603 ) <emphasis
2008-03-21 03:35:56 +01:00
role="bold">< ========= SOURCE 206.124.146.180 goes to class 1:110</emphasis>
2008-03-21 17:08:25 +01:00
<emphasis role= "bold" > =============== Jump to Table 2 if the matches are met ==================</emphasis>
2008-03-21 03:35:56 +01:00
2008-03-21 17:08:25 +01:00
filter parent 1: protocol ip pref 10 u32 <emphasis role= "bold" > fh 800:</emphasis> :806 order 2054 key ht 800 bkt 0 <emphasis
role="bold">link 2:</emphasis> (rule hit 292 success 0)
2008-03-21 03:35:56 +01:00
match 00010000/00ff0000 at 8 (success 0 ) <emphasis
2008-03-21 17:08:25 +01:00
role="bold">< ========= PROTO ICMP</emphasis>
offset 0f00> > 6 at 0 eat
2008-03-21 03:35:56 +01:00
2008-03-21 17:08:25 +01:00
<emphasis role= "bold" > =============== Jump to Table 3 if the matches are met ==================</emphasis>
filter parent 1: protocol ip pref 10 u32 <emphasis role= "bold" > fh 800:</emphasis> :807 order 2055 key ht 800 bkt 0 <emphasis
role="bold">link 3:</emphasis> (rule hit 292 success 0)
match ce7c92b1/ffffffff at 12 (success 265 ) <emphasis
2008-03-21 03:35:56 +01:00
role="bold">< ========= SOURCE 206.124.146.177</emphasis>
2008-03-21 17:08:25 +01:00
match 00060000/00ff0000 at 8 (success 102 ) <emphasis
2008-03-21 03:35:56 +01:00
role="bold">< ========= PROTO TCP</emphasis>
2008-03-21 17:08:25 +01:00
offset 0f00> > 6 at 0 eat </programlisting> </para>
2008-03-20 20:37:14 +01:00
</section>
</section>
2008-03-22 16:20:58 +01:00
<section id= "show" >
<title > Understanding the output of 'shorewall show tc'</title>
<para > The <command > shorewall show tc</command> (<command > shorewall-lite
show tc</command> ) command displays information about the current state of
traffic shaping. For each device, it executes the following
commands:</para>
<programlisting > echo Device $device:
tc -s -d qdisc show dev $device
echo
tc -s -d class show dev $device
echo </programlisting>
<para > So, the traffic-shaping output is generated entirely by the
<command > tc</command> utility.</para>
<para > Here's the output of for eth0. The configuration is the one shown in
the preceding section (the output was obtained almost 24 hours later than
the <command > shorewall show filters</command> output shown above).</para>
<programlisting > Device eth0:
<emphasis role= "bold" > ============== The primary queuing discipline is HTB (Hierarchical Token Bucket) ==================== </emphasis>
qdisc htb 1: r2q 10 default 120 direct_packets_stat 9 ver 3.17
Sent 2133336743 bytes 4484781 pkt (dropped 198, overlimits 4911403 requeues 21) <emphasis
role="bold">< =========== Note the overlimits and dropped counts</emphasis>
rate 0bit 0pps backlog 0b 8p requeues 21
<emphasis role= "bold" > ============== The ingress filter. If you specify IN-BANDWIDTH, you can see the 'dropped' count here. =========</emphasis>
<emphasis role= "bold" > In this case, the packets are being sent to the IFB for shaping</emphasis>
qdisc ingress ffff: ----------------
Sent 4069015112 bytes 4997252 pkt (dropped 0, overlimits 0 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
<emphasis role= "bold" > ============ Each of the leaf HTB classes has an SFQ qdisc to ensure that each flow gets its turn ============</emphasis>
qdisc sfq 110: parent 1:110 limit 128p quantum 1514b flows 128/1024 perturb 10sec
Sent 613372519 bytes 2870225 pkt (dropped 0, overlimits 0 requeues 6)
rate 0bit 0pps backlog 0b 0p requeues 6
qdisc sfq 120: parent 1:120 limit 128p quantum 1514b flows 128/1024 perturb 10sec
Sent 18434920 bytes 60961 pkt (dropped 0, overlimits 0 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
qdisc sfq 130: parent 1:130 limit 128p quantum 1514b flows 128/1024 perturb 10sec
Sent 1501528722 bytes 1553586 pkt (dropped 198, overlimits 0 requeues 15)
rate 0bit 0pps backlog 11706b 8p requeues 15
<emphasis role= "bold" > ============= Class 1:110 -- the high-priority class ===========
Note the rate and ceiling calculated from 'full'</emphasis>
2008-03-22 16:57:05 +01:00
class htb <emphasis role= "bold" > 1:110</emphasis> parent 1:1 leaf 110: prio 1 quantum 4800 <emphasis
role="bold">rate 192000bit ceil 384000bit</emphasis> burst 1695b/8 mpu 0b overhead 0b cburst 1791b/8 mpu 0b overhead 0b level 0
2008-03-22 16:20:58 +01:00
Sent 613372519 bytes 2870225 pkt (dropped 0, overlimits 0 requeues 0)
<emphasis role= "bold" > rate 195672bit 28pps backlog 0b 0p</emphasis> requeues 0 <emphasis
role="bold">< =========== Note the current rate of traffic. There is no queuing (no packet backlog)</emphasis>
lended: 2758458 borrowed: 111773 giants:
tokens: 46263 ctokens: 35157
<emphasis role= "bold" > ============== The root class ============</emphasis>
2008-03-22 16:57:05 +01:00
class htb <emphasis role= "bold" > 1:1 root</emphasis> rate 384000bit ceil 384000bit burst 1791b/8 mpu 0b overhead 0b cburst 1791b/8 mpu 0b overhead 0b level 7
<emphasis role= "bold" > Sent 2133276316 bytes 4484785 pkt</emphasis> (dropped 0, overlimits 0 requeues 0) <emphasis
role="bold">< ==== Total output traffic since last 'restart'</emphasis>
2008-03-22 16:20:58 +01:00
rate 363240bit 45pps backlog 0b 0p requeues 0
lended: 1081936 borrowed: 0 giants: 0
tokens: -52226 ctokens: -52226
<emphasis role= "bold" > ============= Bulk Class (outgoing rsync, email and bittorrent) ============</emphasis>
class htb 1:130 parent 1:1 leaf 130: prio 3 quantum 1900 rate 76000bit ceil 230000bit burst 1637b/8 mpu 0b overhead 0b cburst 1714b/8 mpu 0b overhead 0b level 0
Sent 1501528722 bytes 1553586 pkt (dropped 198, overlimits 0 requeues 0)
<emphasis role= "bold" > rate 162528bit 14pps backlog 0b 8p</emphasis> requeues 0 <emphasis
role="bold">< ======== Queuing is occurring (8 packet backlog). The rate is still below the ceiling.</emphasis>
lended: 587134 borrowed: 966459 giants: 0 <emphasis role= "bold" > During peak activity, the rate tops out at around 231000 (just above ceiling).</emphasis>
tokens: -30919 ctokens: -97657
<emphasis role= "bold" > ================= Default class (mostly serving web pages) ===============</emphasis>
class htb 1:120 parent 1:1 leaf 120: prio 2 quantum 1900 rate 76000bit ceil 230000bit burst 1637b/8 mpu 0b overhead 0b cburst 1714b/8 mpu 0b overhead 0b level 0
Sent 18434920 bytes 60961 pkt (dropped 0, overlimits 0 requeues 0)
rate 2240bit 2pps backlog 0b 0p requeues 0
lended: 57257 borrowed: 3704 giants: 0
tokens: 156045 ctokens: 54178
</programlisting>
</section>
2007-06-29 00:06:10 +02:00
<section id= "External" >
2005-10-07 16:44:39 +02:00
<title id= "tcstart" > Using your own tc script</title>
2005-10-07 01:29:16 +02:00
<section id= "owntcstart" >
<title > Replacing builtin tcstart file</title>
2004-02-14 19:06:39 +01:00
2005-10-07 16:44:39 +02:00
<para > If you prefer your own tcstart file, just install it in
/etc/shorewall/tcstart.</para>
<para > In your tcstart script, when you want to run the <quote > tc</quote>
utility, use the run_tc function supplied by Shorewall if you want tc
errors to stop the firewall.</para>
<orderedlist >
<listitem >
<para > Set TC_ENABLED=Yes and CLEAR_TC=Yes</para>
</listitem>
<listitem >
<para > Supply an /etc/shorewall/tcstart script to configure your
traffic shaping rules.</para>
</listitem>
<listitem >
<para > Optionally supply an /etc/shorewall/tcclear script to stop
traffic shaping. That is usually unnecessary.</para>
</listitem>
<listitem >
<para > If your tcstart script uses the <quote > fwmark</quote>
classifier, you can mark packets using entries in
/etc/shorewall/tcrules.</para>
</listitem>
</orderedlist>
</section>
2004-02-14 19:06:39 +01:00
2007-06-29 00:06:10 +02:00
<section id= "Start" >
2005-10-07 16:44:39 +02:00
<title > Traffic control outside Shorewall</title>
<para > To start traffic shaping when you bring up your network
interfaces, you will have to arrange for your traffic shaping
configuration script to be run at that time. How you do that is
distribution dependent and will not be covered here. You then
should:</para>
<orderedlist >
<listitem >
<para > Set TC_ENABLED=No and CLEAR_TC=No</para>
</listitem>
<listitem >
<para > If your script uses the <quote > fwmark</quote> classifier, you
can mark packets using entries in /etc/shorewall/tcrules.</para>
</listitem>
</orderedlist>
2005-10-07 01:29:16 +02:00
</section>
2004-02-14 19:06:39 +01:00
</section>
2007-01-03 18:30:00 +01:00
2007-06-29 00:06:10 +02:00
<section id= "Testing" >
2007-01-03 18:30:00 +01:00
<title > Testing Tools</title>
<para > At least one Shorewall user has found this tool helpful: <ulink
url="http://e2epi.internet2.edu/network-performance-toolkit.html">http://e2epi.internet2.edu/network-performance-toolkit.html</ulink> </para>
</section>
2008-08-15 07:03:24 +02:00
</article>