2005-11-16 23:11:52 +01:00
|
|
|
<?xml version="1.0" encoding="UTF-8"?>
|
2008-07-04 17:11:51 +02:00
|
|
|
|
|
|
|
|
2005-11-16 23:11:52 +01:00
|
|
|
<article>
|
2008-02-13 20:11:02 +01:00
|
|
|
<!--ble$Id$-->
|
2005-11-16 23:11:52 +01:00
|
|
|
|
|
|
|
<articleinfo>
|
|
|
|
<title>Shorewall and Multiple Internet Connections</title>
|
|
|
|
|
|
|
|
<authorgroup>
|
|
|
|
<author>
|
|
|
|
<firstname>Tom</firstname>
|
|
|
|
|
|
|
|
<surname>Eastep</surname>
|
|
|
|
</author>
|
|
|
|
</authorgroup>
|
|
|
|
|
2006-07-07 03:04:16 +02:00
|
|
|
<pubdate><?dbtimestamp format="Y/m/d"?></pubdate>
|
2005-11-16 23:11:52 +01:00
|
|
|
|
|
|
|
<copyright>
|
|
|
|
<year>2005</year>
|
|
|
|
|
2006-01-03 00:21:05 +01:00
|
|
|
<year>2006</year>
|
|
|
|
|
2007-02-16 00:55:20 +01:00
|
|
|
<year>2007</year>
|
|
|
|
|
2008-02-13 20:11:02 +01:00
|
|
|
<year>2008</year>
|
|
|
|
|
2005-11-16 23:11:52 +01:00
|
|
|
<holder>Thomas M. Eastep</holder>
|
|
|
|
</copyright>
|
|
|
|
|
|
|
|
<legalnotice>
|
|
|
|
<para>Permission is granted to copy, distribute and/or modify this
|
|
|
|
document under the terms of the GNU Free Documentation License, Version
|
|
|
|
1.2 or any later version published by the Free Software Foundation; with
|
|
|
|
no Invariant Sections, with no Front-Cover, and with no Back-Cover
|
|
|
|
Texts. A copy of the license is included in the section entitled
|
|
|
|
<quote><ulink url="GnuCopyright.htm">GNU Free Documentation
|
|
|
|
License</ulink></quote>.</para>
|
|
|
|
</legalnotice>
|
|
|
|
</articleinfo>
|
|
|
|
|
2006-04-06 01:25:06 +02:00
|
|
|
<warning>
|
2007-12-05 21:12:08 +01:00
|
|
|
<para>This document describes the Multi-ISP facility in Shorewall 4.0 and
|
|
|
|
later. If you are running an earlier release, please see the documentation
|
|
|
|
for that release.</para>
|
2006-04-06 01:25:06 +02:00
|
|
|
</warning>
|
|
|
|
|
2006-05-02 03:09:57 +02:00
|
|
|
<warning>
|
|
|
|
<para>Reading just Shorewall documentation is probably not going to give
|
|
|
|
you enough background to use this material. Shorewall may make iptables
|
2006-05-02 05:13:58 +02:00
|
|
|
easy but the Shorewall team doesn't have the resources to be able to
|
|
|
|
spoon-feed Linux policy routing to you (please remember that the user's
|
|
|
|
manual for a tractor doesn't teach you to grow corn either). You will
|
|
|
|
likely need to refer to the following additional information:</para>
|
2006-05-02 03:09:57 +02:00
|
|
|
|
2006-05-02 05:05:10 +02:00
|
|
|
<itemizedlist>
|
|
|
|
<listitem>
|
|
|
|
<para>The LARTC HOWTO: <ulink
|
|
|
|
url="http://www.lartc.org">http://www.lartc.org</ulink></para>
|
|
|
|
</listitem>
|
2006-05-02 03:09:57 +02:00
|
|
|
|
2006-05-02 05:05:10 +02:00
|
|
|
<listitem>
|
|
|
|
<para>Output of <command>man ip</command></para>
|
|
|
|
</listitem>
|
2006-05-02 03:09:57 +02:00
|
|
|
|
2006-05-02 05:05:10 +02:00
|
|
|
<listitem>
|
|
|
|
<para>Output of <command>ip route help</command> and <command>ip rule
|
|
|
|
help</command></para>
|
|
|
|
</listitem>
|
|
|
|
</itemizedlist>
|
2006-05-02 03:09:57 +02:00
|
|
|
</warning>
|
|
|
|
|
2007-06-28 22:20:16 +02:00
|
|
|
<section id="Support">
|
2005-12-01 20:35:56 +01:00
|
|
|
<title>Multiple Internet Connection Support</title>
|
2005-11-16 23:11:52 +01:00
|
|
|
|
2006-02-26 21:49:20 +01:00
|
|
|
<para>Beginning with Shorewall 2.3.2, limited support is included for
|
|
|
|
multiple internet connections. Limitations of this support are as
|
|
|
|
follows:</para>
|
|
|
|
|
|
|
|
<itemizedlist>
|
|
|
|
<listitem>
|
|
|
|
<para>It utilizes static routing configuration. As such, there is no
|
2008-02-13 20:11:02 +01:00
|
|
|
provision for reacting to the failure of any of the uplinks.</para>
|
2006-02-26 21:49:20 +01:00
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>The routing changes are made and the route cache is purged when
|
|
|
|
Shorewall is started <emphasis role="bold">and when Shorewall is
|
|
|
|
restarted</emphasis> (unless you specify the "-n" option to
|
|
|
|
<command>shorewall restart</command>). Ideally, restarting the packet
|
|
|
|
filter should have no effect on routing.</para>
|
|
|
|
</listitem>
|
2007-01-17 21:47:00 +01:00
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Prior to Shorewall 3.4.0, the routes and route rules added by
|
|
|
|
this support were not completely removed during <command>shorewall
|
|
|
|
stop</command>, <command>shorewall clear</command> or
|
|
|
|
<command>shorewall restart</command>.</para>
|
|
|
|
</listitem>
|
2008-02-13 20:11:02 +01:00
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>For most routing applications, <ulink
|
|
|
|
url="http://www.quagga.net/">Quagga</ulink> is a better
|
|
|
|
solution.</para>
|
|
|
|
</listitem>
|
2006-02-26 21:49:20 +01:00
|
|
|
</itemizedlist>
|
2005-11-16 23:11:52 +01:00
|
|
|
|
2007-06-28 22:20:16 +02:00
|
|
|
<section id="Overview">
|
2005-11-16 23:11:52 +01:00
|
|
|
<title>Overview</title>
|
|
|
|
|
|
|
|
<para>Let's assume that a firewall is connected via two separate
|
|
|
|
ethernet interfaces to two different ISPs as in the following
|
|
|
|
diagram.</para>
|
|
|
|
|
2006-01-03 16:56:46 +01:00
|
|
|
<graphic align="center" fileref="images/TwoISPs.png" valign="middle" />
|
2005-11-16 23:11:52 +01:00
|
|
|
|
|
|
|
<itemizedlist>
|
|
|
|
<listitem>
|
|
|
|
<para>eth0 connects to ISP1. The IP address of eth0 is
|
|
|
|
206.124.146.176 and the ISP's gateway router has IP address
|
|
|
|
206.124.146.254.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>eth1 connects to ISP 2. The IP address of eth1 is
|
|
|
|
130.252.99.27 and the ISP's gateway router has IP address
|
|
|
|
130.252.99.254.</para>
|
|
|
|
</listitem>
|
2005-12-01 23:20:08 +01:00
|
|
|
|
|
|
|
<listitem>
|
2005-12-01 23:21:31 +01:00
|
|
|
<para>eth2 connects to the local LAN. Its IP configuration is not
|
2005-12-01 23:20:08 +01:00
|
|
|
relevant to this discussion.</para>
|
|
|
|
</listitem>
|
2005-11-16 23:11:52 +01:00
|
|
|
</itemizedlist>
|
|
|
|
|
|
|
|
<para>Each of these <firstterm>providers</firstterm> is described in an
|
|
|
|
entry in the file <filename>/etc/shorewall/providers</filename>.</para>
|
|
|
|
|
|
|
|
<para>Entries in <filename>/etc/shorewall/providers</filename> can
|
|
|
|
specify that outgoing connections are to be load-balanced between the
|
|
|
|
two ISPs. Entries in <filename>/etc/shorewall/tcrules</filename> can be
|
|
|
|
used to direct particular outgoing connections to one ISP or the other.
|
|
|
|
Use of <filename>/etc/shorewall/tcrules</filename> is not required for
|
|
|
|
<filename>/etc/shorewall/providers</filename> to work, but you must
|
|
|
|
select a unique MARK value for each provider so Shorewall can set up the
|
|
|
|
correct marking rules for you.</para>
|
|
|
|
|
2005-12-01 20:35:56 +01:00
|
|
|
<para>When you use the <emphasis role="bold">track</emphasis> option in
|
|
|
|
<filename>/etc/shorewall/providers</filename>, connections from the
|
|
|
|
internet are automatically routed back out of the correct interface and
|
|
|
|
through the correct ISP gateway. This works whether the connection is
|
|
|
|
handled by the firewall itself or if it is routed or port-forwarded to a
|
|
|
|
system behind the firewall.</para>
|
2005-11-16 23:11:52 +01:00
|
|
|
|
|
|
|
<para>Shorewall will set up the routing and will update the
|
|
|
|
<filename>/etc/iproute2/rt_tables</filename> to include the table names
|
2007-01-17 21:47:00 +01:00
|
|
|
and numbers of the tables that it adds.</para>
|
2005-11-16 23:11:52 +01:00
|
|
|
|
|
|
|
<caution>
|
|
|
|
<para>This feature uses <ulink url="traffic_shaping.htm">packet
|
|
|
|
marking</ulink> to control the routing. As a consequence, there are
|
|
|
|
some restrictions concerning entries in
|
|
|
|
<filename>/etc/shorewall/tcrules</filename>:</para>
|
|
|
|
|
|
|
|
<itemizedlist>
|
|
|
|
<listitem>
|
|
|
|
<para>Packet marking for traffic control purposes may not be done
|
|
|
|
in the PREROUTING table for connections involving providers with
|
|
|
|
'track' specified (see below).</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>You may not use the SAVE or RESTORE options.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>You may not use connection marking.</para>
|
|
|
|
</listitem>
|
|
|
|
</itemizedlist>
|
|
|
|
</caution>
|
|
|
|
|
|
|
|
<para>The <filename>/etc/shorewall/providers</filename> file can also be
|
|
|
|
used in other routing scenarios. See the <ulink
|
|
|
|
url="Shorewall_Squid_Usage.html">Squid documentation</ulink> for an
|
|
|
|
example.</para>
|
|
|
|
</section>
|
|
|
|
|
2007-06-28 22:20:16 +02:00
|
|
|
<section id="providers">
|
2005-11-16 23:11:52 +01:00
|
|
|
<title>/etc/shorewall/providers File</title>
|
|
|
|
|
|
|
|
<para>Entries in this file have the following columns. As in all
|
|
|
|
Shorewall configuration files, enter "-" in a column if you don't want
|
|
|
|
to enter any value.</para>
|
|
|
|
|
|
|
|
<variablelist>
|
|
|
|
<varlistentry>
|
|
|
|
<term>NAME</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>The provider name. Must begin with a letter and consist of
|
|
|
|
letters and digits. The provider name becomes the name of the
|
|
|
|
generated routing table for this provider.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>NUMBER</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>A number between 1 and 252. This becomes the routing table
|
|
|
|
number for the generated table for this provider.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>MARK</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>A mark value used in your /etc/shorewall/tcrules file to
|
|
|
|
direct packets to this provider. Shorewall will also mark
|
|
|
|
connections that have seen input from this provider with this
|
2006-05-07 16:55:44 +02:00
|
|
|
value and will restore the packet mark in the PREROUTING CHAIN.
|
|
|
|
Mark values must be in the range 1-255.</para>
|
|
|
|
|
|
|
|
<para>Beginning with Shorewall version 3.2.0 Beta 6, you may use
|
|
|
|
may set HIGH_ROUTE_MARKS=Yes in
|
|
|
|
<filename>/etc/shorewall/shorewall.conf</filename>. This allows
|
|
|
|
you to:</para>
|
|
|
|
|
|
|
|
<itemizedlist>
|
|
|
|
<listitem>
|
|
|
|
<para>Use connection marks for traffic shaping, provided that
|
2007-02-02 00:07:35 +01:00
|
|
|
you assign those marks in the FORWARD chain.</para>
|
2006-05-07 16:55:44 +02:00
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Use mark values > 255 for provider marks in this
|
|
|
|
column. These mark values must be a multiple of 256 in the
|
|
|
|
range 256-65280 (hex equivalent 0x100 - 0xFF00 with the
|
|
|
|
low-order 8 bits being zero).</para>
|
|
|
|
</listitem>
|
|
|
|
</itemizedlist>
|
2005-11-16 23:11:52 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>DUPLICATE</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Gives the name or number of a routing table to duplicate.
|
|
|
|
May be 'main' or the name or number of a previously declared
|
|
|
|
provider. For most applications, you want to specify 'main'
|
|
|
|
here.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>INTERFACE</term>
|
|
|
|
|
|
|
|
<listitem>
|
2007-12-10 23:53:20 +01:00
|
|
|
<para>The name of the interface to the provider. Where multiple
|
|
|
|
providers share the same interface (which is not recommended), you
|
|
|
|
must follow the name of the interface by a colon (":") and the IP
|
|
|
|
address assigned by this provider (e.g., eth0:206.124.146.176).
|
|
|
|
See <link linkend="Shared">below</link> for additional
|
|
|
|
considerations.</para>
|
2005-11-16 23:11:52 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>GATEWAY</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>The IP address of the provider's Gateway router.</para>
|
|
|
|
|
|
|
|
<para>You can enter <emphasis role="bold">detect</emphasis> here
|
|
|
|
and Shorewall will attempt to automatically determine the gateway
|
|
|
|
IP address.</para>
|
|
|
|
|
|
|
|
<para><emphasis role="bold">Hint:</emphasis> <emphasis
|
|
|
|
role="bold">"detect"</emphasis> is appropriate for use in cases
|
|
|
|
where the interface named in the INTERFACE column is dynamically
|
|
|
|
configured via DHCP etc.</para>
|
2007-12-05 21:07:25 +01:00
|
|
|
|
|
|
|
<para>The GATEWAY may be omitted (enter '-') for point-to-point
|
|
|
|
links.</para>
|
2005-11-16 23:11:52 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>OPTIONS</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>A comma-separated list from the following:</para>
|
|
|
|
|
|
|
|
<variablelist>
|
|
|
|
<varlistentry>
|
|
|
|
<term>track</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>If specified, connections FROM this interface are to
|
|
|
|
be tracked so that responses may be routed back out this
|
|
|
|
same interface.</para>
|
|
|
|
|
2006-02-12 17:11:41 +01:00
|
|
|
<para>You want to specify 'track' if internet hosts will be
|
2005-11-16 23:11:52 +01:00
|
|
|
connecting to local servers through this provider. Any time
|
|
|
|
that you specify 'track', you will also want to specify
|
|
|
|
'balance' (see below).</para>
|
2005-12-01 20:35:56 +01:00
|
|
|
|
|
|
|
<para>Use of this feature requires that your kernel and
|
2007-09-19 22:51:57 +02:00
|
|
|
iptables include CONNMARK target and connmark match support
|
|
|
|
(<emphasis role="bold">Warning</emphasis>: Standard
|
|
|
|
<trademark>Debian</trademark> and
|
|
|
|
<trademark>Ubuntu</trademark> kernels are lacking that
|
|
|
|
support!).</para>
|
2005-12-01 20:35:56 +01:00
|
|
|
|
|
|
|
<warning>
|
2007-08-22 15:51:42 +02:00
|
|
|
<para>A <emphasis role="bold">bug</emphasis> in Shorewall
|
|
|
|
versions 3.2.0-3.2.10, 3.4.0-3.4.6 and 4.0.0-4.0.2
|
|
|
|
prevents proper handling of PREROUTING marks when
|
|
|
|
HIGH_ROUTE_MARKS=No and the <emphasis
|
|
|
|
role="bold">track</emphasis> option is specified. Patches
|
|
|
|
are available to correct this problem:</para>
|
|
|
|
|
|
|
|
<para>Shorewall version 3.2.0-3.4.3: <ulink
|
|
|
|
url="http://www1.shorewall.net/pub/shorewall/3.2/shorewall-3.2.10/errata/patches/Shorewall/patch-3.2.10-2.diff">http://www1.shorewall.net/pub/shorewall/3.2/shorewall-3.2.10/errata/patches/Shorewall/patch-3.2.10-2.diff
|
|
|
|
</ulink></para>
|
|
|
|
|
|
|
|
<para>Shorewall version 3.4.4-3.4.6: <ulink
|
|
|
|
url="http://www1.shorewall.net/pub/shorewall/3.4/shorewall-3.4.6/errata/patches/Shorewall/patch-3.4.6-1.diff">http://www1.shorewall.net/pub/shorewall/3.4/shorewall-3.4.6/errata/patches/Shorewall/patch-3.4.6-1.diff</ulink></para>
|
|
|
|
|
|
|
|
<para>Shorewall-shell version 4.0.0-4.0.2: <ulink
|
|
|
|
url="http://www1.shorewall.net/pub/shorewall/4.0/shorewall-4.0.2/errata/patches/Shorewall-shell/patch-shell-4.0.2-2.diff">http://www1.shorewall.net/pub/shorewall/4.0/shorewall-4.0.2/errata/patches/Shorewall-shell/patch-shell-4.0.2-2.diff</ulink></para>
|
2005-12-01 20:35:56 +01:00
|
|
|
</warning>
|
2006-01-03 00:21:05 +01:00
|
|
|
|
|
|
|
<important>
|
|
|
|
<para>If you are using
|
|
|
|
<filename>/etc/shorewall/providers</filename> because you
|
|
|
|
have multiple internet connections, we recommend that you
|
|
|
|
specify 'track' even if you don't need it. It helps
|
|
|
|
maintain long-term connections in which there are
|
|
|
|
significant periods with no traffic.</para>
|
|
|
|
</important>
|
2005-11-16 23:11:52 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>balance</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>The providers that have 'balance' specified will get
|
|
|
|
outbound traffic load-balanced among them. Balancing will
|
|
|
|
not be perfect, as it is route based, and routes are cached.
|
|
|
|
This means that routes to often-used sites will always be
|
|
|
|
over the same provider.</para>
|
|
|
|
|
|
|
|
<para>By default, each provider is given the same weight (1)
|
2005-12-01 20:35:56 +01:00
|
|
|
. You can change the weight of a given provider by following
|
|
|
|
<emphasis>balance</emphasis> with "=" and the desired weight
|
|
|
|
(e.g., balance=2). The weights reflect the relative
|
|
|
|
bandwidth of the providers connections and should be small
|
|
|
|
numbers since the kernel actually creates additional default
|
|
|
|
routes for each weight increment.</para>
|
2006-01-03 00:21:05 +01:00
|
|
|
|
|
|
|
<important>
|
|
|
|
<para>If you are using
|
|
|
|
<filename>/etc/shorewall/providers</filename> because you
|
|
|
|
have multiple internet connections, we recommend that you
|
|
|
|
specify 'balance' even if you don't need it. You can still
|
|
|
|
use entries in <filename>/etc/shorewall/tcrules</filename>
|
2007-02-22 17:47:41 +01:00
|
|
|
to force all traffic to one provider or another.<note>
|
2006-09-04 16:45:19 +02:00
|
|
|
<para>If you don't heed this advice then be prepared
|
|
|
|
to read <ulink url="FAQ.htm#faq57">FAQ 57</ulink> and
|
|
|
|
<ulink url="FAQ.htm#faq58">FAQ 58</ulink>.</para>
|
2006-09-04 02:46:08 +02:00
|
|
|
</note></para>
|
2006-01-03 00:21:05 +01:00
|
|
|
</important>
|
2006-07-20 19:20:36 +02:00
|
|
|
|
|
|
|
<important>
|
|
|
|
<para>If you specify 'balance' and still find that all
|
|
|
|
traffic is going out through only one provider, you may
|
|
|
|
need to install a kernel built with
|
|
|
|
CONFIG_IP_ROUTE_MULTIPATH_CACHED=n. Several users have
|
2006-08-26 17:49:12 +02:00
|
|
|
reported that this change has corrected similar
|
|
|
|
problems.</para>
|
|
|
|
|
2006-09-04 16:45:19 +02:00
|
|
|
<para>The SuSE 10.0 kernel is subject to this problem, and
|
2006-08-26 17:49:12 +02:00
|
|
|
<ulink
|
|
|
|
url="https://bugzilla.novell.com/show_bug.cgi?id=190908">
|
|
|
|
a kernel oops may result in this circumstance.</ulink>
|
|
|
|
SUSE 10.1 and SLES 10 have
|
|
|
|
CONFIG_IP_ROUTE_MULTIPATH_CACHED=n set by default. The
|
|
|
|
source of the problem seems to be <ulink
|
|
|
|
url="http://news.gmane.org/find-root.php?message_id=%3c00da01c5b35a%24b12b9860%241b00a8c0%40cruncher%3e">an
|
|
|
|
incompatibility between the LARTC patches and
|
|
|
|
CONFIG_IP_ROUTE_MULTIPATH_CACHED.</ulink></para>
|
2006-07-20 19:20:36 +02:00
|
|
|
</important>
|
2005-11-16 23:11:52 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>loose</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Do not include routing rules that force traffic whose
|
|
|
|
source IP is an address of the INTERFACE to be routed to
|
|
|
|
this provider. Useful for defining providers that are to be
|
2007-02-11 18:09:05 +01:00
|
|
|
used only when the appropriate packet mark is applied.
|
|
|
|
Should not be specified together with <emphasis
|
|
|
|
role="bold">balance</emphasis>.</para>
|
2005-11-16 23:11:52 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2006-08-08 18:22:15 +02:00
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>optional (added in Shorewall 3.2.2)</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Shorewall will determine of this interface is up and
|
|
|
|
has a configured IPv4 address. If it is not, a warning is
|
|
|
|
issued and this provider is not configured.</para>
|
2006-08-26 17:49:12 +02:00
|
|
|
|
|
|
|
<note>
|
|
|
|
<para>'optional' is designed to detect interface states
|
|
|
|
that will cause <command>shorewall start</command> or
|
|
|
|
<command>shorewall restart</command> to fail; just because
|
|
|
|
an interface is in a state that Shorewall can [re]start
|
|
|
|
without error doesn't mean that traffic can actually be
|
|
|
|
sent through the interface.</para>
|
2007-08-10 22:55:54 +02:00
|
|
|
|
|
|
|
<para>Beginning with Shorewall-perl 4.0.3, you can supply
|
|
|
|
an 'isusable' <ulink
|
|
|
|
url="shorewall_extension_scripts.htm">extension
|
|
|
|
script</ulink> to extend Shorewall's interface state
|
|
|
|
detection.</para>
|
2006-08-26 17:49:12 +02:00
|
|
|
</note>
|
2006-08-08 18:22:15 +02:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2008-02-11 22:23:48 +01:00
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>src=<replaceable>source-address</replaceable> (Added in
|
|
|
|
Shorewall-perl 4.1.5)</term>
|
|
|
|
|
|
|
|
<listitem>
|
2008-02-13 20:11:02 +01:00
|
|
|
<para>Specifies the source address to use when routing to
|
2008-02-11 22:23:48 +01:00
|
|
|
this provider and none is known (the local client has bound
|
|
|
|
to the 0 address). May not be specified when an
|
|
|
|
<replaceable>address</replaceable> is given in the INTERFACE
|
|
|
|
column. If this option is not used, Shorewall substitutes
|
|
|
|
the primary IP address on the interface named in the
|
|
|
|
INTERFACE column.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>mtu=<replaceable>number</replaceable> (Added in
|
|
|
|
Shorewall-perl 4.1.5)</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Specifies the MTU when forwarding through this
|
|
|
|
provider. If not given, the MTU of the interface named in
|
|
|
|
the INTERFACE column is assumed.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2005-11-16 23:11:52 +01:00
|
|
|
</variablelist>
|
2006-10-07 23:12:23 +02:00
|
|
|
|
|
|
|
<para>For those of you who are termnally confused between<emphasis
|
|
|
|
role="bold"> track</emphasis> and <emphasis
|
|
|
|
role="bold">balance</emphasis>:</para>
|
|
|
|
|
|
|
|
<itemizedlist>
|
|
|
|
<listitem>
|
|
|
|
<para><emphasis role="bold">track</emphasis> governs incoming
|
|
|
|
connections.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para><emphasis role="bold">balance</emphasis> governs
|
|
|
|
outgoing connections.</para>
|
|
|
|
</listitem>
|
|
|
|
</itemizedlist>
|
2005-11-16 23:11:52 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>COPY</term>
|
|
|
|
|
|
|
|
<listitem>
|
2007-09-17 22:30:59 +02:00
|
|
|
<para>A comma-separated list if interface names. Wildcards
|
|
|
|
specified using an asterisk ("*") are permitted (e.g., tun*
|
|
|
|
).</para>
|
|
|
|
|
2005-11-16 23:11:52 +01:00
|
|
|
<para>When you specify an existing table in the DUPLICATE column,
|
|
|
|
Shorewall copies all routes through the interface specified in the
|
2007-09-17 22:30:59 +02:00
|
|
|
INTERFACE column plus the interfaces listed in this column.
|
|
|
|
Normally, you will list all interfaces on your firewall in this
|
2005-11-16 23:11:52 +01:00
|
|
|
column except those internet interfaces specified in the INTERFACE
|
2007-09-19 22:51:57 +02:00
|
|
|
column of entries in this file.</para>
|
2005-11-16 23:11:52 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
</variablelist>
|
|
|
|
</section>
|
|
|
|
|
2007-06-28 22:20:16 +02:00
|
|
|
<section id="Providers">
|
2005-11-16 23:11:52 +01:00
|
|
|
<title>What an entry in the Providers File Does</title>
|
|
|
|
|
|
|
|
<para>Adding another entry in the providers file simply creates an
|
2007-12-05 21:07:25 +01:00
|
|
|
alternate routing table for you. The table will usually contain two
|
|
|
|
routes:</para>
|
|
|
|
|
|
|
|
<orderedlist>
|
|
|
|
<listitem>
|
|
|
|
<para>A host route to the specified GATEWAY through the specified
|
|
|
|
INTERFACE.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>A default route through the GATEWAY.</para>
|
|
|
|
</listitem>
|
|
|
|
</orderedlist>
|
|
|
|
|
|
|
|
<para>Note that the first route is omitted if "-" is specified as the
|
|
|
|
GATEWAY; in that case, the default route does not specify a gateway
|
|
|
|
(point-to-point link).</para>
|
|
|
|
|
|
|
|
<para>If the DUPLICATE column is non-empty, then routes from the table
|
|
|
|
named in that column are copied into the new table. By default, all
|
|
|
|
routes (except default routes) are copied. The set of routes copied can
|
|
|
|
be restricted using the COPY column which lists the interfaces whose
|
|
|
|
routes you want copied. You will generally want to include all local
|
|
|
|
interfaces in this list. You should exclude the loopback interface (lo)
|
|
|
|
and any interfaces that do not have an IPv4 configuration. You should
|
|
|
|
also omit interfaces like <emphasis role="bold">tun</emphasis>
|
|
|
|
interfaces that are created dynamically. Traffic to networks handled by
|
|
|
|
those intefaces should be routed through the main table using entries in
|
|
|
|
<filename>/etc/shorewall/route_rules</filename> (see Example 2 <link
|
|
|
|
linkend="Examples">below</link>).</para>
|
|
|
|
|
|
|
|
<para>In addition:</para>
|
2005-11-16 23:11:52 +01:00
|
|
|
|
|
|
|
<orderedlist>
|
|
|
|
<listitem>
|
|
|
|
<para>Unless <emphasis role="bold">loose</emphasis> is specified, an
|
|
|
|
ip rule is generated for each IP address on the INTERFACE that
|
|
|
|
routes traffic from that address through the associated routing
|
|
|
|
table.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>If you specify <emphasis role="bold">track</emphasis>, then
|
|
|
|
connections which have had at least one packet arrive on the
|
|
|
|
interface listed in the INTERFACE column have their connection mark
|
|
|
|
set to the value in the MARK column. In the PREROUTING chain,
|
2005-12-01 20:35:56 +01:00
|
|
|
packets with a connection mark have their packet mark set to the
|
|
|
|
value of the associated connection mark; packets marked in this way
|
|
|
|
bypass any prerouting rules that you create in
|
|
|
|
<filename>/etc/shorewall/tcrules</filename>. This ensures that
|
2005-11-16 23:11:52 +01:00
|
|
|
packets associated with connections from outside are always routed
|
|
|
|
out of the correct interface.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>If you specify <emphasis role="bold">balance</emphasis>, then
|
|
|
|
Shorewall will replace the 'default' route with weight 100 in the
|
|
|
|
'main' routing table with a load-balancing route among those
|
|
|
|
gateways where <emphasis role="bold">balance</emphasis> was
|
|
|
|
specified. So if you configure default routes, be sure that their
|
|
|
|
weight is less than 100 or the route added by Shorewall will not be
|
|
|
|
used.</para>
|
|
|
|
</listitem>
|
|
|
|
</orderedlist>
|
|
|
|
|
|
|
|
<para>That's <emphasis role="bold">all</emphasis> that these entries do.
|
2005-11-22 17:39:38 +01:00
|
|
|
You still have to follow the principle stated in the <ulink
|
|
|
|
url="Shorewall_and_Routing.html">Shorewall Routing
|
|
|
|
documentation</ulink>:</para>
|
2005-11-16 23:11:52 +01:00
|
|
|
|
|
|
|
<orderedlist>
|
|
|
|
<listitem>
|
|
|
|
<para>Routing determines where packets are to be sent.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Once routing determines where the packet is to go, the
|
|
|
|
firewall (Shorewall) determines if the packet is allowed to go
|
|
|
|
there.</para>
|
|
|
|
</listitem>
|
|
|
|
</orderedlist>
|
|
|
|
|
|
|
|
<para>The bottom line is that if you want traffic to go out through a
|
|
|
|
particular provider then you <emphasis>must </emphasis>mark that traffic
|
|
|
|
with the provider's MARK value in
|
|
|
|
<filename>/etc/shorewall/tcrules</filename> and you must do that marking
|
2007-01-17 21:47:00 +01:00
|
|
|
in the PREROUTING chain; or, you must provide the appropriate rules in
|
|
|
|
<filename>/etc/shorewall/route_rules</filename>.</para>
|
2005-11-16 23:11:52 +01:00
|
|
|
</section>
|
|
|
|
|
2007-06-28 22:20:16 +02:00
|
|
|
<section id="Provider_Doesnt">
|
2005-11-22 17:39:38 +01:00
|
|
|
<title>What an entry in the Providers File Does NOT Do</title>
|
|
|
|
|
|
|
|
<para>Given that Shorewall is simply a tool to configure Netfilter and
|
|
|
|
does not run continuously in your system, entries in the providers file
|
|
|
|
<emphasis role="bold">do not provide any automatic failover in the event
|
|
|
|
of failure of one of your Internet connections</emphasis>.</para>
|
|
|
|
</section>
|
|
|
|
|
2007-02-11 19:35:38 +01:00
|
|
|
<section id="Martians">
|
|
|
|
<title>Martians</title>
|
|
|
|
|
|
|
|
<para>One problem that often arises with Multi-ISP configuration is
|
|
|
|
'Martians'. If your internet interfaces are configured with the
|
|
|
|
<emphasis role="bold">routefilter</emphasis> option in
|
|
|
|
<filename>/etc/shorewall/interfaces</filename> (remember that if you set
|
|
|
|
that option, you should also select <emphasis
|
|
|
|
role="bold">logmartians</emphasis>), then things may not work correctly
|
|
|
|
and you will see messages like this:</para>
|
|
|
|
|
|
|
|
<programlisting>Feb 9 17:23:45 gw.ilinx kernel: martian source 206.124.146.176 from 64.86.88.116, on dev eth1
|
|
|
|
Feb 9 17:23:45 gw.ilinx kernel: ll header: 00:a0:24:2a:1f:72:00:13:5f:07:97:05:08:00</programlisting>
|
|
|
|
|
|
|
|
<para>The above message is somewhat awkwardly phrased. The source IP in
|
|
|
|
this incoming packet was 64.86.88.116 and the destination IP address is
|
|
|
|
206.124.146.176. Another gotcha is that the incoming packet has already
|
|
|
|
had the destination IP address changed for DNAT or because the original
|
|
|
|
outgoing connection was altered by an entry in
|
|
|
|
<filename>/etc/shorewall/masq</filename> (SNAT or Masquerade). So the
|
|
|
|
destination IP address (206.124.146.176) may not have been the
|
|
|
|
destination IP address in the packet as it was initially
|
|
|
|
received.</para>
|
|
|
|
|
|
|
|
<para>There a couple of common causes for these problems:</para>
|
|
|
|
|
|
|
|
<orderedlist>
|
|
|
|
<listitem>
|
|
|
|
<para>You have connected both of your external interfaces to the
|
|
|
|
same hub/switch. Connecting multiple firewall interfaces to a common
|
|
|
|
hub or switch is always a bad idea that will result in
|
|
|
|
hard-to-diagnose problems.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>You are specifying both the <emphasis
|
|
|
|
role="bold">loose</emphasis> and <emphasis
|
|
|
|
role="bold">balance</emphasis> options on your provider(s). This
|
|
|
|
causes individual connections to ping-pong back and forth between
|
|
|
|
the interfaces which is guaranteed to cause problems.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>You are redirecting traffic from the local system out of one
|
|
|
|
interface or the other using packet marking in your
|
|
|
|
<filename>/etc/shorewall/tcrules</filename> file. A better approach
|
|
|
|
is to configure the application to use the appropriate local IP
|
|
|
|
address (the IP address of the interface that you want the
|
|
|
|
application to use). See <link linkend="Local">below</link>.</para>
|
|
|
|
</listitem>
|
|
|
|
</orderedlist>
|
2007-02-12 17:17:09 +01:00
|
|
|
|
|
|
|
<para>If all else fails, remove the <emphasis
|
|
|
|
role="bold">routefilter</emphasis> option from your external interfaces.
|
|
|
|
If you do this, you may wish to add rules to log and drop packets from
|
|
|
|
the Internet that have source addresses in your local networks. For
|
|
|
|
example, if the local LAN in the above diagram is 192.168.1.0/24, then
|
2007-02-12 23:58:15 +01:00
|
|
|
you would add this rule:</para>
|
2007-02-12 17:17:09 +01:00
|
|
|
|
|
|
|
<programlisting>#ACTION SOURCE DEST
|
|
|
|
DROP:info net:192.168.1.0/24 all</programlisting>
|
|
|
|
|
|
|
|
<para>Be sure the above rule is added before any other rules with
|
|
|
|
<emphasis>net</emphasis> in the SOURCE column.</para>
|
2007-02-11 19:35:38 +01:00
|
|
|
</section>
|
|
|
|
|
2007-06-28 22:20:16 +02:00
|
|
|
<section id="Example1">
|
|
|
|
<title id="Example">Example</title>
|
2005-11-16 23:11:52 +01:00
|
|
|
|
|
|
|
<para>The configuration in the figure at the top of this section would
|
|
|
|
be specified in <filename>/etc/shorewall/providers</filename> as
|
2005-12-01 20:35:56 +01:00
|
|
|
follows.</para>
|
2005-11-16 23:11:52 +01:00
|
|
|
|
|
|
|
<programlisting>#NAME NUMBER MARK DUPLICATE INTERFACE GATEWAY OPTIONS COPY
|
|
|
|
ISP1 1 1 main eth0 206.124.146.254 track,balance eth2
|
|
|
|
ISP2 2 2 main eth1 130.252.99.254 track,balance eth2</programlisting>
|
|
|
|
|
|
|
|
<para>Other configuration files go something like this:</para>
|
|
|
|
|
|
|
|
<para><filename>/etc/shorewall/interfaces</filename>:</para>
|
|
|
|
|
|
|
|
<programlisting>#ZONE INTERFACE BROADCAST OPTIONS
|
|
|
|
net eth0 detect …
|
|
|
|
net eth1 detect …</programlisting>
|
|
|
|
|
|
|
|
<para><filename>/etc/shorewall/policy</filename>:</para>
|
|
|
|
|
|
|
|
<programlisting>#SOURCE DESTINATION POLICY LIMIT:BURST
|
|
|
|
net net DROP</programlisting>
|
|
|
|
|
2007-02-11 19:35:38 +01:00
|
|
|
<para>Regardless of whether you have masqueraded hosts or not, the
|
|
|
|
following entries are required in
|
|
|
|
<filename>/etc/shorewall/masq</filename> if you plan to redirect
|
|
|
|
connections from the firewall using entries in
|
2007-02-12 23:58:15 +01:00
|
|
|
<filename>/etc/shorewall/tcrules</filename> or if you specify <emphasis
|
|
|
|
role="bold">balance</emphasis> on your providers.</para>
|
2006-01-03 02:21:10 +01:00
|
|
|
|
|
|
|
<programlisting>#INTERFACE SUBNET ADDRESS
|
|
|
|
eth0 130.252.99.27 206.124.146.176
|
|
|
|
eth1 206.124.146.176 130.252.99.27</programlisting>
|
|
|
|
|
2007-02-11 19:35:38 +01:00
|
|
|
<para>Those entries ensure that traffic originating on the firewall and
|
|
|
|
redirected via packet marks always has the source IP address
|
|
|
|
corresponding to the interface that it is routed out of.</para>
|
2006-05-21 16:19:04 +02:00
|
|
|
|
2006-03-27 18:35:32 +02:00
|
|
|
<note>
|
|
|
|
<para>If you have a Dynamic IP address on either of the interfaces,
|
|
|
|
you can use shell variables to construct the above rules. For example,
|
|
|
|
if <filename class="devicefile">eth0</filename> had a dynamic IP
|
|
|
|
address, then:</para>
|
|
|
|
|
|
|
|
<para><filename>/etc/shorewall/params</filename>:</para>
|
|
|
|
|
|
|
|
<programlisting>ETH0_IP=$(find_first_interface_address eth0)</programlisting>
|
|
|
|
|
|
|
|
<para>/etc/shorewall/masq:</para>
|
|
|
|
|
|
|
|
<programlisting>#INTERFACE SUBNET ADDRESS
|
|
|
|
eth0 130.252.99.27 $ETH0_IP
|
|
|
|
eth1 $ETH0_IP 130.252.99.27</programlisting>
|
|
|
|
</note>
|
|
|
|
|
2005-11-16 23:11:52 +01:00
|
|
|
<para>If you have masqueraded hosts, be sure to update
|
|
|
|
<filename>/etc/shorewall/masq</filename> to masquerade to both ISPs. For
|
|
|
|
example, if you masquerade all hosts connected to <filename
|
|
|
|
class="devicefile">eth2</filename> then:</para>
|
|
|
|
|
|
|
|
<programlisting>#INTERFACE SUBNET ADDRESS
|
|
|
|
eth0 eth2 206.124.146.176
|
|
|
|
eth1 eth2 130.252.99.27</programlisting>
|
|
|
|
|
|
|
|
<warning>
|
|
|
|
<para>Entries in <filename>/etc/shorewall/masq</filename> have no
|
|
|
|
effect on which ISP a particular connection will be sent through. That
|
2006-04-27 17:04:43 +02:00
|
|
|
is rather the purpose of entries in
|
2006-10-20 17:41:54 +02:00
|
|
|
<filename>/etc/shorewall/tcrules</filename> or
|
|
|
|
<filename>/etc/shorewall/route_rules</filename>.</para>
|
2005-11-16 23:11:52 +01:00
|
|
|
</warning>
|
|
|
|
|
|
|
|
<para>Now suppose that you want to route all outgoing SMTP traffic from
|
|
|
|
your local network through ISP 2. You would make this entry in <ulink
|
2005-11-17 18:55:06 +01:00
|
|
|
url="traffic_shaping.htm">/etc/shorewall/tcrules</ulink> (and if you are
|
|
|
|
running a version of Shorewall earlier than 3.0.0, you would set
|
|
|
|
TC_ENABLED=Yes in <ulink
|
2005-11-16 23:11:52 +01:00
|
|
|
url="???">/etc/shorewall/shorewall.conf</ulink>).</para>
|
|
|
|
|
|
|
|
<programlisting>#MARK SOURCE DEST PROTO PORT(S) CLIENT USER TEST
|
|
|
|
# PORT(S)
|
|
|
|
2:P <local network> 0.0.0.0/0 tcp 25</programlisting>
|
|
|
|
</section>
|
2006-05-01 23:40:05 +02:00
|
|
|
|
2007-07-16 20:24:23 +02:00
|
|
|
<section id="morethan2">
|
|
|
|
<title>More than 2 Providers</title>
|
|
|
|
|
|
|
|
<para>When there are more than two providers, you need to extend the
|
|
|
|
two-provider case in the expected way:</para>
|
|
|
|
|
|
|
|
<orderedlist>
|
|
|
|
<listitem>
|
|
|
|
<para>For each external address, you need an entry in
|
|
|
|
<filename>/etc/shorewall/masq</filename> to handle the case where a
|
|
|
|
connection using that address as the SOURCE is sent out of the
|
|
|
|
interfaces other than the one that the address is configured
|
|
|
|
on.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>For each external interface, you need to add an entry to
|
|
|
|
<filename>/etc/shorewall/masq</filename> for each internal network
|
|
|
|
that needs to be masqueraded (or use SNAT) through that
|
|
|
|
interface.</para>
|
|
|
|
</listitem>
|
|
|
|
</orderedlist>
|
|
|
|
|
|
|
|
<para>If we extend the above example to add eth3 with IP address
|
|
|
|
16.105.78.4 with gateway 16.105.78.254, then:</para>
|
|
|
|
|
|
|
|
<para><filename>/etc/shorewall/providers</filename>:<programlisting>#NAME NUMBER MARK DUPLICATE INTERFACE GATEWAY OPTIONS COPY
|
|
|
|
ISP1 1 1 main eth0 206.124.146.254 track,balance eth2
|
|
|
|
ISP2 2 2 main eth1 130.252.99.254 track,balance eth2
|
|
|
|
ISP3 3 3 main eth3 16.105.78.254 track,balance eth2</programlisting></para>
|
|
|
|
|
|
|
|
<para><filename>/etc/shorewall/masq</filename>:<programlisting>#INTERFACE SUBNET ADDRESS
|
|
|
|
eth0 130.252.99.27 206.124.146.176
|
|
|
|
eth3 130.252.99.27 16.105.78.4
|
|
|
|
eth1 206.124.146.176 130.252.99.27
|
|
|
|
eth3 206.124.146.176 16.105.78.4
|
|
|
|
eth0 16.106.78.4 206.124.146.176
|
|
|
|
eth1 16.106.78.4 130.252.99.27
|
|
|
|
eth0 eth2 206.124.146.176
|
|
|
|
eth1 eth2 130.252.99.27
|
|
|
|
eth3 eth2 16.105.78.4</programlisting></para>
|
|
|
|
</section>
|
|
|
|
|
2007-02-11 19:35:38 +01:00
|
|
|
<section id="Local">
|
2006-10-20 17:41:54 +02:00
|
|
|
<title>Applications running on the Firewall</title>
|
|
|
|
|
|
|
|
<para>Experience has shown that in some cases, problems occur with
|
2007-02-11 19:35:38 +01:00
|
|
|
applications running on the firewall itself. This is especially true
|
|
|
|
when you have specified <emphasis role="bold">routefilter</emphasis> on
|
|
|
|
your external interfaces in /etc/shorewall/interfaces (see <link
|
|
|
|
linkend="Martians">above</link>). When this happens, it is suggested
|
|
|
|
that you have the application use specific local IP addresses rather
|
|
|
|
than 0.</para>
|
2006-10-20 17:41:54 +02:00
|
|
|
|
|
|
|
<para>Examples:</para>
|
|
|
|
|
|
|
|
<itemizedlist>
|
|
|
|
<listitem>
|
|
|
|
<para>Squid: In <filename>squid.conf</filename>, set <emphasis
|
|
|
|
role="bold">tcp_outgoing_address</emphasis> to the IP address of the
|
|
|
|
interface that you want Squid to use.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>In OpenVPN, set <emphasis role="bold">local
|
|
|
|
</emphasis>(<emphasis role="bold">--local</emphasis> on the command
|
|
|
|
line) to the IP address that you want the server to receive
|
|
|
|
connections on.</para>
|
|
|
|
</listitem>
|
|
|
|
</itemizedlist>
|
2007-08-25 01:47:13 +02:00
|
|
|
|
|
|
|
<para>Note that some traffic originating on the firewall doesn't have a
|
|
|
|
SOURCE IP address before routing. At least one Shorewall user reports
|
|
|
|
that an entry in <filename>/etc/shorewall/route_rules</filename> with
|
|
|
|
'lo' in the SOURCE column seems to be the most reliable way to direct
|
|
|
|
such traffic to a particular ISP.</para>
|
2006-10-20 17:41:54 +02:00
|
|
|
</section>
|
|
|
|
|
2008-03-20 20:37:14 +01:00
|
|
|
<section id="IPSEC">
|
|
|
|
<title>IPSEC</title>
|
|
|
|
|
|
|
|
<para>If you have an IPSEC gateway on your firewall, be sure to arrange
|
|
|
|
for ESP packets to be routed out of the same interface that you have
|
|
|
|
configured your keying daemon to use.</para>
|
|
|
|
</section>
|
|
|
|
|
2007-06-28 22:20:16 +02:00
|
|
|
<section id="route_rules">
|
2006-05-01 23:40:05 +02:00
|
|
|
<title>/etc/shorewall/route_rules</title>
|
|
|
|
|
|
|
|
<para>The <filename>/etc/shorewall/route_rules</filename> file was added
|
|
|
|
in Shorewall version 3.2.0. The <filename>route_rules</filename> file
|
|
|
|
allows assigning certain traffic to a particular provider just as
|
|
|
|
entries in the <filename>tcrules</filename> file. The difference between
|
|
|
|
the two files is that entries in <filename>route_rules</filename> are
|
|
|
|
independent of Netfilter.</para>
|
|
|
|
|
2007-06-28 22:20:16 +02:00
|
|
|
<section id="Routing_rules">
|
2006-05-01 23:40:05 +02:00
|
|
|
<title>Routing Rules</title>
|
|
|
|
|
|
|
|
<para>Routing rules are maintained by the Linux kernel and can be
|
|
|
|
displayed using the <command>ip rule ls</command> command. When
|
|
|
|
routing a packet, the rules are processed in turn until the packet is
|
|
|
|
successfully routed.</para>
|
|
|
|
|
|
|
|
<programlisting>gateway:~ # <command>ip rule ls</command>
|
2006-05-02 03:09:57 +02:00
|
|
|
0: from all lookup local <=== Local (to the firewall) IP addresses
|
|
|
|
10001: from all fwmark 0x1 lookup Blarg <=== This and the next rule are generated by the
|
|
|
|
10002: from all fwmark 0x2 lookup Comcast 'MARK' values in /etc/shorewall/providers.
|
|
|
|
20000: from 206.124.146.176 lookup Blarg <=== This and the next rule are generated unless
|
|
|
|
20256: from 24.12.22.33 lookup Comcast 'loose' is specified; based in the output of 'ip addr ls'
|
|
|
|
32766: from all lookup main <=== This is the routing table shown by 'iproute -n'
|
2006-05-06 20:08:48 +02:00
|
|
|
32767: from all lookup default <=== This table is usually empty
|
2006-05-01 23:40:05 +02:00
|
|
|
gateway:~ #</programlisting>
|
|
|
|
|
|
|
|
<para>In the above example, there are two providers: Blarg and Comcast
|
|
|
|
with MARK 1 going to Blarg and mark 2 going to Comcast.</para>
|
|
|
|
</section>
|
|
|
|
|
2007-06-28 22:20:16 +02:00
|
|
|
<section id="route_rules_columns">
|
2006-05-01 23:40:05 +02:00
|
|
|
<title>Columns in the route_rules file</title>
|
|
|
|
|
|
|
|
<para>Columns in the file are:</para>
|
|
|
|
|
|
|
|
<variablelist>
|
|
|
|
<varlistentry>
|
2006-05-02 03:09:57 +02:00
|
|
|
<term>SOURCE (Optional)</term>
|
2006-05-01 23:40:05 +02:00
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>An ip address (network or host) that matches the source IP
|
|
|
|
address in a packet. May also be specified as an interface name
|
|
|
|
optionally followed by ":" and an address. If the device 'lo' is
|
|
|
|
specified, the packet must originate from the firewall
|
|
|
|
itself.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2006-05-02 03:09:57 +02:00
|
|
|
<term>DEST (Optional)</term>
|
2006-05-01 23:40:05 +02:00
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>An ip address (network or host) that matches the
|
|
|
|
destination IP address in a packet.</para>
|
|
|
|
|
|
|
|
<para>If you choose to omit either SOURCE or DEST, place "-" in
|
|
|
|
that column. Note that you may not omit both SOURCE and
|
|
|
|
DEST.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>PROVIDER</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>The provider to route the traffic through. May be
|
|
|
|
expressed either as the provider name or the provider
|
|
|
|
number.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>PRIORITY</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>The rule's priority which determines the order in which
|
|
|
|
the rules are processed.</para>
|
|
|
|
|
|
|
|
<para>1000-1999 Before Shorewall-generated 'MARK' rules</para>
|
|
|
|
|
|
|
|
<para>11000- 11999 After 'MARK' rules but before
|
|
|
|
Shorewall-generated rules for ISP interfaces.</para>
|
|
|
|
|
|
|
|
<para>26000-26999 After ISP interface rules but before 'default'
|
|
|
|
rule.</para>
|
|
|
|
|
|
|
|
<para>Rules with equal priority are applied in the order in
|
|
|
|
which they appear in the file.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
</variablelist>
|
2007-12-05 21:07:25 +01:00
|
|
|
</section>
|
|
|
|
|
|
|
|
<section id="Examples">
|
|
|
|
<title>Examples</title>
|
2006-05-01 23:40:05 +02:00
|
|
|
|
2007-12-05 21:07:25 +01:00
|
|
|
<para><emphasis role="bold">Example 1:</emphasis> You want all traffic
|
|
|
|
entering the firewall on eth1 to be routed through Comcast.</para>
|
2006-05-01 23:40:05 +02:00
|
|
|
|
|
|
|
<programlisting>#SOURCE DEST PROVIDER PRIORITY
|
|
|
|
eth1 - Comcast 1000</programlisting>
|
|
|
|
|
|
|
|
<para>With this entry, the output of <command>ip rule ls</command>
|
|
|
|
would be as follows.</para>
|
|
|
|
|
|
|
|
<para><programlisting>gateway:~ # <command>ip rule ls</command>
|
|
|
|
0: from all lookup local
|
|
|
|
1000: from all iif eth1 lookup Comcast
|
|
|
|
10001: from all fwmark 0x1 lookup Blarg
|
|
|
|
10002: from all fwmark 0x2 lookup Comcast
|
|
|
|
20000: from 206.124.146.176 lookup Blarg
|
|
|
|
20256: from 24.12.22.33 lookup Comcast
|
|
|
|
32766: from all lookup main
|
|
|
|
32767: from all lookup default
|
|
|
|
gateway:~ #</programlisting>Note that because we used a priority of 1000, the
|
|
|
|
test for <filename class="devicefile">eth1</filename> is inserted
|
|
|
|
before the fwmark tests.</para>
|
2006-05-06 20:08:48 +02:00
|
|
|
|
2008-07-03 22:52:09 +02:00
|
|
|
<para id="Openvpn"><emphasis role="bold">Example 2:</emphasis> You use
|
|
|
|
OpenVPN (routed setup w/tunX) in combination with multiple providers.
|
|
|
|
In this case you have to set up a rule to ensure that the OpenVPN
|
|
|
|
traffic is routed back through the tunX interface(s) rather than
|
|
|
|
through any of the providers. 10.8.0.0/24 is the subnet choosen in
|
|
|
|
your OpenVPN configuration (server 10.8.0.0 255.255.255.0).</para>
|
2006-05-06 20:08:48 +02:00
|
|
|
|
|
|
|
<programlisting>#SOURCE DEST PROVIDER PRIORITY
|
|
|
|
- 10.8.0.0/24 main 1000</programlisting>
|
2006-05-01 23:40:05 +02:00
|
|
|
</section>
|
|
|
|
</section>
|
2007-12-10 23:53:20 +01:00
|
|
|
|
|
|
|
<section id="Shared">
|
|
|
|
<title>Two Providers Sharing an Interface</title>
|
|
|
|
|
|
|
|
<para>Shared interface support is available only in Shorewall-perl 4.1.2
|
|
|
|
and later.</para>
|
|
|
|
|
|
|
|
<orderedlist numeration="loweralpha">
|
|
|
|
<listitem>
|
|
|
|
<para>Only ethernet (or ethernet-like) interfaces can be used. For
|
2008-01-12 02:32:18 +01:00
|
|
|
inbound traffic, the MAC addresses of the gateway routers are used
|
|
|
|
to determine which provider a packet was received through. Note that
|
2007-12-10 23:53:20 +01:00
|
|
|
only routed traffic can be categorized using this technique.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>You must specify the address on the interface that corresponds
|
|
|
|
to a particular provider in the INTERFACE column by following the
|
|
|
|
interface name with a colon (":") and the address.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Entries in <filename>/etc/shorewall/masq</filename> must be
|
|
|
|
qualified by the provider name (or number).</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>This feature requires Realm Match support in your kernel and
|
|
|
|
iptables.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>You must add route_rules entries for networks that are
|
|
|
|
accessed through a particular provider.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>If you have additional IP addresses through either provider,
|
|
|
|
you must add <filename>route_rules</filename> to direct traffic FROM
|
|
|
|
each of those addresses through the appropriate provider.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>You must manually add MARK rules for traffic known to come
|
|
|
|
from each provider.</para>
|
|
|
|
</listitem>
|
|
|
|
</orderedlist>
|
|
|
|
|
|
|
|
<para>Example:</para>
|
|
|
|
|
|
|
|
<para>Providers <emphasis role="bold">Blarg</emphasis> (1) and <emphasis
|
|
|
|
role="bold">Avvanta</emphasis> (2) are both connected to eth0. The
|
|
|
|
firewall's IP address with <emphasis role="bold">Blarg</emphasis> is
|
|
|
|
206.124.146.176/24 (gateway 206.124.146.254) and the IP address from
|
|
|
|
<emphasis role="bold">Avvanta</emphasis> is 130.252.144.8/24 (gateway
|
|
|
|
130.252.144.254). We have a second IP address (206.124.146.177) from
|
|
|
|
<emphasis role="bold">Blarg</emphasis>.</para>
|
|
|
|
|
|
|
|
<para>/etc/shorewall/providers:<programlisting>#PROVIDER NUMBER MARK DUPLICATE INTERFACE GATEWAY
|
|
|
|
Blarg 1 1 main eth0:206.124.146.176 206.124.146.254 ...
|
|
|
|
Avvanta 2 2 main eth0:130.252.144.8 130.252.144.254 ... </programlisting></para>
|
|
|
|
|
|
|
|
<para>/etc/shorewall/masq:<programlisting>#INTERFACE SOURCE ADDRESS
|
|
|
|
eth0(Blarg) 130.252.144.8 206.124.146.176
|
|
|
|
eth0(Avvanta) 206.124.146.176 130.252.144.8
|
|
|
|
eth0(Blarg) eth1 206.124.146.176
|
|
|
|
eth0(Avvanta) eth1 130.252.144.8 </programlisting>
|
|
|
|
/etc/shorewall/route_rules:</para>
|
|
|
|
|
|
|
|
<programlisting>#SOURCE DEST PROVIDER PRIORITY
|
|
|
|
- 206.124.146.0/24 Blarg 1000
|
|
|
|
- 130.252.144.0/24 Avvanta 1000
|
|
|
|
206.124.146.177 - Blarg 26000</programlisting>
|
|
|
|
|
|
|
|
<para>/etc/shorewall/tcrules:<programlisting>#MARK/CLASSIFY SOURCE DEST PROTO
|
|
|
|
1:P eth0:206.124.146.0/24 0.0.0.0/0
|
|
|
|
2:P eth0:130.252.144.8/24 0.0.0.0/0</programlisting></para>
|
|
|
|
</section>
|
2005-11-16 23:11:52 +01:00
|
|
|
</section>
|
2008-07-03 22:52:09 +02:00
|
|
|
|
|
|
|
<section>
|
|
|
|
<title>ROUTE_BALANCE (Experimental)</title>
|
|
|
|
|
|
|
|
<para>Beginning with Shorewall 4.2.0 Beta3, Shorewall-perl has supported a
|
|
|
|
ROUTE_BALANCE option in <ulink
|
|
|
|
url="manpages/shorewall.conf.html">shorewall.conf</ulink> (5).</para>
|
|
|
|
|
|
|
|
<para>ROUTE_BALANCE=Yes is marked as Experimental currently. This means
|
|
|
|
that it is a 'use at your own risk' feature; if you encounter problems,
|
|
|
|
the Shorewall support staff may not be able to provide you with a quick
|
|
|
|
solution.</para>
|
|
|
|
|
|
|
|
<para>One of the drawbacks of the Mulit-ISP support as described in the
|
|
|
|
preceding section is that changes to the main table made by applications
|
|
|
|
are not added to the individual provider tables. This makes route rules
|
|
|
|
such as described in <link linkend="Openvpn">one of the examples
|
|
|
|
above</link> necessary.</para>
|
|
|
|
|
|
|
|
<para>ROUTE_BALANCE=Yes works around that problem by passing packets
|
|
|
|
through the main table first rather than last. This has a number of
|
|
|
|
implications:</para>
|
|
|
|
|
|
|
|
<orderedlist>
|
|
|
|
<listitem>
|
|
|
|
<para>Both the DUPLICATE and the COPY columns in the providers file
|
|
|
|
must remain empty or contain "-". The individual provider routing
|
|
|
|
tables generated when ROUTE_BALANCE=Yes contain only a host route to
|
|
|
|
the gateway and a default route via the gateway.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>The balance option is assumed for all interfaces that do not
|
|
|
|
have the <emphasis role="bold">loose</emphasis> option.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>The default route generated by Shorewall is added to the
|
|
|
|
<emphasis>default</emphasis> routing table (253) rather than to the
|
|
|
|
main routing table (254).</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Packets are sent through the main routing table by a routing
|
|
|
|
rule with priority 999. In ), the priority range 1-998 may be used for
|
|
|
|
inserting rules that bypass the main table.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>All provider gateways must be specified explicitly in the
|
|
|
|
GATEWAY column. 'detect' may not be specified. Note that for ppp
|
|
|
|
interfaces, the GATEWAY may remain unspecified ("-").</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>You should disable all default route management outside of
|
2008-07-03 22:56:46 +02:00
|
|
|
Shorewall. If a default route is inadvertently added to the main table
|
|
|
|
while Shorewall is started, then all policy routing will stop working
|
|
|
|
except for those routing rules in the priority range 1-998.</para>
|
2008-07-03 22:52:09 +02:00
|
|
|
</listitem>
|
|
|
|
</orderedlist>
|
|
|
|
|
|
|
|
<para>Although 'balance' is automatically assumed when ROUTE_BALANCE=Yes,
|
|
|
|
you can easily cause all traffic to use one provider except when you
|
|
|
|
explicitly direct it to use the other provider via <ulink
|
|
|
|
url="manpages/shorewall-route_rules.html">shorewall-route_rules</ulink>
|
|
|
|
(5) or <ulink
|
|
|
|
url="manpages/shorewall-tcrules.html">shorewall-tcrules</ulink>
|
|
|
|
(5).</para>
|
|
|
|
|
|
|
|
<para>Example (send all traffic through the 'shorewall' provider unless
|
|
|
|
otherwise directed).</para>
|
|
|
|
|
|
|
|
<para>/etc/shorewall/providers:<programlisting>#NAME NUMBER MARK DUPLICATE INTERFACE GATEWAY OPTIONS
|
|
|
|
linksys 1 1 - wlan0 172.20.1.1 track,balance=1,optional
|
|
|
|
shorewall 2 2 - eth0 192.168.1.254 track,balance=2,optional</programlisting>/etc/shorewall/rules:<programlisting>#SOURCE DEST PROVIDER PRIORITY
|
|
|
|
- - shorewall 11999</programlisting></para>
|
|
|
|
</section>
|
2007-06-28 22:20:16 +02:00
|
|
|
</article>
|