Sponsored Content
Full Discussion: ISP VPS, routing traffic
Special Forums IP Networking Proxy Server ISP VPS, routing traffic Post 302909414 by solaris_user on Wednesday 16th of July 2014 06:16:39 PM
Old 07-16-2014
Routing traffic from ISP datacenter to enterprise LAN

Hi guys

I need to setup server/router in my firm. We got from our ISP dedicated server in their data center. It has a static IP and it servers as replacement for out DSL connection. I configured our internal server to be border gateway and to connects to data center. "Remote" admin installed squid and IT staff can access to the websites but other can't. I want to remove that proxy server. I think I really don't need it.

Here is the picture how above situation looks

Image

Server router has two NICs, one is connected to ISP router which we can't access, and one nic is connected to our private LAN. I use CentOS Linux 6.5 x64 to act as router. I added in iptables firewall to forward all traffic from eth0 to eth1 (from internal to public) and allowed traffic to leave server. All output traffic is nated.

Problem is on the other site. I'm not a network engineer but only with some knowledge in networking and formal IT education at the firm. My problem is I can't ping anything on the Internet while our VPS can. On that same server only port 80 and 22 are opened. People who setup proxy can connect to outside world but can't ping, can't use other networking software.

I have some questions:

How I can see my private LAN from ISP network, I will need to setup VPN in the short time ?
Is possible to avoid proxy and just with firewall NAT get data from the net back to the hosts in the private LAN ?

I am afraid to mess with ISP server because they administrate that server, we are and I really won't to understand how configure a network.

Thanks for reading and suggestions.

Last edited by solaris_user; 07-16-2014 at 07:26 PM..
 

8 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Linux for an internet server to an ISP

I just moved away from a T3 line back to a dial up I just wanted to know would a P200 with 64meg and a 4 gig hard drive be ok for a linux server for an additional 3 pcs all running win98. I will be dialing into an isp using a 56k v90 modem. Any support or help will be great. (3 Replies)
Discussion started by: izrailov
3 Replies

2. UNIX for Dummies Questions & Answers

Cannot connect to my ISP

I'm totally frustrated, my administrator has left the state and me high and dry! My modem cannot connect to my ISP all it does is start to ping and the a high pitched squeal for about a minute. I have logged on as the "root" in hope to get into my /etc/ppp/ppp.conf file however I get a... (8 Replies)
Discussion started by: coolteach
8 Replies

3. IP Networking

Routing Network Traffic With Mandrake

I am running Mandrake 8.0 (KDE ver 2.1.1) on a machine with 2 NICs. This is a college project. I am attempting to configure this machine as a firewall, and to pass packets from one network to another. Eth0 is on my external network. Eth1 is on my internal network. I set the gateway in "netconf"... (1 Reply)
Discussion started by: Deuce
1 Replies

4. UNIX for Dummies Questions & Answers

schedule dial-out different ISP's

Hi, I'm running user ppp on FreeBSD. I have an internet account which gives me the oppertunity to login for free (say €25 a month :)) during specific hours. Outside these hours I pay the normal fee. I also have another ISP which gives me the oppertunity to log in for a reduced fee all times. ... (2 Replies)
Discussion started by: Hansaplast
2 Replies

5. IP Networking

2 ip from one subnet my isp

Hi. my english is not so good. sorry. i have some problem. My isp give me second ip from subnet. One network is working, but secong don't. fxp0 - my network dc0 - network isp (that working) re0 - network isp (don't working) i try use ng_one2many, but it's don't working ngctl mkpeer... (0 Replies)
Discussion started by: kil
0 Replies

6. IP Networking

Routing traffic problem between 3G and Office Lan Network

Hi, I would like to ask some networking solution regarding my work LAN and 3G usb network problem. I want to route my internet traffic to the 3G network and sometimes connect to some of my work network for ssh to configure some workstation or print something. Currently my problem is i can't... (0 Replies)
Discussion started by: jao_madn
0 Replies

7. Solaris

Traffic routing through wrong interface

Solaris-9 server is having one primary IP 10.41.161.14 on qfe0 and 10.41.116.0 on qfe3:1. Traffic is going through virtual interface instead of physical interface. How should I force traffic to go with primary interface. root@smtsrvn01:/# netstat -nr Routing Table: IPv4 Destination ... (2 Replies)
Discussion started by: solaris_1977
2 Replies

8. IP Networking

Multiple isp physical connection

Hello all my friends see picture to understand my problem http://www.imageurlhost.com/images/8mf8ni4btu6r4qy1rp9_Networking-photo.png i want to know that how my company can connect multiple isp via switch and output from switch is directly connected to linux firewall. Any help Thanks (1 Reply)
Discussion started by: rink
1 Replies
SHOREWALL-PROVIDERS(5)						  [FIXME: manual]					    SHOREWALL-PROVIDERS(5)

NAME
providers - Shorewall Providers file SYNOPSIS
/etc/shorewall/providers DESCRIPTION
This file is used to define additional routing tables. You will want to define an additional table if: o You have connections to more than one ISP or multiple connections to the same ISP o You run Squid as a transparent proxy on a host other than the firewall. o You have other requirements for policy routing. Each entry in the file defines a single routing table. If you wish to omit a column entry but want to include an entry in the next column, use "-" for the omitted entry. The columns in the file are as follows. NAME - name The provider name. Must be a valid shell variable name. The names 'local', 'main', 'default' and 'unspec' are reserved and may not be used as provider names. NUMBER - number The provider number -- a number between 1 and 15. Each provider must be assigned a unique value. MARK (Optional) - value A FWMARK value used in your shorewall-tcrules(5)[1] file to direct packets to this provider. If HIGH_ROUTE_MARKS=Yes in shorewall.conf(5)[2], then the value must be a multiple of 256 between 256 and 65280 or their hexadecimal equivalents (0x0100 and 0xff00 with the low-order byte of the value being zero). Otherwise, the value must be between 1 and 255. Each provider must be assigned a unique mark value. This column may be omitted if you don't use packet marking to direct connections to a particular provider. DUPLICATE - routing-table-name The name of an existing table to duplicate to create this routing table. May be main or the name of a previously listed provider. You may select only certain entries from the table to copy by using the COPY column below. This column should contain a dash ("-') when USE_DEFAULT_RT=Yes in shorewall.conf(5)[2]. INTERFACE - interface[:address] The name of the network interface to the provider. Must be listed in shorewall-interfaces(5)[3]. In general, that interface should not have the proxyarp option specified unless loose is given in the OPTIONS column of this entry. Where more than one provider is serviced through a single interface, the interface must be followed by a colon and the IP address of the interface that is supplied by the associated provider. GATEWAY - {-|address|detect} The IP address of the provider's gateway router. You can enter "detect" here and Shorewall will attempt to detect the gateway automatically. For PPP devices, you may omit this column. OPTIONS (Optional) - [-|option[,option]...] A comma-separated list selected from the following. The order of the options is not significant but the list may contain no embedded whitespace. track If specified, inbound connections on this interface are to be tracked so that responses may be routed back out this same interface. You want to specify track if internet hosts will be connecting to local servers through this provider. Beginning with Shorewall 4.4.3, track defaults to the setting of the TRACK_PROVIDERS option in shorewall.conf[2] (5). If you set TRACK_PROVIDERS=Yes and want to override that setting for an individual provider, then specify notrack (see below). balance[=weight] The providers that have balance specified will get outbound traffic load-balanced among them. By default, all interfaces with balance specified will have the same weight (1). You can change the weight of an interface by specifying balance=weight where weight is the weight of the route out of this interface. loose Shorewall normally adds a routing rule for each IP address on an interface which forces traffic whose source is that IP address to be sent using the routing table for that interface. Setting loose prevents creation of such rules on this interface. notrack Added in Shorewall 4.4.3. When specified, turns off track. optional (deprecated for use with providers that do not share an interface) If the interface named in the INTERFACE column is not up and configured with an IPv4 address then ignore this provider. If not specified, the value of the optional option for the INTERFACE in shorewall-interfaces(5)[3] is assumed. Use of that option is preferred to this one, unless an address is provider in the INTERFACE column. src=source-address Specifies the source address to use when routing to this provider and none is known (the local client has bound to the 0 address). May not be specified when an address is given in the INTERFACE column. If this option is not used, Shorewall substitutes the primary IP address on the interface named in the INTERFACE column. mtu=number Specifies the MTU when forwarding through this provider. If not given, the MTU of the interface named in the INTERFACE column is assumed. fallback[=weight] Indicates that a default route through the provider should be added to the default routing table (table 253). If a weight is given, a balanced route is added with the weight of this provider equal to the specified weight. If the option is given without a weight, an separate default route is added through the provider's gateway; the route has a metric equal to the provider's NUMBER. Prior to Shorewall 4.4.24, the option is ignored with a warning message if USE_DEFAULT_RT=Yes in shorewall.conf. tproxy Added in Shorewall 4.5.4. Used for supporting the TPROXY action in shorewall-tcrules(5). See http://www.shorewall.net/Shorewall_Squid_Usage.html. When specified, the MARK, DUPLICATE and GATEWAY columns should be empty, INTERFACE should be set to 'lo' and tproxy should be the only OPTION. Only one tproxy provider is allowed. COPY - [{none|interface[,interface]...}] A comma-separated list of other interfaces on your firewall. Wildcards specified using an asterisk ("*") are permitted (e.g., tun* ). Usually used only when DUPLICATE is main. Only copy routes through INTERFACE and through interfaces listed here. If you only wish to copy routes through INTERFACE, enter none in this column. EXAMPLES
Example 1: You run squid in your DMZ on IP address 192.168.2.99. Your DMZ interface is eth2 #NAME NUMBER MARK DUPLICATE INTERFACE GATEWAY OPTIONS Squid 1 1 - eth2 192.168.2.99 - Example 2: eth0 connects to ISP 1. The IP address of eth0 is 206.124.146.176 and the ISP's gateway router has IP address 206.124.146.254. eth1 connects to ISP 2. The IP address of eth1 is 130.252.99.27 and the ISP's gateway router has IP address 130.252.99.254. eth2 connects to a local network. #NAME NUMBER MARK DUPLICATE INTERFACE GATEWAY OPTIONS COPY ISP1 1 1 main eth0 206.124.146.254 track,balance eth2 ISP2 2 2 main eth1 130.252.99.254 track,balance eth2 FILES
/etc/shorewall/providers SEE ALSO
http://shorewall.net/MultiISP.html http://shorewall.net/configuration_file_basics.htm#Pairs shorewall(8), shorewall-accounting(5), shorewall-actions(5), shorewall-blacklist(5), shorewall-hosts(5), shorewall_interfaces(5), shorewall-ipsets(5), shorewall-maclist(5), shorewall-masq(5), shorewall-nat(5), shorewall-netmap(5), shorewall-params(5), shorewall-policy(5), shorewall-proxyarp(5), shorewall-rtrules(5), shorewall-routestopped(5), shorewall-rules(5), shorewall.conf(5), shorewall-secmarks(5), shorewall-tcclasses(5), shorewall-tcdevices(5), shorewall-tcrules(5), shorewall-tos(5), shorewall-tunnels(5), shorewall-zones(5) NOTES
1. shorewall-tcrules(5) http://www.shorewall.net/manpages/shorewall-tcrules.html 2. shorewall.conf(5) http://www.shorewall.net/manpages/shorewall.conf.html 3. shorewall-interfaces(5) http://www.shorewall.net/manpages/shorewall-interfaces.html [FIXME: source] 06/28/2012 SHOREWALL-PROVIDERS(5)
All times are GMT -4. The time now is 12:12 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy