Sponsored Content
Top Forums UNIX for Advanced & Expert Users Firewall - 2 Internet accesses - routing rules from source Post 62605 by el70 on Thursday 17th of February 2005 03:10:10 PM
Old 02-17-2005
Firewall - 2 Internet accesses - routing rules from source

Hello,

I would like to modify my firewall configuration for being able to handle 2 internet connections in my Red zone.
I would then like to configure some selecting routing rules depending on the internal source.

Actual configuration:
=====================
1 router A (ISP)
|
| (Red) with different public adresses
|
FW---------------- (Orange)
|
|(green)
|
===================== (LAN)

the default gateway of my firewall is fixed to the @ of my ISP router

New desired configuration :
=====================
I now have 2 ISP providers with 2 different routers. (belonging to my ISP)
In the future I even think to add some more new ones.

routers A(ISP-A) and router B (ISP-B)
-------------
|
| (Red) with different public adresses
|
FW---------------- (Orange)
|
|(green)
|
===================== (LAN)

I wish to configure some routing rules in my firewall, so to be able to select the INTERNET exit gateway depending on the internal source.

I succeeded to make a simulation of this situation, using a Linux server as firewall and router.
I configured all rules in the Linux box using commands like : iptables, ip rule, an so on... .
I used some examples found in books and in Internet pages or forum.

But now I'm looking in a way to do it in my PRODCTION environment with my SMOOTHWALL-SERVER firewall.

I did not succeed to find how to do it with the Web interface of this product. Or better say, I did not know exactly where to look for it.
I even tried to force a configuration in a text mode command. But it seems that ip rule commands are not usable in the kernel situation of the Smoothwall.


If anyone knows how to do it with Smoothwall Server or Smoothwall Express I would appreciate some help. From a Smoothwall Express example, I would surely find a similar way of doing it with Smoothwall Server.

Here is the example of the routing rules I would like to be able to configure.
* all internet traffic from a server A in my LAN zone should pass through router B to go to the INTERNET.
* and all the traffic from all other computers or servers from my LAN should go through router A.
or the same rule for computers in my orange zone.
* all internet traffic from a server B in my orange zone should pass through router B to go to the INTERNET.
* and all the traffic from all other computers or servers from my orange zone should go through router A.

My question will perhaps seems a little bit tricky or even stupid for some of you.
But I'm a beginner in firewall configuration and I do not know much about it.
I just a begginer and any help will be fully appreciate.

Thanks for any indications or help that can guide me through my researches an tests.

Excuse all english mistakes in this text. I'm just a french guy and I do not write in english very often.

Thanks to all of you.
 

8 More Discussions You Might Find Interesting

1. IP Networking

Routing, Port Mapping, Internet Sharing etc etc

I'm running OS X. (OS X Server actually) and right now I use a program called BrickHouse to handle my router configuration. But this program kind of sucks. I'd much rather learn how to configure these programs manually. By these programs, I mean the programs OS X comes with to handle these jobs... (0 Replies)
Discussion started by: l008com
0 Replies

2. UNIX for Dummies Questions & Answers

Best open source firewall for a Centos Server

any recommendations ? thanks (1 Reply)
Discussion started by: upirate
1 Replies

3. UNIX for Advanced & Expert Users

routing and firewall

I have a PC with KUBUNTU installed on it and with 2NIC's on it (two PCI network 100Mbit cards). I want to use it as a server packet router and firewall between two computers with windows installed on them, each of this computer being connected to one different card on the KUBUNTU server. The... (1 Reply)
Discussion started by: meorfi
1 Replies

4. Linux

routing rules for dmz in debian router.

Hi to all. There are eth0(wan) eth1(lan) and eth3(dmz) in my debian router. In dmz is planing dns, ad, dhcp, smtp/pop/imap, https(web-based imap client). I don't configured rules on "iptables" and "route" loads for right relation lan clients with dmz services. Please explain me example... (0 Replies)
Discussion started by: sotich82
0 Replies

5. IP Networking

Firewall with sslvpn with Internet gateway

hi, i have this diagram internet | | -------------- |firewall/sslvpn | -------------- | | 192.168.0.0/24 | -------------------------- ---- ------------- | internet gateway win2003|----|10.1.2.0/24 |... (0 Replies)
Discussion started by: itik
0 Replies

6. Red Hat

Iptables/Firewall rules for multicast IP.

Hi Gurus, I need to add Multicast Port = xyz Multicast Address = 123.134.143 ( example) to my firewall rules. Can you please guide me with the lines I need to update my iptables files with. (0 Replies)
Discussion started by: rama krishna
0 Replies

7. IP Networking

Source IP address field in RREP on DSR routing

Hello I have a question about routing in MANET using Dynamic Source Routing protocol. IN RFC4728 (DSR) in section "IP fields" of RREP (Route Reply) packet we have this: ok. I read in several books and also in rfc4728 that: when a source node (node that initiate route discovery process)... (1 Reply)
Discussion started by: acu281
1 Replies

8. IP Networking

[Android-Networking] can't acces internet, while settings says all is ok => Routing/Nameserver prob

Hello, since a while, i have a very strange and frustrating network problem with my Huawei p6(Android 4.4.2). The ROM is "Omni Rom", i think - but it shouldn't matter. The problem is: when i try to connect through wlan (i have no mobile internet), according to the network manager of android,... (1 Reply)
Discussion started by: Palindrom
1 Replies
SHOREWALL-PROVIDERS(5)						  [FIXME: manual]					    SHOREWALL-PROVIDERS(5)

NAME
providers - Shorewall Providers file SYNOPSIS
/etc/shorewall/providers DESCRIPTION
This file is used to define additional routing tables. You will want to define an additional table if: o You have connections to more than one ISP or multiple connections to the same ISP o You run Squid as a transparent proxy on a host other than the firewall. o You have other requirements for policy routing. Each entry in the file defines a single routing table. If you wish to omit a column entry but want to include an entry in the next column, use "-" for the omitted entry. The columns in the file are as follows. NAME - name The provider name. Must be a valid shell variable name. The names 'local', 'main', 'default' and 'unspec' are reserved and may not be used as provider names. NUMBER - number The provider number -- a number between 1 and 15. Each provider must be assigned a unique value. MARK (Optional) - value A FWMARK value used in your shorewall-tcrules(5)[1] file to direct packets to this provider. If HIGH_ROUTE_MARKS=Yes in shorewall.conf(5)[2], then the value must be a multiple of 256 between 256 and 65280 or their hexadecimal equivalents (0x0100 and 0xff00 with the low-order byte of the value being zero). Otherwise, the value must be between 1 and 255. Each provider must be assigned a unique mark value. This column may be omitted if you don't use packet marking to direct connections to a particular provider. DUPLICATE - routing-table-name The name of an existing table to duplicate to create this routing table. May be main or the name of a previously listed provider. You may select only certain entries from the table to copy by using the COPY column below. This column should contain a dash ("-') when USE_DEFAULT_RT=Yes in shorewall.conf(5)[2]. INTERFACE - interface[:address] The name of the network interface to the provider. Must be listed in shorewall-interfaces(5)[3]. In general, that interface should not have the proxyarp option specified unless loose is given in the OPTIONS column of this entry. Where more than one provider is serviced through a single interface, the interface must be followed by a colon and the IP address of the interface that is supplied by the associated provider. GATEWAY - {-|address|detect} The IP address of the provider's gateway router. You can enter "detect" here and Shorewall will attempt to detect the gateway automatically. For PPP devices, you may omit this column. OPTIONS (Optional) - [-|option[,option]...] A comma-separated list selected from the following. The order of the options is not significant but the list may contain no embedded whitespace. track If specified, inbound connections on this interface are to be tracked so that responses may be routed back out this same interface. You want to specify track if internet hosts will be connecting to local servers through this provider. Beginning with Shorewall 4.4.3, track defaults to the setting of the TRACK_PROVIDERS option in shorewall.conf[2] (5). If you set TRACK_PROVIDERS=Yes and want to override that setting for an individual provider, then specify notrack (see below). balance[=weight] The providers that have balance specified will get outbound traffic load-balanced among them. By default, all interfaces with balance specified will have the same weight (1). You can change the weight of an interface by specifying balance=weight where weight is the weight of the route out of this interface. loose Shorewall normally adds a routing rule for each IP address on an interface which forces traffic whose source is that IP address to be sent using the routing table for that interface. Setting loose prevents creation of such rules on this interface. notrack Added in Shorewall 4.4.3. When specified, turns off track. optional (deprecated for use with providers that do not share an interface) If the interface named in the INTERFACE column is not up and configured with an IPv4 address then ignore this provider. If not specified, the value of the optional option for the INTERFACE in shorewall-interfaces(5)[3] is assumed. Use of that option is preferred to this one, unless an address is provider in the INTERFACE column. src=source-address Specifies the source address to use when routing to this provider and none is known (the local client has bound to the 0 address). May not be specified when an address is given in the INTERFACE column. If this option is not used, Shorewall substitutes the primary IP address on the interface named in the INTERFACE column. mtu=number Specifies the MTU when forwarding through this provider. If not given, the MTU of the interface named in the INTERFACE column is assumed. fallback[=weight] Indicates that a default route through the provider should be added to the default routing table (table 253). If a weight is given, a balanced route is added with the weight of this provider equal to the specified weight. If the option is given without a weight, an separate default route is added through the provider's gateway; the route has a metric equal to the provider's NUMBER. Prior to Shorewall 4.4.24, the option is ignored with a warning message if USE_DEFAULT_RT=Yes in shorewall.conf. tproxy Added in Shorewall 4.5.4. Used for supporting the TPROXY action in shorewall-tcrules(5). See http://www.shorewall.net/Shorewall_Squid_Usage.html. When specified, the MARK, DUPLICATE and GATEWAY columns should be empty, INTERFACE should be set to 'lo' and tproxy should be the only OPTION. Only one tproxy provider is allowed. COPY - [{none|interface[,interface]...}] A comma-separated list of other interfaces on your firewall. Wildcards specified using an asterisk ("*") are permitted (e.g., tun* ). Usually used only when DUPLICATE is main. Only copy routes through INTERFACE and through interfaces listed here. If you only wish to copy routes through INTERFACE, enter none in this column. EXAMPLES
Example 1: You run squid in your DMZ on IP address 192.168.2.99. Your DMZ interface is eth2 #NAME NUMBER MARK DUPLICATE INTERFACE GATEWAY OPTIONS Squid 1 1 - eth2 192.168.2.99 - Example 2: eth0 connects to ISP 1. The IP address of eth0 is 206.124.146.176 and the ISP's gateway router has IP address 206.124.146.254. eth1 connects to ISP 2. The IP address of eth1 is 130.252.99.27 and the ISP's gateway router has IP address 130.252.99.254. eth2 connects to a local network. #NAME NUMBER MARK DUPLICATE INTERFACE GATEWAY OPTIONS COPY ISP1 1 1 main eth0 206.124.146.254 track,balance eth2 ISP2 2 2 main eth1 130.252.99.254 track,balance eth2 FILES
/etc/shorewall/providers SEE ALSO
http://shorewall.net/MultiISP.html http://shorewall.net/configuration_file_basics.htm#Pairs shorewall(8), shorewall-accounting(5), shorewall-actions(5), shorewall-blacklist(5), shorewall-hosts(5), shorewall_interfaces(5), shorewall-ipsets(5), shorewall-maclist(5), shorewall-masq(5), shorewall-nat(5), shorewall-netmap(5), shorewall-params(5), shorewall-policy(5), shorewall-proxyarp(5), shorewall-rtrules(5), shorewall-routestopped(5), shorewall-rules(5), shorewall.conf(5), shorewall-secmarks(5), shorewall-tcclasses(5), shorewall-tcdevices(5), shorewall-tcrules(5), shorewall-tos(5), shorewall-tunnels(5), shorewall-zones(5) NOTES
1. shorewall-tcrules(5) http://www.shorewall.net/manpages/shorewall-tcrules.html 2. shorewall.conf(5) http://www.shorewall.net/manpages/shorewall.conf.html 3. shorewall-interfaces(5) http://www.shorewall.net/manpages/shorewall-interfaces.html [FIXME: source] 06/28/2012 SHOREWALL-PROVIDERS(5)
All times are GMT -4. The time now is 01:48 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy