It tells you that 0 packets were SNAT'ed via eth3 ... so it seems your fix 
worked.

Lonnie


> On Mar 26, 2021, at 5:10 PM, Michael Knill 
> <michael.kn...@ipcsolutions.com.au> wrote:
> 
> Hi Lonnie
> 
> I haven’t managed to test out this site yet but as they are currently having 
> an internet outage I thought I would hop in and have a look as ppp0 is now 
> down.
> How is the best way to determine that SNAT is turned off other than being 
> onsite?
> 
> I tried 'arno-iptables-firewall status':
> ....
> Chain OUTBOUND_SNAT (0 references)
>    pkts      bytes target     prot opt in     out     source               
> destination
> 1172540 140692582 SNAT       all  --  *      ppp+    172.30.10.2         
> !172.30.10.2          to:139.218.40.144
>       0        0 SNAT       all  --  *      eth3    172.30.10.2         
> !172.30.10.2          to:139.218.40.144
> ....
> 
> Has that told me anything.
> 
> Regards
> Michael Knill
> 
> On 20/3/21, 9:30 am, "Michael Knill" <michael.kn...@ipcsolutions.com.au> 
> wrote:
> 
>    Thanks. Will do.
> 
>    Regards
>    Michael Knill
> 
>    On 20/3/21, 9:29 am, "Lonnie Abelbeck" <li...@lonnie.abelbeck.com> wrote:
> 
>> So just to confirm, there shouldn't be any issues in having this in my 
>> default wan-failover.script e.g. whether outbound-snat is configured or not?
> 
>        Correct, the OUTBOUND_SNAT nat chain should only exist when the 
> outbound-snat plugin is enabled.
> 
>        But test anyway :-)
> 
>        Lonnie
> 
> 
>> On Mar 19, 2021, at 5:13 PM, Michael Knill 
>> <michael.kn...@ipcsolutions.com.au> wrote:
>> 
>> Thanks Lonnie
>> 
>> So just to confirm, there shouldn't be any issues in having this in my 
>> default wan-failover.script e.g. whether outbound-snat is configured or not?
>> 
>> Regards
>> Michael Knill
>> 
>> On 20/3/21, 9:08 am, "Lonnie Abelbeck" <li...@lonnie.abelbeck.com> wrote:
>> 
>>  Hi Michael,
>> 
>>  Again off the top of my head (needs testing), this would be more general...
>>  -- /mnt/kd/wan-failover.script snippet --
>> 
>>     SECONDARY)
>>  ...
>>       ## Disable outbound-snat plugin in iptables
>>       if iptables -t nat -nL OUTBOUND_SNAT >/dev/null 2>&1; then
>>         iptables -t nat -D POSTROUTING -j OUTBOUND_SNAT
>>       fi
>>       ;;
>> 
>>     PRIMARY)
>>  ...
>>       ## Re-Enable outbound-snat plugin
>>       if iptables -t nat -nL OUTBOUND_SNAT >/dev/null 2>&1; then
>>         iptables -t nat -I POSTROUTING -j OUTBOUND_SNAT
>>       fi
>>       ;;
>>  --
>> 
>>  I'm having second thoughts about editing the ENABLED variable ... what if 
>> the box was rebooted while on failover, with ENABLED set to 0 on SECONDARY 
>> you would have effectively disabled the outbound-snat plugin after reboot.
>> 
>>  But, the above snippet should work whether the outbound-snat plugin is 
>> enabled or not.
>> 
>>  But still not perfect.
>> 
>>> PS. Would this be worth doing as part of the standard failover as I cant 
>>> think of any instance where we would not want to disable SNAT when it fails 
>>> over to another WAN interface.
>> 
>>  Yes, but I doubt the outbound-snat plugin is enabled very commonly, 
>> implying multiple IPv4 WAN addresses.  My first though is to do as above in 
>> the wan-failover.script.
>> 
>>  Lonnie
>> 
>> 
>>> On Mar 19, 2021, at 4:05 PM, Michael Knill 
>>> <michael.kn...@ipcsolutions.com.au> wrote:
>>> 
>>> Thanks Lonnie
>>> 
>>> Sorry for the late reply. Yes I'm using the outbound-snat plugin.
>>> So just to confirm:
>>> SECONDARY)
>>> ....
>>>   ## Disable outbound-snat plugin in both iptables and config file in case 
>>> of reboot
>>>   iptables -t nat -D POSTROUTING -j OUTBOUND_SNAT
>>>   sed -i 's/^ENABLED=.*$/ENABLED=0/' 
>>> /etc/arno-iptables-firewall/plugins/outbound-snat.conf
>>>   ;;
>>> 
>>> PRIMARY)
>>> ...
>>>   ## Re-Enable outbound-snat plugin and config file
>>>   iptables -t nat -I POSTROUTING -j OUTBOUND_SNAT
>>>   sed -i 's/^ENABLED=.*$/ENABLED=1/' 
>>> /etc/arno-iptables-firewall/plugins/outbound-snat.conf
>>>   ;;
>>> 
>>> I'm thinking that I might look at OUTBOUND_SNAT_NET_HOST to see if 
>>> something is set to make the decision on whether I disable and re-enable so 
>>> it can be a generic script.
>>> 
>>> PS. Would this be worth doing as part of the standard failover as I cant 
>>> think of any instance where we would not want to disable SNAT when it fails 
>>> over to another WAN interface.
>>> 
>>> Regards
>>> Michael Knill
>>> 
>>> On 18/3/21, 1:49 am, "Lonnie Abelbeck" <li...@lonnie.abelbeck.com> wrote:
>>> 
>>> Hi Michael,
>>> 
>>> When you say you have SNAT configured, are you using the nat-loopback 
>>> plugin or the outbound-snat plugin ?
>>> 
>>> Either of those require obtaining the WAN IPv4 address to attach iptables 
>>> "-j SNAT --to-source $ip" rules, and as written only look at the primary 
>>> external address.  Even if the Failover interface was looked at, the 
>>> firewall would have to be rebuilt for the failover context switch with the 
>>> /mnt/kd/wan-failover.script .
>>> 
>>> Question, does either of these plugins make sense for a failover situation ?
>>> 
>>> Possibly you want to disable the outbound-snat plugin on failover and 
>>> re-enable it on return to primary ?
>>> 
>>> If you have the special case of the outbound-snat plugin enabled, you could 
>>> (untested code):
>>> 
>>> -- /mnt/kd/wan-failover.script snippet --
>>> 
>>> SECONDARY)
>>>   ## Switched to Failover using secondary WAN link
>>> 
>>>   ## Disable outbound-snat plugin
>>>   iptables -t nat -D POSTROUTING -j OUTBOUND_SNAT
>>>   ;;
>>> 
>>> PRIMARY)
>>>   ## Switched back to normal using primary WAN link
>>> 
>>>   ## Re-Enable outbound-snat plugin
>>>   iptables -t nat -I POSTROUTING -j OUTBOUND_SNAT
>>>   ;;
>>> 
>>> --
>>> but this is somewhat fragile, such that if the firewall was restarted 
>>> during failover it would revert to the PRIMARY setting.  To be less 
>>> fragile, you could also add:
>>> --
>>> sed -i 's/^ENABLED=.*$/ENABLED=0/' 
>>> /etc/arno-iptables-firewall/plugins/outbound-snat.conf"
>>> --
>>> and ENABLED=1 on return to PRIMARY.
>>> 
>>> 
>>> Lonnie
>>> 
>>> 
>>> 
>>>> On Mar 17, 2021, at 1:16 AM, Michael Knill 
>>>> <michael.kn...@ipcsolutions.com.au> wrote:
>>>> 
>>>> Grr problem now found. I had SNAT configured which didn't work on the 
>>>> second WAN connection.
>>>> Any way I can fix this e.g. don't do SNAT on the failover WAN?
>>>> 
>>>> Regards
>>>> Michael Knill
>>>> 
>>>> From: Michael Knill <michael.kn...@ipcsolutions.com.au>
>>>> Reply to: AstLinux List <astlinux-users@lists.sourceforge.net>
>>>> Date: Wednesday, 17 March 2021 at 4:27 pm
>>>> To: AstLinux List <astlinux-users@lists.sourceforge.net>
>>>> Subject: [Astlinux-users] Weird routing problem
>>>> 
>>>> Hi Group
>>>> 
>>>> I'm currently at a site that has a primary and failover WAN connection and 
>>>> a two LAN connections. The primary WAN connection has failed over to the 
>>>> secondary WAN connection however it is only working on one of the LAN 
>>>> interfaces and not the other. I can ping the interface address fine so its 
>>>> not an interface problem.
>>>> 
>>>> Does anyone have any idea why this would be happenning?
>>>> 
>>>> Regards
>>>> Michael Knill
>>>> _______________________________________________
>>>> Astlinux-users mailing list
>>>> Astlinux-users@lists.sourceforge.net
>>>> https://lists.sourceforge.net/lists/listinfo/astlinux-users
>>>> 
>>>> Donations to support AstLinux are graciously accepted via PayPal to 
>>>> pay...@krisk.org.
>>> 
>>> 
>>> 
>>> _______________________________________________
>>> Astlinux-users mailing list
>>> Astlinux-users@lists.sourceforge.net
>>> https://lists.sourceforge.net/lists/listinfo/astlinux-users
>>> 
>>> Donations to support AstLinux are graciously accepted via PayPal to 
>>> pay...@krisk.org.
>>> 
>>> 
>>> _______________________________________________
>>> Astlinux-users mailing list
>>> Astlinux-users@lists.sourceforge.net
>>> https://lists.sourceforge.net/lists/listinfo/astlinux-users
>>> 
>>> Donations to support AstLinux are graciously accepted via PayPal to 
>>> pay...@krisk.org.
>> 
>> 
>> 
>>  _______________________________________________
>>  Astlinux-users mailing list
>>  Astlinux-users@lists.sourceforge.net
>>  https://lists.sourceforge.net/lists/listinfo/astlinux-users
>> 
>>  Donations to support AstLinux are graciously accepted via PayPal to 
>> pay...@krisk.org.
>> 
>> 
>> _______________________________________________
>> Astlinux-users mailing list
>> Astlinux-users@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/astlinux-users
>> 
>> Donations to support AstLinux are graciously accepted via PayPal to 
>> pay...@krisk.org.
> 
> 
> 
>        _______________________________________________
>        Astlinux-users mailing list
>        Astlinux-users@lists.sourceforge.net
>        https://lists.sourceforge.net/lists/listinfo/astlinux-users
> 
>        Donations to support AstLinux are graciously accepted via PayPal to 
> pay...@krisk.org.
> 
> 
>    _______________________________________________
>    Astlinux-users mailing list
>    Astlinux-users@lists.sourceforge.net
>    https://lists.sourceforge.net/lists/listinfo/astlinux-users
> 
>    Donations to support AstLinux are graciously accepted via PayPal to 
> pay...@krisk.org.
> 
> 
> _______________________________________________
> Astlinux-users mailing list
> Astlinux-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/astlinux-users
> 
> Donations to support AstLinux are graciously accepted via PayPal to 
> pay...@krisk.org.



_______________________________________________
Astlinux-users mailing list
Astlinux-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/astlinux-users

Donations to support AstLinux are graciously accepted via PayPal to 
pay...@krisk.org.

Reply via email to