-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[cross-posted to multiple lists.]

Hi all,

For those who are not able to afford a fat pipe connection, and
depending on multiple small pipes, there is a good news. Now, they can
bond multiple ethernet links from Airtel and from some other ISP (e.g.
WTOM). By bonding I mean, being able to route outgoing packets from
WTOM's IP address via Airtel's link, and probably vice versa (not
tested other way round).

To verify this, try following:

1. Make sure both your ethernet links from different ISPs are
connected to a single interface on your router, i.e. using a network
switch.

2. Now, assign addresses from both ISPs to the single interface:

- ---->8---->8----
abbe [~] chateau % /sbin/ifconfig fxp0
fxp0      Link encap:Ethernet  HWaddr 00:13:20:B7:55:0A  
          inet addr:172.16.0.2  Bcast:172.16.0.31  Mask:255.255.255.224
          inet6 addr: 2001:db8:3151::1/48 Scope:Global
          inet6 addr: fe80::213:20ff:feb7:550a/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:67542 errors:0 dropped:0 overruns:0 frame:0
          TX packets:67029 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:43453983 (41.4 Mb)  TX bytes:35309688 (33.6 Mb)

abbe [~] chateau % /sbin/ifconfig fxp0:0
fxp0:0    Link encap:Ethernet  HWaddr 00:13:20:B7:55:0A  
          inet addr:aaa.bbb.ccc.ddd  Bcast:172.16.0.31  Mask:255.255.255.224
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
- ----8<----8<----

3. Now, create a default route going via Airtel (172.16.0.1 is my
Airtel's GNU/Linux based modem):

- ---->8---->8----
abbe [~] chateau % route add default gw 172.16.0.1
- ----8<----8<----

Following is the NATting rule from my Airtel modem:

- ---->8---->8----
# iptables -t nat -n -v -L  POSTROUTING
Chain POSTROUTING (policy ACCEPT 178 packets, 12630 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  832 62349 MASQUERADE  all  --  *      ppp_1_32_1  172.16.0.0/27        
0.0.0.0/0       
- ----8<----8<----

4. Now, we'll verify our WTOM's source IP being routed via 172.16.0.1 .

- ---->8---->8----
abbe [~] chateau % curl --interface aaa.bbb.ccc.ddd http://checkip.dyndns.org
<html><head><title>Current IP Check</title></head><body>Current IP Address: 
aaa.bbb.ccc.ddd</body></html>
- ----8<----8<----

Okay, in case if you mistakenly added some other address, instead of
WTOM's provided address to 'fxp0', don't worry, your packets are still
reaching their destination, it is just that the address you provided
doesn't route back to you, so you aren't getting any replies.

I tested this working not only Airtel's AS, but also in couple of
other AS'es also. Except commands there is nothing involved in this
post, which specific to GNU/Linux, so you can use your BSD box to bond
:).

Happy spoofing on public internet :)

HTH
Ashish Shukla
- -- 
·-- ·- ···· ·--- ·- ···- ·- ·--·-· --· -- ·- ·· ·-·· ·-·-·- -·-· --- --
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEARECAAYFAkiR2dkACgkQHy+EEHYuXnQfBwCfd8rgfD6gz0g7L4tAUwUlKeIp
XxMAoMvDBjbcgAB7bJbqoIv0gvA0dket
=d+7A
-----END PGP SIGNATURE-----
_______________________________________________
bsd-india mailing list
[email protected]
http://www.bsd-india.org/mailman/listinfo/bsd-india

Reply via email to