I have a multi-Isp Setup and when connecting via poptop 
I belive that the firewall does not know to route the traffic back 
out of ISP1. Not sure how to tackle this issue. Does anyone have
a suggestion?


Mike

Poptop connects to ISP1 From the net

ISP2 is a gateway in the local network
providers
ISP1    1       256     main    eth0    208.48.178.121
track,balance   eth1
ISP2    2       512     main    eth1    10.5.198.238
track,balance   eth1

masq

eth0            10.5.198.0/24           208.48.178.122
eth1            208.48.178.122          10.5.198.254

tunnels

#TYPE                   ZONE    GATEWAY         GATEWAY
#
openvpn:7777    net     131.191.70.21
openvpn:5000    net     205.134.193.138
pptpserver      net              0.0.0.0/0

interfaces

#ZONE   INTERFACE       BROADCAST       OPTIONS
net     eth0    detect  norfc1918,tcpflags,nosmurfs
loc     eth1    detect  routeback
loc     ppp+
vpnt    tun1
vpno    tun0

ns2:~ # ip route ls
172.16.2.1 dev tun1  proto kernel  scope link  src 172.16.2.2 
172.16.1.1 dev tun0  proto kernel  scope link  src 172.16.1.2 
208.48.178.120/29 dev eth0  proto kernel  scope link  src 208.48.178.122 
192.168.1.0/24 via 172.16.2.1 dev tun1 
10.19.227.0/24 via 172.16.1.1 dev tun0 
10.5.198.0/24 dev eth1  proto kernel  scope link  src 10.5.198.254 
63.90.86.0/24 via 10.5.198.238 dev eth1 
169.254.0.0/16 dev eth0  scope link 
127.0.0.0/8 dev lo  scope link 
default 
        nexthop via 208.48.178.121  dev eth0 weight 1
        nexthop via 10.5.198.238  dev eth1 weight 1

This is a dump of eth1 the local interface when pinging a local address
through the tunnel. 10.5.198.191 is an IP from poptops IP pool.
10.5.198.191 is trying to ping 10.5.198.1 from the net poptop vpn.
My guess is that the firewall is trying to route the reply through
the 10.5.198.238 gateway.
I am thinking that 10.5.198.191 


ns2:~ # tcpdump -nei eth1 host 10.5.198.191
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 96 bytes
11:30:09.842114 00:10:18:28:5a:d4 > 00:02:55:7b:b2:d2, ethertype IPv4
(0x0800), length 74: 10.5.198.191 > 10.5.198.1: ICMP echo request, id 768,
seq 2048, length 40
11:30:09.842378 00:02:55:7b:b2:d2 > 00:10:18:28:5a:d4, ethertype IPv4
(0x0800), length 74: 10.5.198.1 > 10.5.198.191: ICMP echo reply, id 768, seq
2048, length 40
11:30:09.848139 00:10:18:28:5a:d4 > ff:ff:ff:ff:ff:ff, ethertype ARP
(0x0806), length 42: arp who-has 10.5.198.191 tell 10.5.198.254
11:30:10.848133 00:10:18:28:5a:d4 > ff:ff:ff:ff:ff:ff, ethertype ARP
(0x0806), length 42: arp who-has 10.5.198.191 tell 10.5.198.254
11:30:11.602844 00:10:18:28:5a:d4 > 00:1b:54:50:53:12, ethertype IPv4
(0x0800), length 222: 10.5.198.191.3635 > 76.101.63.161.8767: UDP, length
180
11:30:11.726850 00:1b:54:50:53:12 > 00:10:18:28:5a:d4, ethertype IPv4
(0x0800), length 478: 76.101.63.161.8767 > 10.5.198.191.3635: UDP, l




-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2005.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to