> On 05/18/2012 02:08 PM, Mike Lander wrote:
> > Tom,
> > I have one last question about this, I noticed that in your config. You
use
> > the default gateway of your ISP's.
> > Many times I have had various isp's fail. I ping the default gateway as
a
> > test. 99% of the gateway replies,
> > because they are static. Then I try something downstream and of course
its
> > down.
> > In your case does your failover work because its dhcp? And your
default
> > gate is not active in your comcast modem?
> >
> > The reason I ask is originally I had entered the next downstream hop
on
> > both these ISPs when I started
> > testing. I used the common open dns servers as a last resort last
night.
> > (4.2.2.2) (They always answer pings.)
> > Since I now know that lsm did not have the correct routes> inferface,
this
> > has been my trouble.
>
>
> Mike,
>
> My configuration has changed quite a bit since I published that article.
> Then, the default gateway was at the provider's facility and not local.
> Now my default gateway is local on one uplink so I ping the next hop
> router and use TTL=2 on that provider. The problems I have encountered
> are almost always between my house and the provider, so doing it that is
> adequate and there are always the proper routes in place.
>
> -Tom
> --
Hi Tom,
The failover worked last night. However this morning with tcpoutgoiung
empty.
Squid was requesting pages through my failover ISP 'rea' in this case.
I entered tcpgoing= to fix it for now.
After re-reading. I have changed restore defaultroute=No and changed
providers.
Right now I think squids cache is fooling me so I will leave this for
awhile and check
tonight.
before changes
#NAME NUMBER MARK DUPLICATE INTERFACE GATEWAY
OPTIONS COPY
rea 1 256 - eth0 205.134.193.137
fallback
com 2 512 - eth1 50.78.47.94
New config I am trying>shorewall show routing is with the provider config
here
#NAME NUMBER MARK DUPLICATE INTERFACE GATEWAY
OPTIONS COPY
rea 1 256 - eth0 205.134.193.137
loose,fallback
com 2 512 - eth1 50.78.47.94
balance
Gate:~ # shorewall show routing
Shorewall 4.5.3.1 Routing at Gate.tituswill.com - Sat May 19 13:32:25 PDT
2012
Routing Rules
0: from all lookup local
999: from all lookup main
1000: from all to 192.168.100.0/24 lookup main
1000: from all to 10.199.7.0/24 lookup main
10000: from all fwmark 0x100/0xff00 lookup rea
10001: from all fwmark 0x200/0xff00 lookup com
20000: from 50.78.47.90 lookup com
32765: from all lookup balance
32767: from all lookup default
Table balance:
default via 50.78.47.94 dev eth1
Table com:
50.78.47.94 dev eth1 scope link src 50.78.47.90
default via 50.78.47.94 dev eth1 src 50.78.47.90
Table default:
205.134.193.137 dev eth0 scope link
default via 205.134.193.137 dev eth0 src 205.134.193.138 metric 1
Table local:
local 50.78.47.90 dev eth1 proto kernel scope host src 50.78.47.90
local 205.134.193.138 dev eth0 proto kernel scope host src 205.134.193.138
local 172.16.2.1 dev tun0 proto kernel scope host src 172.16.2.1
local 172.16.100.1 dev tun2 proto kernel scope host src 172.16.100.1
local 127.0.0.2 dev lo proto kernel scope host src 127.0.0.1
local 127.0.0.1 dev lo proto kernel scope host src 127.0.0.1
local 127.0.0.0/8 dev lo proto kernel scope host src 127.0.0.1
local 10.20.227.1 dev vlan10 proto kernel scope host src 10.20.227.1
local 10.19.227.20 dev eth3 proto kernel scope host src 10.19.227.20
broadcast 50.78.47.95 dev eth1 proto kernel scope link src 50.78.47.90
broadcast 50.78.47.88 dev eth1 proto kernel scope link src 50.78.47.90
broadcast 205.134.193.143 dev eth0 proto kernel scope link src
205.134.193.138
broadcast 205.134.193.136 dev eth0 proto kernel scope link src
205.134.193.138
broadcast 127.255.255.255 dev lo proto kernel scope link src 127.0.0.1
broadcast 127.0.0.0 dev lo proto kernel scope link src 127.0.0.1
broadcast 10.20.227.255 dev vlan10 proto kernel scope link src 10.20.227.1
broadcast 10.20.227.0 dev vlan10 proto kernel scope link src 10.20.227.1
broadcast 10.19.227.255 dev eth3 proto kernel scope link src 10.19.227.20
broadcast 10.19.227.0 dev eth3 proto kernel scope link src 10.19.227.20
Table main:
73.98.6.1 via 50.78.47.94 dev eth1
50.78.47.94 dev eth1 scope link src 50.78.47.90
205.134.212.1 via 205.134.193.137 dev eth0
205.134.193.137 dev eth0 scope link src 205.134.193.138
172.16.2.2 dev tun0 proto kernel scope link src 172.16.2.1
172.16.100.2 dev tun2 proto kernel scope link src 172.16.100.1
50.78.47.88/29 dev eth1 proto kernel scope link src 50.78.47.90
205.134.193.136/29 dev eth0 proto kernel scope link src 205.134.193.138
192.168.100.0/24 via 172.16.2.2 dev tun0
10.4.138.0/24 via 10.19.227.254 dev eth3
10.20.227.0/24 dev vlan10 proto kernel scope link src 10.20.227.1
10.199.7.0/24 via 172.16.100.2 dev tun2
10.194.244.0/24 via 10.19.227.254 dev eth3
10.192.139.0/24 via 10.19.227.254 dev eth3
10.19.227.0/24 dev eth3 proto kernel scope link src 10.19.227.20
10.143.99.0/24 via 10.19.227.254 dev eth3
10.10.182.0/24 via 10.19.227.254 dev eth3
169.254.0.0/16 dev eth0 scope link
127.0.0.0/8 dev lo scope link
Table rea:
205.134.193.137 dev eth0 scope link src 205.134.193.138
default via 205.134.193.137 dev eth0 src 205.134.193.138
You have new mail in /var/mail/root
Gate:~ #
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users