And which rules are from the firewall which is not being redirected?

Can you check the rules marks which the configured ones?

The reason for not being redirected is that the rules is not matching
correctly.
You can incluye logging rules in order to check why the rules are
notatching for such firewall.

Regards

El 20 oct. 2016 8:20 p. m., "Randy Baca" <ra...@rbaca.com> escribió:

> Here is sanitized output.  It all looks normal.
>
>
>
> root@zenlb01:~# iptables -L -t mangle
> Chain PREROUTING (policy ACCEPT)
> target     prot opt source               destination
> MARK       udp  --  anywhere             (ZLB VIP)        statistic mode
> random probability 1.00000000000 multiport dports syslog /*
> FARM_SyslogUDP_4_  */ MARK set 0x206
> MARK       udp  --  anywhere             (ZLB VIP)        statistic mode
> random probability 0.72727272706 multiport dports syslog /*
> FARM_SyslogUDP_3_  */ MARK set 0x205
> MARK       udp  --  anywhere             (ZLB VIP)        statistic mode
> random probability 0.45454545459 multiport dports syslog /*
> FARM_SyslogUDP_2_  */ MARK set 0x204
> MARK       udp  --  anywhere             (ZLB VIP)        statistic mode
> random probability 0.18181818165 multiport dports syslog /*
> FARM_SyslogUDP_1_  */ MARK set 0x203
> MARK       udp  --  anywhere             (ZLB VIP)        statistic mode
> random probability 0.03636363614 multiport dports syslog /*
> FARM_SyslogUDP_0_  */ MARK set 0x200
> MARK       tcp  --  anywhere             (ZLB VIP)        statistic mode
> random probability 1.00000000000 multiport dports shell /*
> FARM_SyslogTCP_3_  */ MARK set 0x208
> MARK       tcp  --  anywhere             (ZLB VIP)        statistic mode
> random probability 0.75000000000 multiport dports shell /*
> FARM_SyslogTCP_2_  */ MARK set 0x207
> MARK       tcp  --  anywhere             (ZLB VIP)        statistic mode
> random probability 0.50000000000 multiport dports shell /*
> FARM_SyslogTCP_1_  */ MARK set 0x202
> MARK       tcp  --  anywhere             (ZLB VIP)        statistic mode
> random probability 0.25000000000 multiport dports shell /*
> FARM_SyslogTCP_0_  */ MARK set 0x201
>
> Chain INPUT (policy ACCEPT)
> target     prot opt source               destination
>
> Chain FORWARD (policy ACCEPT)
> target     prot opt source               destination
>
> Chain OUTPUT (policy ACCEPT)
> target     prot opt source               destination
>
> Chain POSTROUTING (policy ACCEPT)
> target     prot opt source               destination
> root@zenlb01:~#
> root@zenlb01:~#
> root@zenlb01:~# iptables -L -t nat
> Chain PREROUTING (policy ACCEPT)
> target     prot opt source               destination
> DNAT       tcp  --  anywhere             anywhere             mark match
> 0x201 /*  FARM_SyslogTCP_0_  */ to:(Server0):514
> DNAT       tcp  --  anywhere             anywhere             mark match
> 0x202 /*  FARM_SyslogTCP_1_  */ to:(Server1):514
> DNAT       tcp  --  anywhere             anywhere             mark match
> 0x207 /*  FARM_SyslogTCP_2_  */ to:(Server2):514
> DNAT       tcp  --  anywhere             anywhere             mark match
> 0x208 /*  FARM_SyslogTCP_3_  */ to:(Server3):514
> DNAT       udp  --  anywhere             anywhere             mark match
> 0x200 /*  FARM_SyslogUDP_0_  */ to:(Server0):514
> DNAT       udp  --  anywhere             anywhere             mark match
> 0x203 /*  FARM_SyslogUDP_1_  */ to:(Server1):514
> DNAT       udp  --  anywhere             anywhere             mark match
> 0x204 /*  FARM_SyslogUDP_2_  */ to:(Server2):514
> DNAT       udp  --  anywhere             anywhere             mark match
> 0x205 /*  FARM_SyslogUDP_3_  */ to:(Server3):514
> DNAT       udp  --  anywhere             anywhere             mark match
> 0x206 /*  FARM_SyslogUDP_4_  */ to:(Server4):514
>
> Chain INPUT (policy ACCEPT)
> target     prot opt source               destination
>
> Chain OUTPUT (policy ACCEPT)
> target     prot opt source               destination
>
> Chain POSTROUTING (policy ACCEPT)
> target     prot opt source               destination
>
>
>
> *RB*
> ------------------------------
> *From:* Laura Garcia [nev...@gmail.com]
> *Sent:* Thursday, October 20, 2016 10:52 AM
> *To:* zenloadbalancer-support@lists.sourceforge.net
> *Subject:* Re: [Zenloadbalancer-support] UDP Port 514 Unreachable
>
> Hi Randy, maybe the L4 rules are not generated properly for this certain
> firewall client.
>
> Could you check if the rules for this firewall has the same rules than the
> others in the following commands?
>
> iptables -L -t mangle
> iptables -L -t nat
>
> Regards.
>
>
> Laura Garcia
> Zen Load Balancer Team
> www.zenloadbalancer.com
>
> On Thu, Oct 20, 2016 at 7:29 PM, Randy Baca <ra...@rbaca.com> wrote:
>
>> Hi,
>>
>> I am running ZLB to load balance syslog messages coming from my firewalls
>> to a farm of log parsers.  One firewall is sending syslogs but instead of
>> load-balancing the packets like the other firewalls ( all Cisco ASA) the
>> ZLB responds to the one firewall with this message:
>>
>>
>>
>> 10:21:25.683555 IP (firewall).514 > (ZLB VIP).514: SYSLOG local4.info,
>> length: 147
>>
>> 10:19:44.045419 IP (ZLB VIP) > (firewall): ICMP 10.251.253.50 udp port
>> 514 unreachable, length 183
>>
>>
>>
>> Does anyone know why this is happening?  All the other firewalls are
>> being load-balanced properly.
>>
>>
>>
>> *RB*
>>
>> ------------------------------------------------------------
>> ------------------
>> Check out the vibrant tech community on one of the world's most
>> engaging tech sites, SlashDot.org! http://sdm.link/slashdot
>> _______________________________________________
>> Zenloadbalancer-support mailing list
>> Zenloadbalancer-support@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support
>>
>>
>
> ------------------------------------------------------------
> ------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, SlashDot.org! http://sdm.link/slashdot
> _______________________________________________
> Zenloadbalancer-support mailing list
> Zenloadbalancer-support@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support
>
>
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most 
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Zenloadbalancer-support mailing list
Zenloadbalancer-support@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support

Reply via email to