Hi all, ive been reading lartc howto, im new about traffic shaping/police. As far as red (chapter 9 complete) i saw that first the packet passes at the ingress qdisc, then it passes to the ip stack if the packet is directed to the box or its forwarded (is my case), then it falls to the egress classifier/s. Now, i understand if i have an ipsec vpn at the outside interface, the egress classifiers will act before the packet leave the kernel and enter to the vpn tunnel, is this correct? Here''s my situation , i have a "headquarter" box that is a database (to call it with a name) and then a lot of branches that send queries to this database and based on the results, the branches send packets to other branches trough some established IPSEC tunnels. So, hq is the route database, and the branches send voice traffic to other branches. Now i have to set traffic shaping and manage the bandwith for senialization and for voice flows (rtp flows). So i need to be shure that i can classify the packets at the outside interface before them enters to the vpn tunnel. is this correct? Thanks in advance. -- Alexis
hi alexis, i -- THINK -- that this is how it happens. cheers charles On Fri, 2004-09-03 at 20:12, Alexis wrote:> Hi all, ive been reading lartc howto, im new about traffic > shaping/police. > > As far as red (chapter 9 complete) i saw that first the packet passes > at the ingress qdisc, then it passes to the ip stack if the packet is > directed to the box or its forwarded (is my case), then it falls to > the egress classifier/s. > > Now, i understand if i have an ipsec vpn at the outside interface, the > egress classifiers will act before the packet leave the kernel and > enter to the vpn tunnel, is this correct? > > Here''s my situation , i have a "headquarter" box that is a database > (to call it with a name) and then a lot of branches that send queries > to this database and based on the results, the branches send packets > to other branches trough some established IPSEC tunnels. So, hq is the > route database, and the branches send voice traffic to other branches. > > Now i have to set traffic shaping and manage the bandwith for > senialization and for voice flows (rtp flows). So i need to be shure > that i can classify the packets at the outside interface before them > enters to the vpn tunnel. > > is this correct? > > > Thanks in advance. > > > -- > Alexis
hi alexis, its been a while since i did this modification to the kptd. the diagram assumes that this a linux box doing a vpn tunnel(s). lets assume that eth0 is facing the lan and eth1 is facing the internet and that eth1 has one or more ipsec interfaces. a packet from the lan comes in on eth0 and is destined to lan via an ipsec tunnel. i *believe* that before the routing decision is made, the ipsec process changes the interface to the appropriate ipsecX interface name. the packet, as it is not destined for this local machine, pass thru FORWARD, POSTROUTING, and then EGRESS. ipsec encrypts the packet and the new esp packet is repassed thru POSTROUTING and EGRESS and is dequeued to the hardware. if i am not mistaken, meta data from the unencrypted packet is preserved, that is, that you may mark the packet in POSTROUTING and then use that mark to make an QOS EGRESS decision on the ESP packet. i''ll have to check this again, but i don''t have a bunch of time at the moment. now, assume an esp packet arrives on eth1 addressed to this box because it is at the end of the tunnel. the esp packet passes PREROUTING, INGRESS, and passes INPUT as it addressed for this machine. after INPUT, ipsec decrypts the packet and it is passed thru PREROUTING, INGRESS, FORWARD (as it is destined now for a machine on the lan), POSTROUTING, EGRESS and dequeued to the hardware. cheers chalres On Fri, 2004-09-03 at 22:16, Alexis wrote:> Thank you very much for the quick answer. > > Let me ask you a question about it so I can save time, analyzing this ascii > I can see after qos ingress and before input routing a statement that says > "if dst ip via ipsec put on ipsecX interface" > > Ok, this is my basic schema > > LAN > |ethX| linuxbox |ethZ| > IPSEC VPN > > This means, all the LAN traffic that reaches the linuxbox is forwarded from > ethX to ethZ and then via ipsec reaches its destination. > > > As ive never configured an ipsec vpn using linux yet (only used cisco and > nortel) my question is. > > "if dst ip via ipsec put on ipsecX interface" < this means that ill have an > ipsecX interface and I need to set the queues in this interface? Or I need > to set up my queues on ethZ? > > Thanks in advance. > > Ps: ill configure ipsec vpn using kernel 2.6 > > > > -----Mensaje original----- > De: lartc-admin@mailman.ds9a.nl [mailto:lartc-admin@mailman.ds9a.nl] En > nombre de lartc@manchotnetworks.net > Enviado el: Viernes, 03 de Septiembre de 2004 16:32 > Para: Alexis; LARTC list > Asunto: Re: [LARTC] traffic queueing and ipsec vpn > > hi alexis, > > i -- THINK -- that this is how it happens. > > cheers > > charles > > > On Fri, 2004-09-03 at 20:12, Alexis wrote: > > Hi all, ive been reading lartc howto, im new about traffic > > shaping/police. > > > > As far as red (chapter 9 complete) i saw that first the packet passes > > at the ingress qdisc, then it passes to the ip stack if the packet is > > directed to the box or its forwarded (is my case), then it falls to > > the egress classifier/s. > > > > Now, i understand if i have an ipsec vpn at the outside interface, the > > egress classifiers will act before the packet leave the kernel and > > enter to the vpn tunnel, is this correct? > > > > Here''s my situation , i have a "headquarter" box that is a database > > (to call it with a name) and then a lot of branches that send queries > > to this database and based on the results, the branches send packets > > to other branches trough some established IPSEC tunnels. So, hq is the > > route database, and the branches send voice traffic to other branches. > > > > Now i have to set traffic shaping and manage the bandwith for > > senialization and for voice flows (rtp flows). So i need to be shure > > that i can classify the packets at the outside interface before them > > enters to the vpn tunnel. > > > > is this correct? > > > > > > Thanks in advance. > > > > > > -- > > Alexis_______________________________________________ LARTC mailing list / LARTC@mailman.ds9a.nl http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO: http://lartc.org/
hi alexis, please do -- i''d like to see just how far off i am :-) i''ve been just playing arounfd with racoon instead of freeswan -- totally different animal ... cheers charles On Sat, 2004-09-04 at 16:39, Alexis wrote:> Thanks again, this is _really_ enough info, ill do a lab and test this, I > think this is the best way to realize how this work. > > Best regards. > > > > -----Mensaje original----- > De: lartc-admin@mailman.ds9a.nl [mailto:lartc-admin@mailman.ds9a.nl] En > nombre de lartc@manchotnetworks.net > Enviado el: Sábado, 04 de Septiembre de 2004 5:15 > Para: LARTC list > Asunto: RE: [LARTC] traffic queueing and ipsec vpn > > hi alexis, > > its been a while since i did this modification to the kptd. > > the diagram assumes that this a linux box doing a vpn tunnel(s). lets assume > that eth0 is facing the lan and eth1 is facing the internet and that eth1 > has one or more ipsec interfaces. > > a packet from the lan comes in on eth0 and is destined to lan via an ipsec > tunnel. i *believe* that before the routing decision is made, the ipsec > process changes the interface to the appropriate ipsecX interface name. > > the packet, as it is not destined for this local machine, pass thru FORWARD, > POSTROUTING, and then EGRESS. ipsec encrypts the packet and the new esp > packet is repassed thru POSTROUTING and EGRESS and is dequeued to the > hardware. > > if i am not mistaken, meta data from the unencrypted packet is preserved, > that is, that you may mark the packet in POSTROUTING and then use that mark > to make an QOS EGRESS decision on the ESP packet. i''ll have to check this > again, but i don''t have a bunch of time at the moment. > > now, assume an esp packet arrives on eth1 addressed to this box because it > is at the end of the tunnel. the esp packet passes PREROUTING, INGRESS, and > passes INPUT as it addressed for this machine. after INPUT, ipsec decrypts > the packet and it is passed thru PREROUTING, INGRESS, FORWARD (as it is > destined now for a machine on the lan), POSTROUTING, EGRESS and dequeued to > the hardware. > > cheers > > chalres > > > On Fri, 2004-09-03 at 22:16, Alexis wrote: > > Thank you very much for the quick answer. > > > > Let me ask you a question about it so I can save time, analyzing this > > ascii I can see after qos ingress and before input routing a statement > > that says "if dst ip via ipsec put on ipsecX interface" > > > > Ok, this is my basic schema > > > > LAN > |ethX| linuxbox |ethZ| > IPSEC VPN > > > > This means, all the LAN traffic that reaches the linuxbox is forwarded > > from ethX to ethZ and then via ipsec reaches its destination. > > > > > > As ive never configured an ipsec vpn using linux yet (only used cisco > > and > > nortel) my question is. > > > > "if dst ip via ipsec put on ipsecX interface" < this means that ill > > have an ipsecX interface and I need to set the queues in this > > interface? Or I need to set up my queues on ethZ? > > > > Thanks in advance. > > > > Ps: ill configure ipsec vpn using kernel 2.6 > > > > > > > > -----Mensaje original----- > > De: lartc-admin@mailman.ds9a.nl [mailto:lartc-admin@mailman.ds9a.nl] > > En nombre de lartc@manchotnetworks.net Enviado el: Viernes, 03 de > > Septiembre de 2004 16:32 > > Para: Alexis; LARTC list > > Asunto: Re: [LARTC] traffic queueing and ipsec vpn > > > > hi alexis, > > > > i -- THINK -- that this is how it happens. > > > > cheers > > > > charles > > > > > > On Fri, 2004-09-03 at 20:12, Alexis wrote: > > > Hi all, ive been reading lartc howto, im new about traffic > > > shaping/police. > > > > > > As far as red (chapter 9 complete) i saw that first the packet > > > passes at the ingress qdisc, then it passes to the ip stack if the > > > packet is directed to the box or its forwarded (is my case), then it > > > falls to the egress classifier/s. > > > > > > Now, i understand if i have an ipsec vpn at the outside interface, > > > the egress classifiers will act before the packet leave the kernel > > > and enter to the vpn tunnel, is this correct? > > > > > > Here''s my situation , i have a "headquarter" box that is a database > > > (to call it with a name) and then a lot of branches that send > > > queries to this database and based on the results, the branches send > > > packets to other branches trough some established IPSEC tunnels. So, > > > hq is the route database, and the branches send voice traffic to other > branches. > > > > > > Now i have to set traffic shaping and manage the bandwith for > > > senialization and for voice flows (rtp flows). So i need to be shure > > > that i can classify the packets at the outside interface before them > > > enters to the vpn tunnel. > > > > > > is this correct? > > > > > > > > > Thanks in advance. > > > > > > > > > -- > > > Alexis > > _______________________________________________ > LARTC mailing list / LARTC@mailman.ds9a.nl > http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO: http://lartc.org/ >_______________________________________________ LARTC mailing list / LARTC@mailman.ds9a.nl http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO: http://lartc.org/